[qubes-users] Re: Qubes Canary 026

2021-03-11 Thread Zrubi
On 3/11/21 1:06 PM, Andrew David Wong wrote:
> Dear Qubes Community,
> 
> *Note:* When preparing the announcement for this canary, we discovered
> a typographical error in the title (the canary number "025" had not been
> updated to "026").
> 
> https://github.com/QubesOS/qubes-secpack/blob/master/canaries/canary-026-2020.txt

Aaand the correct link is:

https://github.com/QubesOS/qubes-secpack/blob/master/canaries/canary-026-2021.txt

:)
-- 
Zrubi

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86b0f5a8-f97d-fc23-4599-8f5f96afc41c%40zrubi.hu.


Re: [qubes-users] HCL - Lenovo Thinkpad P52

2020-11-18 Thread Zrubi
se  <1>
> [   21.104136]   next_to_clean<0>
> [   21.104136] buffer_info[next_to_clean]:
> [   21.104136]   time_stamp   
> [   21.104136]   next_to_watch<0>
> [   21.104136]   jiffies  
> [   21.104136]   next_to_watch.status <0>
> [   21.104136] MAC Status <80083>
> [   21.104136] PHY Status <796d>
> [   21.104136] PHY 1000BASE-T Status  <3800>
> [   21.104136] PHY Extended Status<3000>
> [   21.104136] PCI Status <10>


tried with kernel latest, and kernel 4.19

Can you give me some details how are you menaged to use it?


Given the fact that
 - the external monitor not working,
 - the CPU is mostly around 90C, then the fan is always sounds like jet.

a I'm tending to throw away this crap pretty soon. :((


-- 
Zrubi

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82a020b9-158b-c34f-bb9d-740af17b6a59%40zrubi.hu.


OpenPGP_0x617D70488F0E7BC6.asc
Description: application/pgp-keys


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-users] PCIE gen 4 m.2 cards supported?

2020-11-10 Thread Zrubi
On 11/8/20 4:38 PM, Stumpy wrote:
> I was listening to the ubuntu podcast and one of the guys there
> mentioned he just setup his new computer with a PCIE gen4 m.2 card which
> enabled him to run 4 m.2 drives at the same time, he also squeezed more
> performance out of it by doing raid 0 across the 4 drives.

Theoretically, and in some test cases, maybe...

> Asides from the risk of loosing data, does/would #1 Qubes support pcie
> gen4? #2 Is is possible to (if the hardware doesnt support it for some
> strange reason) to do raid0 across 4 drives on a pcie m.2 card?

Not as strange as you thing... as usually those RAID features are
meaning windonws only software raid.
So in practice, there is no (or at least very rare) hardware RAID on a
desktop board.

on Qubes (or in Linux in general) you can safely relay on software raid
not the one your motherboard suggest, but what the Linux kernel (even
the fedora installer) provides you

> I am not in a huge hurry to upgrade but when i do i am keen on getting a
> storage option that will make my qubes setup fairly fast and i assume
> that with a super fast drive setup it would be able to sping up appvms
> faster?

In practice (like appvm startup times), you can't even tell if your
system runs from a SATA SSD or from an NVME m.2 SSD. Imagine the much
less theoretical speed difference you may get using a PCI gen 4 device

-- 
Zrubi

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a03bcf8-9e7b-c98d-da5f-56bdc5dac9b9%40zrubi.hu.


Re: [qubes-users] Qubes User Forum

2019-05-01 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/26/18 1:17 PM, Zrubi wrote:
> Currently it's just a one man show :)

And remained such...


> The domain, and the hosting is paid for 12 months.

While there is a few (paid) moths left, it seems there is no need for
this service, as only a very few users where ever used it - respect to
them.

As the service is currently broken, and I have no time and inspiration
to fix it again, I will just shut down the forum.



@Andrew:
- - If the Qubes Team needs the domain name, I'm willing to assist the
transfer.

- - If you can easily "unsubscribe" all the users from the
"qubes-os.info" domain, please do so. Thanks.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=z+Zc
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/894eef65-a246-d139-576f-4ee9d7dda2ce%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ThinkPad T480

2019-04-30 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 4/30/19 10:31 AM, ljul8...@gmail.com wrote:
> Intel Core i5-8350U

I have a T480 with the CPU above.

However it's not about the CPU, the amount of RAM is more important.

And be aware, that
- - you may not able to use the Thunderbolt + the USB-c port,
- - I also have to hold back the kernel version on the 4.14 line,
- - the power management part needs (heavy) tuning if you want to use it
from battery...

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=SfRw
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51d8e108-f314-ff32-5da6-1016fb03e697%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Log qubes firewall packets

2019-04-21 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 4/21/19 9:13 PM, Frozentime345 wrote:
> Wondering how to log packets blocked and accepted by qubes firewall
> for specific vm or all vms if thats the only option? Couldn't find
> anything in website or google or qvm-firewall
> 

Unfortunately, Qubes firewall was not designed for such use case.

If you are familiar with the iptables (and nftables too), you may be
able to workraound this limitation. But it really not trivial to achieve
.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=4NxJ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/efc45631-892a-73fb-e6fc-ffb6f25532b5%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing databases on templates and they need updates.

2019-04-17 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 4/17/19 3:16 PM, Sergio Matta wrote:

> In my mind the solution was something like a persistent and shared
> mount point with the vm and its template,

This is a very bad idea.
You would ruin the separation between the VMs, as one compromised VM
would be able to compromise the template -> then all the VMs based on
that template...


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=g81s
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24bf93b9-0624-131d-f3bb-7c60c9d06163%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Logging Drop Packets

2019-03-08 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 3/8/19 3:28 PM, cmsch...@gmail.com wrote:
> I'm trying to setup an appvm like this:
> 
> appvm -> appvm_firewall -> vpn -> vpn_firewall -> sys-net
> 
> I want to tighten the firewall rules and do a deny policy. How can
> I get a log of dropped firewall packet logs from appvm_firewall or
> vpn_firewall? I've tried a few different iptables commands but I
> haven't really had any success.

unfortunately, the Qubes firewall do not support any kind of custom
rules, including logging.

Moreover it is using a mixed set of iptables and nftables which makes
 it much more complicated.


I had a proposal about this exact issue before, by extending the
action with the log type of rules, but as I do not have time to check
and/or implement it, I guess it is just dropped.

Now if you want this feature, you have to replace the whole default
firewall set, which is not trivial.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=WqkH
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/09b8ae77-c1fa-e79c-b02e-fc4a939ced8c%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] openvpn issues

2019-02-19 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/19/19 6:26 AM, haaber wrote:
> I set up a new debian AppVM, checked "provides network", and
> installed network-manager, and network-manager-openvpn-gnome.  So
> far so good.

> ...it connects, and receives a large list "route add ..." which is
> strange to me. I don't find these IP adresses anywhere in the
> config files ; they seem to be imposed remotely (?).
Yes, routes can be pushed from the remote server.

> Anyways, I can ping those, but no others (e.g.  no 8.8.8.8). Bad. 
> Any ideas on that?

Remote server can push a default route too.
In this case all* traffic will go that way.

*Except qubes specific DNS resolution

You can ignore the pushed routes, by modifying the openvpn config:
IPv4->Routes


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=2axt
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1c7edaff-47ce-cdb8-11a8-60ce719d0778%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] not enough memory to start domain "xyz"

2019-02-17 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/17/19 11:00 AM, evo wrote:
> thanks! xl info does the job, so i have 16GB RAM, it should be ok
> to start the domains i have there. I put them all together and they
> have about 9GB. If i decrease the domain RAM, i can start it. But i
> don't understand where the bottle neck is. Where are about 5GB
> RAM??

- - There is a RAM reservation for dom0 itself,
- - and some overhead too.
- - and there are some fragmentation related issue as well.

As we discussed this before several times, it is wise to tune the
memory reservations depending on your available RAM, experience, and
application needs.

Search the archives for suggestions and examples.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlxpWXkACgkQVjGlenYH
FQ0mUQ//bDBnMuecKgomPWZ8i/fi1oNgvcXPCwx7W7Y0ls8nhLYrBz3u9NFpZeLI
GcO/dJx3+aY92ZrRkUaWsm2Wyf+gi6nj/1859dQgukyD8x8ZZXUwhnKBXz32T/88
Z3kEhmlOQBeHPDSCO6m4kqV/gfVRUCL+UfTs2q7jmas0VIWGBvkHcGmUZig5lbrf
ZHyW4HY2/woXEyR79rin+Xgdqpi2f/MyHQRmzDZr2Ibnd0xacK5rOQGgI9PSi5ai
gs2FhjGL3agNO1g5q2q8Jt8ZqOZwLFlegCPvPQIQOUDJDgqMEa79wA3xhi69QNqm
LlIcJqcTsLGMv65Q0mUtHcEyXejljpFbQavQwMOz3eWd9YsJHVYzJonIEMmndEHf
jXWsCr4OoHBISUdUisd0SH42VuhqWkIovp24PILw/nt6veBSobe4BMirft5EkHiT
5tDFvTuJzYw5bopj4qMy5S6ZSQwGUnVEszythQjIQ28jIz+TkoQTlijs99gaUnCX
GSEe4jBymm/DNbSPCmnmY+5zco80/uTcKJ9Eg5U93rAaKovM47ffIDWR2qDQgoBI
6dVZYr9qOEoQC8JRusODiEd4HOnMkK0R54CLBrE+CWLeYGgYhTZNiRC0Bvj8aPZX
b2dTGYYwuX7cLsijRoXrTofJc7MrY2qK63+ijEdYohNJ5W6rpzk=
=zaCF
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fc7640b9-c3cf-4f4a-36c9-2007187107cf%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] not enough memory to start domain "xyz"

2019-02-17 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/16/19 11:08 AM, evo wrote:
> I got the  message that i don't have enough memory to start a
> domain. How can i understand, what exactly the problem is?


The problem is that you have no more free RAM to start that new domain.
- - check your total memory.
- - check the assigned memory of the domain you want to start.
  Then consider decrease it.

About how many domain are you able to start at the same time, You are
always limited by your RAM.

The default allocated memory for the domains are too optimistic. Means
if you have low memory (8G or less) you will be limited to a very few
number of domains to start.

> By the way, how can i check up how much RAM i have in the whole
> laptop? (I forgot it :D )

Open a terminal in dom0, then:
xl info

"total memory" will tell you the amount of RAM your machine has.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=VjzG
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6a6f40ee-15b2-f49b-9e91-1dbfdfc1b175%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How secure is a VM if a user tries to tampers it?

2019-02-08 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/8/19 3:55 PM, brendan.h...@gmail.com wrote:

> Anyway. The open source OpenXT (open source based on the above)
> is/was designed for the use case discussed in this thread and is
> the underlying platform of DoD's SecureView environment.
> 
> The enterprise-level admin console can: - Control access to and
> disable/wipe clients - Push out Xen/dom0 updates - Push out VM
> and/or template updates - Delete and/or redeploy enterprise owned
> VMs - Delete and/or redeploy local user's personal VM (e.g. after
> malware incident)
> 
> Local-machine limited admin console (dom0): - Refresh or redeploy
> user's personal VM.

That means total control over the workstaion.
vs.
The initial goal:
"The system administrators would not have to support QubesOS, just the
Windows VM"


This kind of total (enterprise) control was planned for qubes 4.x -
however I don't hear about real life usage.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=sAJA
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d116cc58-1a01-4a7f-18e4-4f350045da6d%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How secure is a VM if a user tries to tampers it?

2019-02-08 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/8/19 10:05 AM, frap...@gmail.com wrote:

> The system administrators would not have to support QubesOS, just
> the Windows VM, but this solution could only be accepted if I am
> able to show that there is a reasonable guarantee that tampering
> the Windows VM from QubesOS is as hard as tampering the same
> Windows system installed on a regular machine (with secure boot,
> hardware encryption, etc.).

Even if they loose the company rules, unfortunately Windows (10)
support in Qubes is not reached that point: No TPM, no audio, no xen
drivers, no file transfer, no USB attach, no copy paste.

The network is painfully slow, probably because of the ancient virtual
hardware provided by the HVM(?)

(The window7 was much more usable in production, thanks to the
qubes-windows-tools package)

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=0yXp
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f79704db-d6b7-7275-6070-c4b351092624%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How secure is a VM if a user tries to tampers it?

2019-02-08 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/8/19 10:05 AM, frap...@gmail.com wrote:
> My question is: how secure is a VM if a user tries to tampers it?
> Is SGX a technology that can be used to provide that level of
> security? If so, is it used by QubesOS at the moment?

Currently there is no such feature I'm aware of.

The one who control the hypervisor (dom0) is in "god mode" for all the
guest VMs.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlxdS6kACgkQVjGlenYH
FQ1R3g//dBVnG68+O8OZZMEfRdskweSi0J7lQ3Pe1CQz3PFtUyA8L7GFXn9JRMEt
fbloa5duNf6rPbX5FNuxVG4F+uUV0UfhJrPqAL241nY73D7gqfmXEx3Yk0azKLru
MAPCHTrwIPQ3MCWor9d2h2vYyquw5N+3UwtkZIQRHloiobtwbGnAKL7RmCA3kmNq
pEALEVO9JwieVL4PLymrwh+RWiYOYrfVKsyF6d3/MyMf0sSjxGq3MTJ5kg/l4cpY
29o5uOhKKSCX4Um+Fa/DrKC0lxRTqpnSgy1EvIP45n2lxCkQht7NXc9U5+oHnweL
MzMBmQinZs10eK5i8vrkkKsXlX/GmeRiS0D+HZ6ZfCGqKqEW18jhAAiaEVdP2V2a
kxerhWQ3e8wbcqtzuGUH89lfSEc/NMl7A7WWvCrrgaEuYMO72XX7hyojna686MFL
rEshpmkAlLfo3+mSaWMhQkgv0tUyoQ7akdNVMa497moxd5To7tjwyr5iT2ytemaz
AErfjgkMsHx8TqukrtNKPtW3CO+Y2u16aZbnqRom5qWsTXJetsdBZ8jruNPsO3Fm
sqih3xiSTaJ1ocRXuc+hKgJ3O0i0mtYBPgbWhhpLK4uibfN/LGQjFKUS1h2o5XvQ
XYMDdLXGjG9KBe3SILWjJDTzu/mdB8/+NdYSEZNctsVKD9+G58s=
=Crf7
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/debd5c1e-a3aa-f6fb-d3d3-9ee001ce7572%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: SECURITY ALERT

2019-02-06 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/6/19 5:12 PM, kitchm via Forum wrote:
> Do we agree, Andrew, that if a person is concerned with anonymity
> and privacy, he would not use social media?

wrong.

1. Anonymity and privacy are different things.
2. "person" is not meaningful in your sentence.

You can have many different digital identity, may or may not be
connected to a real person.

Some social media require you to connect them, others may not.

- - Facebook EULA require that you have to use your real identity.
However they are just loosely checking/forcing it.


- - twitter/google is not connected to a real person if you not want to.

So qubes mailing list - and the Qubes community in general - is not
forcing you to use a digital identity connected to a real person. So
you can be remain anonymous. Even if you have a google account.

Hence, it is not easy to achieve in practice.


On the other hand, most of the time reputation is more important than
anonymity. At least for me.

That's why I using gpg, and signing ~every mail I sent to a mailing
list. It is not anonym for sure, even if it still just a digital
identity. But my intention is that you should be able to connect this
digital identity to my real life identity.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=qNBo
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/61fbdc2f-cc4c-8e7d-985f-2998e18c1058%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Forum Sync Test - please ignore.

2019-02-02 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/2/19 1:13 PM, Zrubi via Forum wrote:
> Hope this is the last one.

Now it woks as I expected :)

This modification should eliminate the mail delays caused by a strict
SPF policy used by many of the public mailing domains by not using a
faked From address. (hence, we lost the original sender address)

It is still just a simple hack, there are more options to make it work
better, by adding additional headers like "X-Original-From"
But in would need much more modification of the Forum code.


Sorry for the message flood.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=6sbi
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9d37a462-d94f-5f45-748b-b69a1df2ff17%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Forum Sync Test - please ignore.

2019-02-02 Thread Zrubi via Forum
Hope this is the last one.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a71.5c558968%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Re: Forum Sync Test - please ignore.

2019-02-02 Thread Zrubi via
If you are really interested:

the From header should look like this:
Zrubi via   

If it's still just the forum address, I still not found the
right place to modify...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a6e.5c5586ba%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Forum Sync Test - please ignore.

2019-02-02 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

This is a post to the mailing list via normal mail message.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlxVfuYACgkQVjGlenYH
FQ32qhAAoAlQndPESuA5zxRW6JTOCDRFrcqhDjM2ZK93UD5bWBBdjX1kG8E4M7F+
kOkAUtCNSSwgiYW4and5rl+mzJ4djixzNv2EdSPjPCZXmuFioiArKJTYmoeNLHos
GifIai7i2YCZeDjqACniFzlGtZJDZJF8NSE9EvukqBqVjzoO8hhlerGqhEoKpFoL
0vVnJVvy8wGqXLGC0L6typjLCyQWhOj5wzgyiXXYOQJejAIurkD+gL/sxPJ82hAm
WS+poDGTczKJQ+HrpY2c4lYQVCOMs8LTKphDua+bY0da+njwB0z/6MKysGgkqvE0
1wS7muQs6D0y13Xf1rLL+7NGJmFi6RJmijosIMdi8Dr+I+Q4Z0qxpZ1sXaifq2FL
aoc7N02Knc0PEJ2av9eOuf3yRmDivRXcLpKO2z4L5CkAl1SgkHIxIUuY6p+fCaem
8TVKEbGw6NMFzGxHBZp64dbbNaehzTrg6mlg5ZR1FLNDhcedufWaXXCIRSSdmZeb
FUNsVFIqPu1ySgvQs4WHlhpfNa3fosCM6iN2TmgEVsVCPpjS8DGKdXy4m1vvJvZy
R7fkCiFIPX3L/f7101XXpFiHmxPjtdEnz8iY7qCNDy1cOvzXcRhiPnEVMkQKtruH
FD97uGsUDs8eTh1WsfZqliI38UoCsO1B/qY+Qobvnpms0hh/6Yw=
=Knai
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/15f74d34-bab4-bf09-97b8-f6538bdce2e9%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: hcl for qubes 4.0 or 4.0.1 is it good?

2019-01-31 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/31/19 3:32 PM, unman wrote:
> I know many people using Qubes 4 with 12GB and HDD, without
> issues. SSD is better, but not a must.

Technically you are right.

In practice, the user experience (HDD vs SSD) is not even comparable.
The price difference is is also not an issue, totally worth it.

I would say: today, a newly built desktop PC without SSD is a bad
decision. Even if running a conventional OS.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=3i2s
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9288ba99-8774-5a04-bbaf-3a9ca3f0da61%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: hcl for qubes 4.0 or 4.0.1 is it good?

2019-01-31 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/31/19 11:45 AM, Panini Panini wrote:
> 16GB RAM doesnt work fine? and a ssd with 500gb instead of hdd will
> be more good?

16GB is fine, but the more is the better ;)
SSD is a must.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=J6+L
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1231bb5a-276c-ef87-5b25-6f521fd16aea%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] why mail-list?

2019-01-30 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/31/19 12:32 AM, marmot-te wrote:
> So, the real question is : There is someone who takes care about it
> and optionally, Qubes_dev?

There is an unofficial, PoC Qubes User Forum project:
https://qubes-os.info/


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=XbJS
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5e2fca00-a0e5-8004-a706-4e8e358047b9%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] clock nightmare

2019-01-25 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/24/19 11:47 AM, haaber wrote:

> I use Qubes since 3.2 and feel quite comfortable :) Your message is
> just discouraging though.

Sorry, I don't wanted to discourage for sure.

> which I read that I have to check that  the right service installed
> in sys-net. Now here are the services in sys-net's
> /var/run/qubes-service
> 
> -rw-r--r-- 1 root root 0 Jan 24 17:54 network-manager -rw-r--r-- 1
> root root 0 Jan 24 17:54 qubes-firewall -rw-r--r-- 1 root root 0
> Jan 24 17:54 qubes-network -rw-r--r-- 1 root root 0 Jan 24 17:54
> qubes-update-check -rw-r--r-- 1 root root 0 Jan 24 17:54
> qubes-updates-proxy

I'm using a (custom) debian template for sys-net, but I have the same
content as you. I also checked the GUI where I can see a service called:
clocksync

Not sure what it is trigger, but I also have a running systemd timer
related to this:

> user@WiFi:~$ systemctl status qubes-sync-time.timer ●
> qubes-sync-time.timer - Update system time each 6h Loaded: loaded
> (/lib/systemd/system/qubes-sync-time.timer; enabled; vendor preset:
> enabled) Active: active (waiting) since Wed 2019-01-02 18:44:41
> CET; 3 weeks 1 days ago


Hope that's help.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlxLKO4ACgkQVjGlenYH
FQ1qFQ/+IsDL24RLJ3ENF8I2IQyQsi+YZyK9+6BXVVhHUVAUflpOzmT2PNgyZyXg
EZmSziocLTK6gNJitYbOlwQiH2WdnKClZTcLiR/IYeHLkrWPQ3a8NDaOPdYaKgkg
nQA1Z/M9VKLFeaNmXAr61LmPWJsjdD6BENem1Jk6jzngurTG9IPheyGuzR02L26E
O/xPX8Vzl6nLmcC6SsDJ9O8+Ey/8ImHq30TMWyxZKXIqmKvL4aDcwAnW85ymLjZW
tQTOytXnjCNfqW5lZgHLJaau82/A7UdRD8W3VLR0g85myd0FewjlbXUuZ+klFOdX
ZD+ZuC08DrZhJLIJpQY0poON5iKBrYciDP1Dj/DutMcUg16FkJOsYzzzubceB8l+
0KXTBbJLALS9MUhVXKWVrXYTPTZ/EhAP3HeZHwtjs0EIoatg8oZeKbrKJTnseYfh
8s3GQHaSZ0Wx22MYzmmSfpyL/KTDLL692whV3GFAGxfdaoJt5eJQDf6ELH274two
LBm8Q/+XaNF6aMSc1sUenYmuWMh+GD2f/kl3nXGARRZHVj02H0JMhQq8/EYAttDs
EJJiQm6ELusMRXDmprBvb0qc8VMdjn39pEQv6FDfI4vo692yLEbmdhV9bw1dsZic
SJdHBjB8Qv3klASfxZGbOQJdczALNtPwkuVxHmF6pCdKokZ4iDY=
=SSOQ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3f8627bf-1118-752d-4393-0df58497cb5d%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] clock nightmare

2019-01-25 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/24/19 7:11 AM, haaber wrote:
> Concrete question: in which timezone should live  respectively dom0
> and whonix-* ? How/Where do I configure TZ without messing all up?
> Thank you, Bernhard

timedatectl is your friend.

You can set different timezone for dom0, for every template, or every
single VM if you really want.

If you do not want to use any real timezone, you can choose the UTC.



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=emNN
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b27214b7-6463-7e8d-f2ef-624bbf0fcee8%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] clock nightmare

2019-01-25 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/24/19 7:42 AM, haaber wrote:
> I forgot to specify that I use fedora-28-minimal as net-vm (and 
> clock-vm). Is the problem in the "minimal" ?

The minimal teplates are not suitable for any service without
installing additional packages. That template is just a base for
advanced users to create their own special purpose templates.

If you are just starting to learn Qubes, I would suggest to keep using
the default normal template, till you feel confortable using Qubes.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=Ait4
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8b6108e8-4d69-4443-7d39-816b2ae59062%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ssh giving me locale error

2019-01-24 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/24/19 3:00 PM, unman wrote:

> I think you have a locale set in the qube whihc cannot be generated
> on the server. Can you check this by looking at locale settings in
> both.
> 

I think the problem is that there is NO locale set in the default
template.

You can check this by the localectl command.

As this is used in a lot of place, it is wise to correct it by setting
a valid locale in a template.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=0Nu/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b3df3b11-d2b9-35b1-ad33-3238a2a8bd97%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Lenovo T480 freezes after resume on suspend

2019-01-15 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/14/19 10:26 PM, maur...@disroot.org wrote:
> I have updated my BIOS to the latest version just in case. I have
> no Thunderbolt in the BIOS. I'm using a thinkpad T450s laptop from
> lenovo (no Thunderbolt support). The problem still persists, after
> resume the sys-usb is dead have to kill it and start it again to
> resume my USB devices (keyboard and mouse)

These kind of issues are heavily depends on the specific hardware.
So If you have a T50s, ignore my reply, as I was assume you are using
a T480, as the topic subject states.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlw9zRAACgkQVjGlenYH
FQ0kmg//bda6o6S7U9GE2FhQOVD9EYC1SHZkv33bk4Mkb7GHZPmRzq4uaQdRgkQL
mvCUvQOO3Q4kFUufkEVc24+/oRbQ91RfW4PK1Us1NoKJ5PsDC0iSQn9s9LnfXCAf
o9QbC1jiakGBCPKXEMJRsKf6DQPc/CU3DRFgItSLhqUjdhrWEl95eTB3JMkUAAwp
fX0q8uyskyklxvIkKfNTDcc/iwsJcAFTOZDjA5uDvqbwZ1sBa+yx1bVDShQ87HBc
ZERmgk3Ss9/qfcg1W/74Ja9cggXSSVMjAL7aIOfcLaAVN2PN5tOekynClTzPbUWL
0vl60W+TtaqCPgPXew0hFcPJ+sv7dUiNUGyXH8pXIqu8xIq+xmNk91tFX/KpAvjX
pfvgoc0TiCCsHuYJ1T26lFKiry/kxS1mKkkiqHX8pcp7KsSFBjw7Usnm4CxtD/b/
LTD9Xft7N/2P8M9zxQ+j+KXChdqJyE/5d7d6DgjjfkcsHmYQPJg23pkUhbXPwN5l
/LFLXfPOOgPf6390/6r0AN6V+NUWeVP+bEYyqnrEfLVyJKWXUfFmGWKA4qaM8oxP
CUwT9XsBkFL+frK9Q2vZdYoATkpQEAt0GxCR0e52f5tHSPVhtWYK4SeW5/G4jUjv
PAU6UICyj24kZDuq1CvBQ3pl/Agk495WWkxbutk+T5zHHhLhV8U=
=okA/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/545a5f2a-f704-bd6a-4eb3-0da7caf61d32%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Lenovo T480 freezes after resume on suspend

2019-01-13 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/13/19 8:04 PM, maur...@disroot.org wrote:
> Unfortunately this doesn't work for me. Detaching the USB
> controller doesn't work. My sys-usb always hangs on resume. No
> matter which update I make this problem continues to persist.

You have 2 options to solve this issue:
a,
- - Make sure, you have the latest BIOS firmware.
- - enable Thunderbolt Assist in BIOS

b,
- - disable Thunderbolt in BIOS
(Hence, you will loose the USB-C connector)

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=JuWi
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c72277c0-d01f-6c5e-5ec8-f8b7ff92f22a%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Debian minimal template

2019-01-11 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/10/19 1:14 AM, unman wrote:
> If any one is interested there's a prebuilt debian-9-minimal
> template currently available in itl-testing.

would you mind sending the output of
dpkg -l

Thanks.
- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=2GJk
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/00c61ea1-e080-40dd-e35b-f57d20d82845%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL - Lenovo Thinkpad T480

2019-01-04 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 9/7/18 5:56 PM, bbrr3...@gmail.com wrote:
> On Thursday, August 23, 2018 at 2:03:55 PM UTC+1,
> sagi-qub...@rtsn.nl wrote:
>> You may want to track and/or contribute to: 
>> https://github.com/QubesOS/qubes-issues/issues/3689 
>> https://github.com/QubesOS/qubes-issues/issues/3705
>> 
>> In any case, I'd be interested to hear the details of your
>> workaround.
> 
> As far as I recall it was simply:
> 
> qvm-pci detach sys-usb dom0:3c_00.0

Just for the record:
As leaving potentially dangerous devices (and physical connectors) in
dom0 is not the best advice, and there is a BIOS option to solve this
issue at "hardware" level:

Thunderbolt BIOS Assist:
if enabled, the mentioned device - causing the hibernation issues -
are gone, then only one USB device remains, which is works without
problems.

Confirmation needed: As I do not have any Type-C devices, I can't
check if that is still working in this case or not.

Moreover, if you don't need the thunderbolt at all, it can be disabled
completely from BIOS. Hence then the USB-C connector lost its
functionality for sure.



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=ft4g
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eaf6f342-080a-f073-4cdf-3edc16e29632%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How risky is GPU pass-through?

2018-12-23 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/23/18 9:34 PM, Demi M. Obenour wrote:
> Someone I know is interested in using QubesOS.  However, they are
> also a gamer: if they could not have a Windows VM with access to a
> dedicated graphics card for use by games, then QubesOS is not an
> option for them.

Short answer:
Qubes OS is not an option for them.


The risk part would come only after this feature exists in practice ;)
Search back for the details.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=CU8M
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4c3dc396-ca0d-0fa7-505c-59c34b3763de%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Lenovo T480

2018-12-23 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

Just installed the 4.0.1-rc

hit by the UEFI issues described here:
https://www.qubes-os.org/doc/uefi-troubleshooting/

Use the workarounds, or Disable Secure Boot.
Moreover: probably more better to go with the Legacy mode only - to
skip the troubles.


Affected by the suspend bugs:
#3689
#3705

Sou you need to enable Thunderbolt BIOS Assist and/or disable the
whole Thunderbolt support in general.

- - TPM 2.0 not recognized,
- - Fingerprint reader is a Windows only junk -> Disable it.


And now I can feel the hi-DPI pain, as it has a FHD panel in 14" size.
So everything is tiny now.


DPI scaling helps in dom0, but every AppVM should need to use that
settings...


- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlwgHqAACgkQVjGlenYH
FQ2Szg//X+M49jix1zg9G8MB7Jud/12g7e84UA2VqLP002dzGDaMw2O8mJg/7XhW
vRkt4weVtn31zPgV8Z//3xyFFNmPjo7mk+NJ82xl/t+mHXNRjdBRHJmFtCnVnVot
eL5Jx+3ZHoHr6LXYNYP74y2n7Z9vv9d1F6P9ZdUiOAHOJGDqrY2u17oa/DRil+fP
GHaRbRYCMMOGQMSs52GyF8n7ogmTgZcGoWql80s/t7HjkJ3nHOsGmEEL8HAb03J1
OvIi6pzipqfEAIWKCISkQrLVMHWpnyypdp600SRuuhlw0pxSh1a+JYTQxpLaR3ds
Pkd6P6XyydkXP0c4b8hS3KenZeX0ODnMI+N1HyODnBdQJ9CdLXrEy7PYv3/zdXNT
s9TepZEdfplTX0zCRD8u7WDZj+tEhsTTjNquWRCM4/o1owS3xcuwyU2QIubYiZOd
HPKchjqJBeBvqIDtC2jh8ukdpgKwaqWngPCL8XeKWg0YbEQiNHXaKkER1RE9Iuwq
WbmvdCRoZs9Au0JCYZcWeMEVgRp9qYguNeyw3jpXvW4OZzaAAdTvQiCmsU6SFJ3k
4cnIel0gIJ3mbMQ6quDYDcthJy2wge7YYYyg4v1mGBRzajwoL49FLunDNVwF/Doa
XYii6A9rDmzbZ9LR13AGPaYI3lh5mAoR5sOWaKtjxTnkCV4B3Oo=
=hTrQ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6afa0362-5d12-79e0-3f61-57162ea14a59%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-LENOVO-20L6S29E1W-20181224-002339.yml
Description: application/yaml


Qubes-HCL-LENOVO-20L6S29E1W-20181224-002339.yml.sig
Description: Binary data


Re: [qubes-users] Possible to use WindowsVM as a NetVM?

2018-11-23 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 11/21/18 5:47 PM, 'qubesusermarco' via qubes-users wrote:
> I have a Windows-7-VM assigned as some LinuxVM's netVM.

I just wonder why would you do this?
That would be big, bad, outdated and absolutely not designed for such
task...

> Is it just plain impossible for a WindowsVM to be a NetVM or I'm
> missing something?

I would not say impossible, but not working out of the box for sure.
In practice: it would need a lot of development to make it work.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=PYnE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/521c22f3-3510-a06f-c7df-6e8fd8bf08c4%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes User Forum

2018-11-10 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 11/10/18 4:50 AM, Sven Semmler wrote:
> Testing to post from the forum. First impressions:
> 
> - Pretty sure I want to post from my mail client, since I like my
> stuff to be signed.

I'm fully agree with this.

> - Following a discussion might be faster in the mail client too,

That's where I would prefer a forum instead of a mail client.
However I'm not a younger one :D

And the forums has more features like
- - moderation of the posts

- - re organization of the threads.
You can make the mess more useful for others

- - topic, forum tagging

- - user/thread rating

- - you can follow selected threads, and skip the rest.
Currently I receive much more mails that I can ever read.

- - much better search possibilities.
Especially if you are not have all the mails locally.


> - If this POC gets legs, it would be very useful if the software
> would become GPG/PGP aware (as in verifying signatures and hiding
> the actual signatures)


That's would be awesome!
This forum engine is open source, and prepared for plugins.
So, contributions are welcome ;)



- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlvm/hoACgkQVjGlenYH
FQ1SXA//XB2KnzZfcKURO4+QTohLlS7MBymm8Kz+boEjC/UVz1AyLSUTkIof07qi
LcQxTWH6+ajQf60WUDV0opynF+Vy3TpF+wWOu6Z3uGsXxObwHBYtyLQIT+QT20Lg
uz4g/lnlBHMrwxj2//QtyXUgk2Q0nNDNp8p/7OHOqahyRnMVAhvZL835jAyKP3jA
favna9UGtyiQNOxW0pDMuxRz1+hmc3YhHdL3+Wf2sSErrlyAh9pAUi9Eo8vjhbRg
xNQ4vFE53qnCq+KzurQi6T0O1ZWLGTs8vYjTHoYHFowFfSl0srJhojA2DkDmh4Gl
3/bGz+74fP+KdPn4GD8i11LUGKVbOhgx8Jyo+00fEfYVPT4+1kXmFkQkQhIDQfpA
XcBbPfWgwlZ/dB/9GNXzHHxwE+1L35DdRzVYHmjd9PPj5LFHY/Z03hr3orb2lmLS
Hiu4Zhuli/05ZsNsQoh9GMPhKnHPV/v6pQTe2+ERPCNl64C6pLM9+tNZg8UVY/BD
4g3Q3uB4ozYD6U7CavTAK+LeFgC5AF70KkqBlyEpbRVXdRRsdePUI+2BXyI3XhXx
YOkE/Xk/xntRNlS+828AVjs/g8g3+h4vY+2O43tKJhZf0D+Cinz8gUi/1nDrOcM6
CyFKllrFB2/wh3f00sqB+itNFI3fILnJqjNw76nzuqH5SsrYo6A=
=/5Qj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/73274931-a0e5-4adb-edf9-746cf6348acf%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes User Forum

2018-11-07 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/30/18 1:59 PM, Zrubi wrote:

> Yeah, you are one of the many users affected by this issue: 
> https://www.spamresource.com/2014/04/google-groups-rewriting-from-addr
es
>
> 
ses.html
> 
> So your email address have been replaced to the mailing list's own 
> address by google. The result is:
> 
> From: "'awokd' via qubes-users" 

I just created a patch to address this issue.
So everybody should be able to
- - find their own posts (dated from now)
- - get access to the forum interface
  (by using the password reset function)

I also patched some other bugs in the forum engine, will see if it's
getting better :)

Any further suggestion and/or bug reports are welcome.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=IKXu
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd135802-8812-cdf2-ff7f-fd4636d9298a%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Test message, please ignore.

2018-11-06 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/22/18 11:10 PM, Zrubi wrote:
> This is the message.
> 
I just need more tests.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=Yenl
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9b0a9c8d-eb26-5afa-c05c-a6366f87a508%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Any ideas about blank white video in Simplescreenrecorder and OBS in appvm (including standalone)

2018-11-06 Thread Zrubi
See this issue for details:
https://github.com/QubesOS/qubes-issues/issues/4351

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/176.5be15273%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Donating to qubes

2018-11-05 Thread Zrubi
Hope this help:
https://www.qubes-os.org/donate/


If not, use the "contact us" link (mail address) on that
page.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/155.5be04310%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Re: Re: Qubes User Forum

2018-10-30 Thread Zrubi
I would say it is not a problen until the mail gets
delivered :)

But, this is one of the reasons that this is a PoC project:
we well only see - if start testing it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e1.5bd863c5%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes User Forum

2018-10-30 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/30/18 1:54 PM, 'awokd' via qubes-users wrote:
> Zrubi wrote on 10/30/18 12:02 PM:
>> I just wondering If my instructions was not clear about how to
>> get access to the forum interface? Or just nobody cares?
>> 
>> 
>> I would accept if nobody is interested, but I see a lot of 
>> registration "attempt" in the logs...
>> 
> I am pretty set in my ways, so hadn't tried it before. :) Anyways,
> when I attempted just now, I went to password reset and put in my
> email address but it says "e-mail address not found in database". 
> I've posted several emails to qubes-users since 10/23 so am not
> sure why it's not finding me.
> 
Yeah, you are one of the many users affected by this issue:
https://www.spamresource.com/2014/04/google-groups-rewriting-from-addres
ses.html

So your email address have been replaced to the mailing list's own
address by google.
The result is:

From: "'awokd' via qubes-users" 

nice, isn't it? :D

I will gonna create a user for the affected users manually...
(till it's gonna be resolved somehow)

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=jbMY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/36fe7035-df22-3bfe-38a2-9f00a5c3e709%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes User Forum

2018-10-30 Thread Zrubi
I just wondering If my instructions was not clear about how
to get access to the forum interface?
Or just nobody cares?


I would accept if nobody is interested, but I see a lot of
registration "attempt" in the logs...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/db.5bd8483a%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes User Forum

2018-10-27 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/26/18 10:18 PM, Zrubi wrote:
> On 10/26/18 9:52 PM, Zrubi wrote:
>> It seems if you using the google "forum" interface, then the from
>>  header looks like this:
> 
>> From: "'Raffaele Florio' via qubes-users" 
>> 
> 
> Or probably not even the forum interface, but the standard webmail 
> with multiple email address/alias?
> 
> Can you confirm how you post your mails to this list please?

I just found the root cause:

https://www.spamresource.com/2014/04/google-groups-rewriting-from-addres
ses.html

As you are not the only one having this issue, I might be creating a
patch for fudforum to handle this madness.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=zLHP
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9fbee19e-6f1d-91cc-cd1f-fa1ae9763877%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes User Forum

2018-10-26 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/26/18 9:52 PM, Zrubi wrote:
> It seems if you using the google "forum" interface, then the from 
> header looks like this:
> 
> From: "'Raffaele Florio' via qubes-users"
> 

Or probably not even the forum interface, but the standard webmail
with multiple email address/alias?

Can you confirm how you post your mails to this list please?

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=zfQI
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/71b30e72-e3d8-793b-ec91-e2d63d1e2e47%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes User Forum

2018-10-26 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/26/18 4:35 PM, 'Raffaele Florio' via qubes-users wrote:
> I could help with the admin/moderator role.


Cool, the first issue is here:

It seems if you using the google "forum" interface, then the from
header looks like this:

From: "'Raffaele Florio' via qubes-users" 

This seems to trick the forum engine, and creating a user using the
mailing list address :o bummer.

So if you want to use the forum, please post a "real mail" to the list
first ;)

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=8Sef
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/247d531a-3f15-d973-4bf5-dca74851cb20%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes User Forum

2018-10-26 Thread Zrubi
Achim Patzner wrote on Fri, 26 October 2018 12:32
> Even with 1&1 being quite cheap: How expensive is it?

I have paid only $12 - with the domain included.
So the first year was a gift :)

The next year would cost more for sure, but we should not
worry about this at least for the next 10 monts ;)
If the project will succeed, I'm happy to fund the next year
too...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f.5bd31b6e%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes User Forum

2018-10-26 Thread Zrubi
Achim Patzner wrote on Fri, 26 October 2018 12:32
> And then sends out the password for that account by mail
> to the mailing
> list? 8)

Nope :d
It should send it to your mail addres.
But, let's try it:
https://qubes-os.info/index.php?t=reset;

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6e.5bd319ab%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes User Forum

2018-10-26 Thread Zrubi
Achim Patzner wrote on Fri, 26 October 2018 12:32
> How well is it dealing with the endemic "I can earn
> 8000$ an hour by
> selling all my grandmothers and so can you"-type forum
> spam (besides
> having a houskeeping department consisting of more mods
> than users)?

Only registered ussers can post to the forum.

So the situation is the same as is with the mailing lists,
except:
the forum admins/moderators can ban users, delete spam,
etc...

We will se how it is going :) - that is the goal for the
PoC.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6d.5bd317ea%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes User Forum

2018-10-26 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

There were several discussions before about the current mailing lists
and/or a possible forum.

I would not only just bring back this topic, but already created a PoC
project:
https://qubes-os.info

The Qubes developers are already know about my project - still it is
an UNOFFICIAL, Proof of Concept project.
The goal is to see how it would work in practice.

The forum engine (fudforum) has a unique feature:
mailing list manager.

This means: it is able to sync any mailing list with a forum.
So every mail posted to any of the qubes mailing lists will be
received by the forum engine, and convert it to a forum post.

As the sync working both ways if a user post a new topic, or reply to
an existing one using the forum interface, it will be sent out as a
regular mail to the corresponding mailing list.

This way - if it's really work in practice - You don't have to chose
one solution, both the mailing list and the forum can work and live
together.

So if you prefer the forum interface - or just want to give it a try -
you can login to the forum, and just start using it. :)
Every kind of feedback are welcome. ;)

The direct registration is disabled for a reason:
If you post any mail to one of the mailing lists, the forum engine
creates a user account automatically, using your email address and
your name (if you using any alongside your mail address)
Because of the two way sync, it is vital to match the forum users with
the mail authors... and the key is your mail address.

So if you already posted any mail after the forum started receiving
mails (2018.10.23), you already have an account. You can access it
using the password reset function of the forum.

As the username is auto generated, check your username by reading any
of your own mails on the forum interface. Later you can change it as
you wish.

As your "name" alongside with your email address is already a public
information, the forum not ever needs any more personal info from you.
However optionally, you can add more details to your account if you
feel so.

Some technical background:
The domain name is registered by me for "personal use". But if the PoC
will be successful, and/or the Qubes team ever would need it, I
willing to cooperate.

The whole solution is hosted on an external provider. So even if I try
to make it reasonable safe, keep in mind that the hosting provider
(1&1) owns it all.

You should be aware that the forum engine is polling a mailbox, so it
has a few minutes of delay.

Help needed:
Currently it's just a one man show :)
The domain, and the hosting is paid for 12 months.
The forum engine is configured, and "seems to be" working.

However I would really need help to:
- - test this solution, by using it :)
- - forum administrators also welcome.
- - some voluntary moderators would be nice also.
- - create any better design :)
- - creating a privacy policy, and such pages...



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=GH0S
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f1cfa04-37f3-a563-ddc4-7db761fe42fa%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Test message, please ignore.

2018-10-23 Thread Zrubi
Zrubi wrote on Mon, 22 October 2018 21:10
> This is the message.

Forum reply with quote.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f.5bcf0816%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Test message, please ignore.

2018-10-23 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/23/18 1:15 PM, Zrubi wrote:
> On 10/22/18 11:10 PM, Zrubi wrote:
>> This is the message.
> 
> ..and a reply.

one more reply.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlvPBfIACgkQVjGlenYH
FQ186A//e/laZBsnEe8AwQze1Xi4b5UFjy8tpr1M2MtAotuBZCu5JC8yGFS4mvLt
1uA06DVoRMbd87Q9YqCwQFEfPegwsDhPFHRClEYQuzev3i2xnsEi0Z2lizRPhgua
l45HGpF3xnUHsKlpKWXYn7lhF4sspougP8CCMKm7ZDX6dU+By7jU694bM0qpHCfs
OlVs+wZfuiRo8K5y00bhapUcPGkyCwPL54dVFDOPaGqROLUG/XSP1EixLWFwhieq
Cdq4tS8GNp2J8FxhpLlRthoqm0OWtpO+YMP1koO8QI7HGBmv+Bc7OBR4n/v1oLyX
a+Ii6sj2NSSJCOKV/Mqmk6o/OQnmokzuRSCWW/7mCJq8SzTOgsu16hrkq1rDGHlz
QzAeQykeemHC5aptn8HXiWqO39/Qkgn2t3pza2xMKVMLjhjIWQLRpKvNbEwTrPOw
FGtRVH/rOpp5fUdfRLmLUvbV//ho/+zZM9Fb5oJ5mYuZAMUf5D06NuOU60kboZBU
28ieU84Q71TG7670l1bRfads3YXPF6kybhvwK5whDACH+FwpCunQkP2fUzxV9tpU
skKHdDPOk3DAi0JFJJWgEdLan3nxDwiy05NrtYf5Z6Ah/AjJ3C11bq2DBxms48Rp
4imLB4O8yyyW+1+5YUTWC96wnM08t8mCHSpiI7J9Y6ApmpljFiw=
=mUmb
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1885e111-740e-046c-068b-21a33264577d%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Test message, please ignore.

2018-10-23 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/22/18 11:10 PM, Zrubi wrote:
> This is the message.

..and a reply.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=PqsL
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9b1cc708-cb50-61f1-46d6-de9d3f860653%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Test message, please ignore.

2018-10-22 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

This is the message.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=uLQs
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2e6afe22-1260-1413-3575-5109f6c65676%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] nftables vs iptables

2018-10-02 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/1/18 11:48 PM, mfreemon wrote:
> What is the best practice recommendation on this (for R4, Fedora
> 28 template)?  Are we to be using, exclusively, nftables in R4?

The intended benefit was that in case of nftables qubes firewall not
needed to be reloaded all the time.

But: until nftables is not a complete iptables replacement, Qubes is
still needs iptables too.

My personal opinion that this mixed setup causing more confusion, and
do not provide any real benefits at all.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=vNfP
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9e016ed-3066-e219-6d9a-4837fe7f50ee%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes SIEM Using SOF-ELK

2018-09-20 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 9/12/18 11:26 PM, jonbrownmaste...@gmail.com wrote:
> I do not currently have hardware that supports Qubes, but I was
> wondering if anyone that does would consider checking out Sof-ELK?
> This is a really cool SIEM that would be useful to track all
> network traffic coming and going between your VMs.
> 
> SOF-ELK® is a “big data analytics” platform focused on the typical
> needs of computer forensic investigators/analysts and information
> security operations personnel. The platform is a customized build
> of the open source ELK stack, consisting of the Elasticsearch
> storage and search engine, Logstash ingest and enrichment system,
> and the Kibana dashboard frontend. With a significant amount of
> customization and ongoing development, SOF-ELK® users can avoid the
> typically long and involved setup process the ELK stack requires.
> Instead, they can simply download the pre-built and ready-to-use
> SOF-ELK® virtual appliance that consumes various source data types
> (numerous log types as well as NetFlow), parsing out the most
> critical data and visualizing it on several stock dashboards.
> Advanced users can build visualizations the suit their own
> investigative or operational requirements, optionally contributing
> those back to the primary code repository.
> 
> 
> But if you send the Qubes logs via one of the supported pathways
> (syslog, RELP, Beats, at-rest files loaded to the filesystem), you
> could write (and PR!) parsers for those log formats to take
> advantage of this system.
> 
> https://github.com/philhagen/sof-elk
> 

The problem with those SIEM tools that they require a huge amount of
resources just to start the "framework", and then comes the data itself.
..

In Qubes we would need a solution requires low resources.

I have a home project:
http://zrubi.hu/en/2017/siem-at-home/

Where the goal is the same as it would inside Qubes:
a much less resource hungry SIEM (like) solution.

Currently the log collecting, parsing (and a very basic web based
interface with graphs) are working on my NAS which has only 512 Mb of
RAM. :)

As the Qubes internal network is very similar to a home LAN, it would
be easy to implement it inside a Qubes VM.

I also made a PoC about an IDS inside Qubes:
http://zrubi.hu/en/2017/traffic-analysis-qubes/
which can be a good log source candidate.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=vO1o
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77f1df48-a3a2-df3b-0604-8ff654344f64%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Gaming with qubes

2018-09-20 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 9/14/18 7:34 PM, card...@cypher.fi wrote:
> Hey. I recently built new pc with Asus PRIME Z370-P, i7-8700k and
> gtx 1060. I care about privacy and security, but i would also like
> to game (mainly rainbow six siege and pubg). Is my hardware even
> compatible? Is it possible to game in windows 10 vm without
> sacrificing performance too much? If someone has done this please
> post your experience and tutorial. Thanks in advance.
> 

What the others describing is the ideal way:

Passing the VGA to a VM, using PCI Passthrough
It is supported by Xen itself, but not trivial to achieve in Qubes.
Moreover, your GTX 1060 will not work out of the box, thanks to nVidia.

So it might be a nice challenge to try to make it work, but this is
not the way if you just want to play games AND use Qubes ;)


The "easy way" is:
dual booting your machine.
Hence you need to sacrifice from security provided by Qubes.
And of course not so convenient to reboot several times.

aaand even if you dual boot, you will need to use your IGP for Qubes,
and the GTX for Windows. Which may involving some kind of BIOS profile
switching, and/or blacklisting the noveau driver in Qubes.

You can also make your life easier if you using separate disks for
Qubes and Windows...

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=3GDu
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6322cdc1-c161-8f91-7954-89b892f99716%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Offtopic :: reasonable secure routers?

2018-04-12 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 04/12/2018 08:01 AM, 799 wrote:

> having a reasonable secure OS and maybe some additional freedom by
> using Coreboot is great, but might not be enough.
> 
> At least in Germany most home routers are not owned by the users
> but the internet providers, even worse it ia often not possible to
> upgrade the software as a user.

If the ISP provided router is a combined modem + router device: You
may able to setup it as a modem only (bridge mode) and use your own
router.

If the ISP providing a separate (cable) modem and router: You may be
able to simply replace the router with your own one.

If your connection is some legacy PPPoE one, line ISDN, ADSL, etc Your
private router can handle that for sure.

As a last resort: just put your router between the ISP provided device
and your real LAN.


> If I want to improve this situation, what do you think about
> librecmc (https://librecmc.org/faq.html), I have come across by
> accident?

In my case the ISP router is working as a cable modem only, and I'm
using LEDE/OpenWRT on my routers and WiFi ACs.


AFAIR the librecmc is just jet another fork of LEDE/OpenWRT.
and they promise to removing non-free parts.

In my opinion non-free is a legal definition, and there is no direct
relation to security and/or privacy.


If you really care, you may build your own firmware, and then you can
decide what to include...


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=ffYb
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8046b4d2-b57a-d273-a905-51a69ab29231%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] network issues on R4.0

2018-04-03 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 04/02/2018 09:19 AM, yon...@gmail.com wrote:
> I have multiple issue regarding network with R4.0
> 
> The main issue is that net-vm crashes after a long sleep. It
> doesn't happen 100% of the time but many times coming back from
> sleep it will be completely unresponsive and will have to be
> killed.
> 
> Other times it will be responsive but will not be able to access
> the wifi card unless rebooted.
> 
> On top of all that if I change the network of a running disp vm to
> none and than back to sys-firewall it will not be able to access
> the network. so if I have a running disposable VMs when net-vm
> needs a restart they will not be able to access the network after
> the restart
> 

You probably have hit by several bugs, including this one:
https://github.com/QubesOS/qubes-issues/issues/3657


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=7y7s
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e8b01b5-3a31-708d-5929-efea93b75f2b%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Cannot load R4.0 installer: "Not asking for VNC because we don't have a network"; " X startup failed[Xorg:12xx]."

2018-03-29 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 03/29/2018 09:07 PM, 'Tuq Sagago' via qubes-users wrote:
> Asus GL553VD

That thing is designed for games.
Means it's works with windows only - at the moment.

Your only hope if you can disable that nVidia thing in your BIOS, and
boot up using the integrated VGA.

in general:
Optimus was never* working under Linux.
nVidia 10xx cards are working only with the binary drivers.


* Back in time, there was a project called: Bumblebee.
But that is dead for ages.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=DdvF
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0c504fd1-c3c5-0432-5637-e65925210130%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is Template concept unique to Qubes?

2018-03-25 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 03/26/2018 05:08 AM, franco.g...@tutamail.com wrote:
> Security considerations aside, it's so convenient having shared
> root filesystems that can be updated once for multiple child-VMs.
> Is this feature unique to Qubes or is something like this often
> replicated when using other hypervisor systems?

VMware using similar solution for handling snapshots, and
non-persistent disk images. VMware VDI also using this for
provisioning new (disposable) desktops.

Don't know about the others.



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=PVM2
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/15a37a8c-35c0-3a03-dd2d-9b15c2f36b7c%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: [Q4-rc5] Custom VPN/ProxyVM problem. Please, help

2018-03-21 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 03/21/2018 04:56 PM, evastar via qubes-users wrote:
> I do another research. After clean reboot I tried to change 
> "networking"-vm to another one for my AppVM-client from Qube
> Manager. Without success. After I do this I loss my network at
> App-client and I do not know how to fix it, because if I manually
> change "networking"-vm again to the first one I still not have
> network. Only reboot of AppVM-client helps.

Seems you are hit by this bug:
https://github.com/QubesOS/qubes-issues/issues/3657

please check your kernels, and report back.
Thanks.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=GI08
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ba956ed6-4429-b3dc-f36a-0f7fce76800c%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Netvm reassignment blocks network traffic - 4.0rc4

2018-03-02 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 03/02/2018 06:19 AM, 'awokd' via qubes-users wrote:
> On Fri, March 2, 2018 5:04 am, Chris Laprise wrote:
>> Whenever I try to assign a running appVM to a different (running)
>> netVM, networking always becomes blocked. I have to restart the
>> appVM in order for networking to work with the new netVM and
>> to do that I have to kill the appVM first because it won't
>> shutdown after reassignment.
>> 
>> I think this may be a bug. Specifics don't seem to matter, the
>> VMs can be plain firewall or vpn, debian or fedora on either
>> side.
> 
> Sure it's not a feature? I could see opportunities for leaks to
> happen if the firewall ruleset gets swapped out live, depending on
> ifdown/up etc. sequence.


No it is a Xen related bug in the kernel version newer than 4.14.12
As I reported here:

https://groups.google.com/d/msgid/qubes-devel/05031ade-b019-986e-e378-32
cc8fff916e%40zrubi.hu



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=NDyY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f787690a-67fc-2d6f-ac14-9a0f19866767%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes in a corporate network behind HTTP proxy

2018-03-02 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 02/24/2018 01:26 PM, 'awokd' via qubes-users wrote:

> I'm attempting to convert the above into a Qubes doc 
> (https://github.com/awokd/qubes-doc/blob/transproxy/configuration/tran
sparent-proxy.md)
>
> 
but don't have a Squid proxy to test against.
> 
> For anyone who does (or is familiar with how they work): A) Does it
> look right? B) In step 3, adding apt/dnf proxy settings to all
> AppVMs based on the same template as the UpdateVM's seems a bit
> broad. Is there a way to fine-tune it? C) Any special R4.0
> considerations?


Well the biggest issue that if you have a transparent proxy that means
you do not need any configuration about the proxy. That why it is
TRANSPARENT.

So it seems your corporate have normal proxies, not transparent ones.
So the title (and the usage of the term: "transparent proxy") is
misleading.

Beside from that it is a good collection of all the possible proxy
settings locations.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=4Qhq
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/89477a12-a979-a273-a369-83ba2c8336d4%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] For community by community - A way to preserve/focus everyones work going into Qubes, bottom-up

2018-03-01 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 02/28/2018 09:39 PM, Yuraeitha wrote:
> 
> It seems from time to time that various people have shared a good
> unofficial script, guides and 'how to's', and even code, for Qubes
> related content, on their github page or similar. The problem
> however is that while shared, it isn't very visible, and even if
> they are from time to time mentioned in a mail thread, it quickly
> gets buried under many new mails. It often isn't feasible to use
> the search engine to find these either.
> 
> Of course everything could be put into the Qubes doc page. But
> first, it's getting pretty large and cluttered and will probably
> only grow bigger. Second, the Qubes doc page does not show on-going
> and un-finished work. The strength of seeing unfinished projects,
> is that we can help each others finish and test them. Scrutinize
> them for security issues and reliability issues, before they are
> considered for the Qubes doc page.
> 
> To solve an issue like this, it'd be helpful to have a place where
> we can keep track of everyone's projects which are shared for
> others to use. It may also be worth discussing on quality and
> security, and how we "censor"? bad scripts/guides/code. It could be
> done in many various of different ways, which is also why I think
> it'd make sense to open a discussion on the matter, so we can find
> the most preferred method. First though, a location might be ideal
> starting place, where to keep everything updated?
> 
> Initial thoughts - A https://www.qubes-os.org/doc/ page listing all
> the unofficial projects. The most simple and easy way.

Have you seen this page:
https://www.qubes-os.org/qubes-issues/



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=+Zw+
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e93fc79c-5aad-d190-c32e-82e85d664d6a%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Strange error: mouse can no longer select anything

2018-02-12 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 02/12/2018 09:44 AM, Yuraeitha wrote:
> I switch/add/remove extra monitors daily, sometimes even multiple
> of times daily, at least for my part, I've never encountered this
> issue, not even once. For the record, I use Qubes 4 as well, since
> RC-2.

Asked because I have similar issue (using R3.2), caused by wrong
monitor layout definitions. Means the actual window placed out of the
screen known by the affected VM.

The resolution is to run this script manually from dom0:
qubes-monitor-layout-notify


- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEw39Thm3rBIO+xeXXGjNaC1SPN2QFAlqBe5wACgkQGjNaC1SP
N2Rj3A/+JPtUCv34nE68rdDuI7Zua9IWgYz0rbDl8F+RBqduvbfJq4cPX/KEZ93P
06YislJjFRy4t0f5UYLExrWvhHlkYYGuA8jCLC5oHOFGkubafC4Ip47paWDdqtJW
g01nD6xXi4yqzS4fKXpr3JYLvn3Q7VUfubiIDdRXssd2UGwKDN1V8gUDYUkRFIaz
7rTzPnkpAyCddPkJNzkMisLrMP2VS94djQq5Xof8dbX7IlszTVwejpJES+DzFYiH
kBcZ584p+gOeoD64iZ9eAon6y8qZaBCTsEm1f1PEbIaUViBxeKT8mieQgVO04N12
RSdPj7BNMBXpJSHieHFzI/EApfKmCFyv19/GhIqNeYgz1gcXhKs/cZJ1J/8iYX/H
8TZqPAD75I/XNPZOscIxY6m4Nfuq/RwxB5vufvlX11jWhyKvey4lKDMupkBKUaA5
4u7HMbWWITGSjB0VH4i2Sl9r140ihjTtBGpkr/kEQAenz0BoF26S77fsiV7AH1Ep
dBOxEX0QtdZU3VwKGTTQi4f1/OVK3TZC91KvBOqbTYJbB1pB+HQi08LGzqLGbhap
q+WoP8JRk2qKFw3/FvDxjzsYqu0RmC/oGSYYFIORp5ZnTJ5zbiE48Pwl5uLfCOEU
E03xPt+T9BBGoQs1bVeE7wD0y3TJLoxdxPHet4TnUCtq7bqHXl8=
=u6WG
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/efbc8091-8f69-49b2-17e3-64ae14916cf0%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Strange error: mouse can no longer select anything

2018-02-12 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 02/11/2018 05:38 PM, Devin T. Theriot-Orr wrote:
> I've been using Qubes3.2 for about 6 months as my primary machine.
> Some time recently, perhaps in the last month, I've started to
> experience a rather deadly usability problem where the mouse will
> no longer select anything. Everything else works, I can move the
> mouse, I can change windows using the keyboard, type, etc. But
> clicking with the mouse does not work. Only solution I've figured
> out is to reboot the whole machine.
> 
> I don't know if there's any solution other than reinstalling, but
> if anyone has ideas, I'd love to hear it.

Is this issue can be related to multiple monitor setup changes (for
example attaching/detaching external monitors) by any chance?


- -- 
Zrubi
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEw39Thm3rBIO+xeXXGjNaC1SPN2QFAlqBTmcACgkQGjNaC1SP
N2TJ3BAAm2ERFkyq+EuqLeDnZrh85gctYu70B0+rK+MnAKsOMzvL2Y7H2y/QBwQC
FW87SqQsYs0lgc9nKzxFpoKsEUtfDxPXbAQJw27GNZyNpxgfQ/bixjUzjCmydkD/
nNAcUjeTdJnx+uLjGUI6zkPAtdZh1mYgyciCh6avlFg6PevxkVp2kFxT7CW2gDN1
vrFNFH+QtplMFQB/uwSUR2EwILZCDSkcWvPesRMRrKkcdouJs8mwFqroIavjK+KQ
G2Xhut2/+hA/F4xDKyYep4WzPRrwMa8WzgqAht2mIXchECp5cnqd1dt745FNSRB+
jVGLW9uM3ZMhGXTPCdwxEzHdmWCwErfQ2V8mqBsBjZ92vXaydLbeve05ntK6aK1U
2hPDIoHriu63jvVLO8PowDApmNALpuZXb9/LcIaFy2TFwxxMqnhhSAIVygWPZ9o4
J1wBLQFdE8Xh0xrncELRD4o5D5CZFTGKVKmc9Cc9ZcVxfYGSw4CecCzGRVz8NkO1
PzJo9wrccGxRjErWe1x9xGmLvjplgnIYulQ7N1SH44zU4S59TCOa+9ZuJ5dOUqcX
u1va8IfAETaDIb41hswfq2bLVjtPV7TvVZts3lcmCbLVJF9urCszx7B8uTuyp3K1
o1cjcBqqhx+gEMoaERtzy9IrNf2O5mvf9/X81o+deZb3MO/Ud58=
=Tpo0
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/35d4cbdf-9579-f907-77ee-b8e5eb4ce46c%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Troubleshooting IOMMU compatibility

2018-01-17 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 01/17/2018 01:58 AM, jspiegelm...@airmail.cc wrote:
> so I'm wondering how to troubleshoot it and see if it's just an 
> improper configuration by the motherboard manufacturers that can
> be fixed in some way.
> 

The only way is to ask your device manufacturer.
As the proper IOMMU support is depends on :
- - CPU
- - motherboard chipset
- - BIOS

all of those are just a "black box" for us.


(I have seen some cheap devices where the BIOS was hiding the
virtualization features intentionally)


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=o5/W
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f8d4a276-e41a-714f-4e7b-da6f2a960be9%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [qubes-devel] Qubes Controller as the new Qubes-Manager

2018-01-05 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 01/03/2018 10:09 PM, 'Tom Zander' via qubes-devel wrote:
> Hi guys,
> 
> during my Christmas holiday I spent more time to get myself a
> decent GUI tool in order to replace the Qubes Manager from the 3.x
> release. As I promised some weeks ago, today I released the tool as
> free/open source software and I have received some positive signs
> that the Qubes devs may ship packages in a future release.

> I'll attach two sceenshots of the tool, to give you a bit of an
> idea of what it already does and maybe if its worth your time to
> compile :)


Probably this is very subjective, but:
For me, the most important parts/feature of the current Qubes Manager
are (in order of importance):

- - Full overview of the state of the VMs in ONE screen, without clicking.
The new widget is failing on this badly, just as your proposal.


- - Changing the NetVM of a given VM.
Mainly because I always starting DispVMs without net access.
And even the current solution is far from comfortable:
(VM settings -> NetVM selection -> OK
instead of a simple "oneclick" NetVM selection)

- - Starting programs from a given VM.
Yes the "start menu" is nice, but sometime it is just more powerful to
type directly what I want. Especially on an already started dispVM

- - start/stop VMs

- - attaching/detaching devices.

- - reading VM logs.


Probably these are only my personal preferences. Hence I have no time
to write a new manager for the Qubes 4.x I just shared my use case.
Feel free to ignore them if you don't like 'em ;)

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJaUA23AAoJEBozWgtUjzdkZ9IP/32ydmOQ28Y2DkIMHXU131Gs
Vjk5dnhZ77kAwKA6vDKrfXaCyKA5ut07dSnzPkcunjz0GArIeGG35UJNL4A0/EX4
FYd2cDYRa1tDF/PUcny2BukFBeUI37HjK+nwuQtjGkcQ2mYNLSTV1k2Y40NJ6NJi
LWntV3u+VcrxF7i1pzsI1aq6cyAK06ZfsZepxxh6zwDqoSZsmKaFKDMjbyqEBUSg
cs2luM75j+4MbcCTxYnAPve2D0Kk2vSQ8s7Egh/S+GVDBmJu0wyaVmdVOds8W7SJ
R8FPs8/I5/M+13eqkcALwAz7Q1BfT5rD7/3+/H8sOIWvNqU0RDhq87ZjVINpb43t
leimmZMLDSYZMsui1/ihhp6llmHRzx9aWskmJHp90csUHN3F142bArjqMXjVEdKn
00mi/cgqcCB8e8Di6hZbCFWibAUyaZnsJ2Ss2kIVLjUoINSBjd52fN6U9DdIlgsk
69GrQaCcOyfOjiv4VYZKZpUDSEgHZWScWECEe7PlPR73DGRBY5L49KPSqpzUJgIG
a2bP0sMTqYqykhZ+/7IH5BqEq4m5CgGVZCTXC0pYwJ6jd7L6VcanXayeHaLf3lis
35oxKOiEk2Lit2bEj8f3sfdBp0kl46rikKpzWORp9pvrg8xU4N/YveA0lzDR5Q4J
wE/hkPkuAe3s9Srwj3SU
=E+5l
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/32e96efa-8650-2f48-04da-2b78e83074ad%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to copy-paste into Terminal from global clipboard?

2017-12-07 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/07/2017 10:15 AM, Bernhard wrote:

> To insert into a terminal Ctrl-Shift-v and "middle mouse" to drop
> works as well. The question is rather how to copy "out of" a
> terminal (say a link that is to be put in a dispvm browser). Here
> the marking by mouse and Ctrl-Shift-c does *not* work. One has to
> mark it first, then go to the terminal menu, ask "copy" there and
> then do Ctrl-Shift-c. This is annoying. Someone has a shortcut for
> that?

Ctrl+Instert will do the copy task in most terminals.
(Of course you can also reassign these defaults according to your needs)



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=7jA7
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5671d7e0-d908-1813-b506-9ca3fad43993%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] What happened to domain manager in 4?

2017-12-07 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/07/2017 04:56 AM, mikihonz...@gmail.com wrote:

> I stopped using qubes because my use case depends on it.

> Loved 3.2 A truly great software.

3.2 is the STABLE version of Qubes.
And it will be supported for a full year AFTER the 4.0 release.

So there is no point to bury it because of a missing feature in the
latest release candidate...

Saying it while I'm also think that removing the Qubes Manager was a
big mistake. Thant new thing in the info bar is buggy and useless in
my use case too.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJaKP30AAoJEBozWgtUjzdkr+cP/RY1dsagzFpv3proaAaQ8VWu
tS6kfiVP5zxOBKY5sAKbY6H960OGfAvMWUm0HrRafeIawYQ/9MW8LnQ+boMdOdD+
t8A1yGqyheb+rqgbFWX01QnCqjtENubibYQkYhGYUdjZzvpk/SM9YX188yqCQnsh
7tZJmozfHgGaM43o1x4I7NOxAEC4rwamv7fsKV616RjyAX4iXMdY945RTBa2x3ir
gawdcsZQ7JMMFavTd5bwD3Edq1YJ2BS1S/5ATtDLubNXo2EunlyT3kJ8t16EIfS3
RVmTzu7d+WdtvNDNh2bLxMwQ77vO9F2HtvQ5NCS8LQlDLKsPhzdk3uPneJBi/N2/
hGn5oAdKdskjzNgu/i+edK2SEOjCFj8jcSoRHH46N2XQ1jL4x6XE0t1o2M53ypEJ
5Yo4nZom4O/f5wLyr+uKFau8cb2Md7UEAhv+9cGNeZzF4Q96Wka3eIjiDhERKi+H
T/u4CfX0U/2fGCNVs6kLbBL4nliRCmP6J5UDwUewISpfRJ7kC5fVnptxZhY4uVmx
sZ07QvyWki2pG8oGP1WyIx5JT91KNbE2RiNjzUo0y0CnxQtZCPoOIxwUHEBipQE2
IqJwZGLpd85PPoE9pNwUhFcViLcnd+VJAaLjWxkpk9R1l/U/ztkx704Dm4Dk7PM9
KcDKAkruk247e98XsU9c
=NelY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6fcc4e32-0381-bf9c-48eb-7c1e7f97%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to copy-paste into Terminal from global clipboard?

2017-12-07 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/07/2017 07:33 AM, Nik H wrote:
> This may be a silly question but I've been unable to figure it out:
> I quite often want to paste something from a browser into a
> Terminal in a different vm.
> 
> Global, secure copy / paste is Ctrl-Shift-c / Ctrl-Shift-v
> 
> In a Terminal window, these shortcuts are mapped to normal copy
> paste, rather than inter-vm copy pasting so it doesn't work out of
> the box.

Shift-Insert is the "magic key" you searching for ;)


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=eY4w
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a6b62101-4907-ff81-24b4-c07e590eb0a5%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Baffled About Passphrases

2017-11-16 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 11/16/2017 08:01 AM, Ron Allen Smith wrote:
> Hi,
> 
> I'm new to Qubes/Linux and would like to know how to
> change/add/remove passphrases applied to the USB I installed Qubes
> 3.2 on. I looked around at Qubes FAQs and elsewhere, which was
> helpful, but not giving a step-by-step of what to do.
> 
> [user@untrusted ~]$ lsblk NAME   MAJ:MIN RM  SIZE RO TYPE
> MOUNTPOINT xvdc   202:32   1 11.5G  0 disk ├─xvdc2202:34
> 1 10.5G  0 part │ └─dmroot 253:00   10G  0 dm   / └─xvdc1
> 202:33   11G  0 part [SWAP] xvda   202:01   10G  1
> disk └─dmroot   253:00   10G  0 dm   / xvdd   202:48   1
> 500M  1 disk /usr/lib/modules/4.9.56-21.pvops.qubes.x86_64 xvdb
> 202:16   12G  0 disk /rw
> 
> Although I selected default encryption during the Qubes install, I
> can't determine whether or not enryption is actually set.
> 
> I also looked at 'man cryptsetup', but unsure of how to use it, or
> even if I should use it.
> 
> Can anyone set me on the right path?
> 

https://wiki.archlinux.org/index.php/Dm-crypt/Device_encryption#Cryptset
up_actions_specific_for_LUKS

https://unix.stackexchange.com/questions/252672/how-do-i-change-a-luks-p
assword

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=f8MO
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4fde44df-7c27-2099-516a-edde9e6c697d%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Relation between increasing RAM and the increased need for display memory

2017-11-13 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 11/11/2017 04:22 PM, @LeeteqXV (Twitter & Mastodon.technology) wrote:
> Ref. "(maybe if you using Compiz with fancy desktop effects) "
> 
> For me, the desktop environment affects my well-being and mood
> very much, so yes some of such "effects" are important, both for
> efficiency and for the general good feeling when working etc.,, not
> the fancy part.
> 
> I prefer to have 12+ viewports/workspaces, each with its own name
> and background image, so I can associate specific
> tasks/applications to each one, plus with a wrap-around function to
> navigate beyond the borders. I use Compiz for this on Ubuntu, and
> fortunately all of the above is possible in Qubes without any extra
> tools.
> 
> Compiz provides customized window transparency so that when I
> write, I arrange for good (text++) contrast towards the nice
> background image on each desktop, on a per-window basis. I use
> Alt+[numeric"+"] and Alt-[numeric"-"] keyboard shortcuts to
> increase/decrease the transparency on the active window. (Not sure
> if this is possible in Qubes out-of-the-box?)
> 
> With this as the background (all done outside of the VMs), along
> with the initially mentioned points about increasing use of
> one-app-vms, are you saying that we can basically just keep upping
> the RAM without worrying about the potential need for increased
> display memory?

I used those effects as well. So yes, I would still say you do not
have to worry about your video RAM.


> I would like to know what are the minimum requirements for the
> graphics card in this respect, for "both ends of the spectre", so
> to speak;

My experience is that you can't have any Qubes compatible hardware
that is not enough for any kind of fancy compiz effects. Mainly
because the VGA is integrated into the CPU package (most of the
systems nowadays). You may have to increase the default assigned video
RAM in BIOS, but that's all.

> a) ~16GB RAM, which is getting increasingly possible with
> sub-€1000 laptops (just for the perspective on the limits). b)
> >32GB RAM, for the high-end computers.
> 
> Will it be possible to use a (compatible) laptop in the sub-€1000
> range as long as it has enough RAM, or should one also verify that
> the display card meet some kind of minimum specifications (for the
> scenario where we are going to run a LOT of VMs, only limited by
> the available RAM)?

See my note above.


> + How is this different with Qubes 4.x compared to 3.2?

Nothing changed about VGA.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=h9IP
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f871941b-dc09-7393-bc13-cb0de47306e1%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Relation between increasing RAM and the increased need for display memory

2017-09-28 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 09/21/2017 08:47 PM, Teqleez wrote:
> Hi all.
> 
> I assume this is relevant not only for considerations related to
> the practical limit/benefit of increasing RAM in existing
> computers, but also regarding the specifications when buying new
> computers.
> 
> - At the following amounts of RAM; 8GB -> 16GB -> 24GB -> 32GB ->
> 48GB -> 64GB, how much does the requirements for the graphics card
> memory increase with each step, if we assume the
> normal/daily/"permanent" usage to be 70-80% of the available RAM?
> 
> This obviously depends on how many different VM's one has open, and
> how much video memory each one needs, but can we make an assumption
> on some sort of average number for this, to see if it is possible
> to find some kind of rule-of-thumb figures?
> 
> For example, if we assume a "normal"(?!?) Qubes-OS user whose sole 
> reason for increasing memory is in fact to be able to run more
> Qubes simultaneously; how many more Qubes can he/she expect to be
> running per extra 8gb of RAM, and how much more will each such step
> "typically" require of the graphics card memory, if we assume a
> "linear" growth in the number of concurrently open Qubes?
> 
> I am guessing that with the capacity to run (increasingly) many
> Qubes, the amount of applications running in each one will be
> lower, to the point where we most often choose to run
> "one-app-qubes". For the sake of this example we could also assume
> that this example user is a "lazy" person who will not bother
> configuring minimal templates, but only use the default shipped
> fedora-24(++) template for each one, just for the sake of
> simplicity and playing around with these numbers a bit.
> 

IMHO there is no real connection between RAM used by the OS and apps,
a and the RAM ins your VGA. (VRAM)

VRAM is used for:
- - game (3D) data rendering, which is out of scope in case of Qubes
(maybe if you using Compiz with fancy desktop effects)

- - display rendering.

The later is still need more and more VRAM because of the bigger and
bigger common resolutions Like:
800x600 -> 1024x768 -> 1920x1080 -> 2560x1080 -> 4K -> 8K -> etc.

So you still need more and more VRAM to render all your pixels in your
screens. These can be multiplied if you start using multi-monitor setups
.

But these needs are not growing as fast as your conventional RAM needs.
I'm using 3xHD screens, and the 512Mb VRAM used by the integrated VGA
is still enough for that,  while my OS has 16Gb RAM.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJZzM+6AAoJEBozWgtUjzdkzbUQAMuN8HsuXf5YeKERJ8pubew9
5bzQIbv7bffzF0O7w4VndyxF28jE49KLjBkFf6siInOgL4SbG2SQVPP/lyHZG2kq
9rlCu0294ICHU7ASDOfnuQx+6IPJZdUGTXb2tt0r3OlY418Gdj/cHNIT5Ul1j/DW
nGpvKUNQzVzmV0Bl43KlKD4ZwBh1+Xz5AgfI21E2GGKiwpMMKWEGy6ZYmSoe7Opu
0LC/MHWABnQtNwNcGsXyZ6K0BhakuT3va32x4aQC7d2e60iJjvxHaLP+WEFEVSDd
LpbEPQVWA1+LJ4eOC5xmT0LkKCxeBezU2zOk+ZCP0jVcgwS7VecMQchuKUViNBEe
Lgx3BBSb39ZXZb89zwK6y+3nDb81Ewuq95d2i3PnCU72SJi9Z4Uhu5m2xVVYNNf8
eHk+dChrGp7QZ51bHNl4sdDsVGiWC6c7/Vf7LAeL5WBQi6hgeASvoTBWEOsHSgPj
PjTHXw0R3IXrLyfzajLmc51UMh9zn67pstI5y/6KjX89Bv9h38kXg5DnIxNDbxjD
FX0MJAECd2e4y3NOIclPVa8dY1m5nMgo4H4GbPXvF2mXsi1kY/CzTY/zT7/R0HaM
ufXupUY+Hnlv/v+QRlTob+d38H7eLeHf5wqmgIxSrQnsDSqc5HeprMjzQOCNvnaB
dW9yigS7udjNfVDjVbi1
=fVJ+
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/085fcd85-f38c-6522-69ae-cb4e57d070d5%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Lenovo X230 - List of USB-Ports and USB-Controllers (Layout)

2017-09-07 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 09/07/2017 07:07 PM, 'PhR' via qubes-users wrote:
> One question: why the first USB-Controller doesn't seem to connect
> any USB-devices/-ports.
> 
> I have attached each of the 3 USB-Controllers to my sys-usb AppVM
> and then looked up which USB-devices are recognized ('lsusb' in
> sys-net) and tested out which USB-Ports work.
> 
> Any idea what is happening with the first Controller?

Probably it is connected to the optional docking station, and it's ports
.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=dZCe
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/60f06b61-0e78-a0af-cb6e-c0ee15c64310%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] GPU is deal-breaker

2017-08-22 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/22/2017 10:18 AM, cdgam...@gmail.com wrote:

> Summary: Deal-breaker probably is down to getting VLC working
> properly
> 

did you tried to switch video output?
I would start with X11 instead of automatic.



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=OzTG
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b1b7152b-7e85-dc3d-b76f-566b2ebdae81%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] usb qube with one of two usb buses?

2017-08-21 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/20/2017 08:52 AM, pixel fairy wrote:
> im on a desktop with 2 usb buses. is it possible to make a usb qube
> with one of those controllers and leave the other one in dom0 for
> the keyboard and mouse?
> 

Yes, but:
- - you have to find out which physical USB "connector" attached to
which PCI device. (It is mainboard specific) Then you can decide which
should be remain in dom0.

- - you have to remove the "rd.qubes.hide_all_usb" from the GRUB cmd line.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=VO6Z
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f387cd5-94ba-f877-6121-d9852acd1ced%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Problem installing Qubes on Lenovo Thinkpad T450s

2017-08-09 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/08/2017 02:44 PM, Janik Besendorf wrote:
> Hi,
> 
> I tried 4.0 today and that worked. But I dont think that I want to
> use the RC on my productive system. I attached my UEFI settings in
> the mail.

With this setting, you should be ebale to install/use Qubes 3.2 as well.
As I have this setup too.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=LO29
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe84058c-0eaa-f3a0-2c18-03c7e881aa99%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Problem installing Qubes on Lenovo Thinkpad T450s

2017-08-08 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/07/2017 06:16 PM, Janik Besendorf wrote:
> Hi,
> 
> I have a T450s and followed the instructions here 
> https://www.qubes-os.org/doc/thinkpad-troubleshooting/ for the
> UEFI options but when I select "Install Qubes" in the bootmanager
> the installer start loading image files but then reboots the
> laptop.
> 
> A friend of my once had the same problem with a T450 and told me
> that he needed an older kernel in order to install Qubes. Does
> anyone know more about that?

I have a T450 and I can install and run every Qubes OS release.
Including the latest 4.0-rc1.

All you have to do is disable UEFI boot, and set "legacy boot only" in
BIOS.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=DUlr
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/401a7ee8-2934-8fe4-5e10-77737351a678%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-04 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/04/2017 02:20 PM, Marek Marczykowski-Górecki wrote:
> On Fri, Aug 04, 2017 at 01:12:29PM +0200, Zrubi wrote:

>> Can't see the networking stuff. The most important is (at least
>> for me) the actual NetVM used by a Qube.
> 
> So, you switch netvm for VMs frequently? Doesn't it mean you should
> have separate VMs, instead of switching one between two (or more)
> networks?

No.
I'm using separate WiFi, and Ethernet VM's, I have several VPN proxy
VM's as well, my dispVM start without net access. And need to use/test
lot of things with different network exits.


> Anyway, adding such information to domains widget shouldn't be a
> big problem. Just don't show it by default (see reasoning why
> dropping old manager, in announcement post).

I do not really agree with the reasoning tho.
But if it would be customizable? - just like the old Qubes manager ;)


> The main reason for nftables is to simplify custom scripts. If you 
> have nftables, qubes-firewall no longer flush standard tables - it 
> register its own. This means you don't need to re-apply own rules
> every time qubes-firewall change something. And you can register
> own tables before or after qubes-firewall. And in theory you can
> still use iptables for your custom rules.

Let's talk about these in a separate thread or ticket
Will collect my ideas and share it soon.

Currently even the basic networking looks unreliable, so I can't even
test my custom firewall rules...


>> But still feels like a bare naked login screen. IMHO this should
>> be just as important as the Qubes boot (splash) screen.
> 
> Which also have similar aesthetic. Do you think about just some
> better background there, or some bigger change?

A would say it's needs a bigger change.
But of course this is really subjective, and currently do not have
time to design a qubes related skin for the login manager :(

So this is just my (and my surroundings) opinion.
Handle with sustenance ;)


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=Qvvd
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e794e91b-8091-c31b-edfd-965fe3743744%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-04 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/03/2017 08:30 PM, Micah Lee wrote:
> The devices systray applet thing for me lists these devices:
> 
> sys-firewall:1-1 QEMU_QEMU_USB_Tablet_42

> 
> What is this qemu thing in sys-firewall?
Ihave the same issue, opened a ticket to track:
https://github.com/QubesOS/qubes-issues/issues/2969

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=+Lv7
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c678ef28-7573-d651-bd2a-3aa065c55785%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-04 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/01/2017 01:02 PM, Marek Marczykowski-Górecki wrote:
> On Tue, Aug 01, 2017 at 11:25:11AM +0200, Zrubi wrote:

>> - The isntall process is really long. Not debugged jet but
>> the creating initramfs seems to be running forever. But at least
>> was successfull at the end :)
> 
> Is it just about initramfs and "post installation tasks" - compared
> to the whole installation time? There may be some bug causing
> initramfs being generated twice (or more...) - I think I've fixed
> something like this before, but maybe not all the places.
Yes, this is the case.
But have no time to install it again and again to identify the root
cause :(


> 
>> - the missing Qubes Manager is a pain. - the 'replacement' in the
>> task bar is small and buggy: the tooltip? like thing is randomly
>> shirk to unusable. But too samll in general. I have 40 vm's right
>> now.
> 
> What do you mean by "randomly shirk to unusable"? Can you provide
> a screenshot?
#2970


> What do you mean? Domains widget is specifically there to show you 
> VM status.

Can't see the networking stuff.
The most important is (at least for me) the actual NetVM used by a Qube.


>> - the 'new' Qubes firewall solution causing more confusions. -
>> mixed iptables and nftables? why?
> 
> What do you mean by mixed? Setting for VMs are applied using
> nftables if supported (Fedora), or iptables when not (Debian). Not
> both.

the default "self defending rules" are Iptables based, the VM traffic
forwarding rules are nftables based.

Custom firewall scripts now have to handle both.
My opinion that there is no real need for nftables until it can really
replace iptables. We are using just a really few rules here and the VM
based chains achievable by iptables too.

BTW:
I plan to continue the L7 filtering thing I started to play with. Can
you point the related documentation - if any - or at least the VM side
code processing the Qubes firewall rules please?

>> - even if Allow is the default policy I see a DROP rule at the
>> end. Why? :o
> 
> To fail closed - if something goes wrong, there will be that DROP
> rule at the end anyway.

:)
It should be decided by the user, by selecting default policy.
IMHO Qubes should not try to override the user decisions.

>> - the default login screen is just ugly. I know that this is not
>> the first priority, and not even a technical issue. But new users
>> will see that ugly thing first. So it's should be a Qubes skinned
>> one. at least.
> 
> Hmm, I do see Qubes logo in the background there. Do you have
> something different?

Nope, I see the qubes backround. :)

But still feels like a bare naked login screen.
IMHO this should be just as important as the Qubes boot (splash) screen.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=zTfv
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bdecc032-8cf8-047d-6cd9-f02c42ee9c56%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Unable to install KDE desktop

2017-08-04 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/04/2017 01:18 AM, Marek Marczykowski-Górecki wrote:
> 
>> https://github.com/QubesOS/qubes-issues/issues/2921 appears to
>> track this issue.
> 
> Fixed, for both 3.2 and 4.0.


Thanks, the installation works as before:
https://www.qubes-os.org/doc/kde/

However, because of the tray-icon bugs (#2283, #2264, and manymore) it
is pretty unusable now.

The last templates where the tray icons are working:
F23, Debian8

Newer releases are showing transparent icons for most of the apps.

Moreover the new (Qubes related) devices tray icon coming from dom0 is
invisible too.



I know that nobody cares about KDE related bugs.
This is just a status report, to save hours for other users try to use
KDE :)

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=r8Jl
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/954298e7-278a-ec59-c7cc-18ccb3f2bb10%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 07/31/2017 01:43 PM, Marek Marczykowski-Górecki wrote:
> https://www.qubes-os.org/news/2017/07/31/qubes-40-rc1/

My Very First Impressions:

- - the "test this media & install Qubes" is hanging forever on my T450.
Before the graphical "qubes loader screen", I see some strange error
messages. Need to be fast to capture however. Was not lucky to get it.

- - The isntall process is really long.
Not debugged jet but the creating initramfs seems to be running forever.
But at least was successfull at the end :)

- - the missing Qubes Manager is a pain.
- - the 'replacement' in the task bar is small and buggy:
   the tooltip? like thing is randomly shirk to unusable. But too
samll in general. I have 40 vm's right now.

- - the vm setting windows is the old one, no new features are usable
from that GUI :(

- - memory balancing are enabled on PCI asigned VM's.

- - network manager applet is (still?) not show on first start.
need to restart the sys-net VM to shown.


- - still only 8 available colors for the VM's. :(((
Again: I have 40 of them.

- - no VM status GUI. :(
The old Qubes manager would be fine till a the new tools(?) not ready
for use.

- - the 'new' Qubes firewall solution causing more confusions.
  - mixed iptables and nftables? why?
  - the old GUI not allow to use the new features.
  - even if Allow is the default policy I see a DROP rule at the end.
  Why? :o

- - qubes-hcl-report is not included.
just tested it (the latest version from github) and it working with
4.0 out of the box.

- - no KDE group available
Maybe the same reason with the recent 3.2?
Probably I'm the last KDE user under Qubes - and I just started to
migrate to XFCE because of the unresolved issues with KDE since the
3.2 release. And see no progress in 4.0

So I would really appreciate some statement if Qubes will really drop
KDE support. I can accept that, but then I not waste my time trying to
make it work. Instead focusing to fix the XFCE issues I have ;)

- - the default login screen is just ugly. I know that this is not the
first priority, and not even a technical issue. But new users will see
that ugly thing first. So it's should be a Qubes skinned one. at least.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=qI1g
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/484fb9ea-9639-00e7-bfed-04170f22ac80%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Unable to install KDE desktop

2017-07-26 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 07/23/2017 10:25 PM, davaii...@gmail.com wrote:
> Hi,
> 
> Running the command "sudo qubes-dom0-update @kde-desktop-qubes" in
> dom0 returns the following error: "Warning: Group
> 'kde-desktop-qubes' does not exists."
> 
> Am I doing something wrong?

No, you are right.


Seems we just lost that group somewhere...
@Marek do you have any idea about what happened?


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=36TJ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/71860c21-5b4e-4fe0-44af-9025b1dbb2f9%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-devel] Re: [qubes-users] Re: Request for feedback: 4.9 Kernel

2017-06-29 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/29/2017 04:57 AM, Chris Laprise wrote:

> I noticed this, too. So reverting a dispVM's template back to 4.4 
> should fix it?

Yes - but this is a general kernel changing issue, not related to any
specific kernel version.

Workaround:
After changing the kernel, you need to regenerate DispVM
savefile.



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=ZBm4
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21fc2088-acb5-e2b8-a35c-7d290397cdf6%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How much inital and max memory for sys and template VMs?

2017-06-28 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/28/2017 02:18 PM, jakis2...@gmail.com wrote:
> looking at my memory on sys-firewall it has initial 500mb but max
> 3gb and its using 3gb which is eating up alot of space for other
> things. Whats the best setting for this?
> 

I give only:
- - 300Mb to net VMs
- - 300-512 to firewall VM's
and all are running fine.

The AppVMs are fine with 2048Mb - but surely depends on the apps you
want to start. (for example my USB VM are happy with only 512Mb of RAM)

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJZU6LMAAoJEH7adOMCkunmTpcP/Rv+DP+5gGqofm9nvn6ATD4r
491bUGe5jEjh03BTxazqHhUwImzFM6Lq/ZGQJyxq0X7Z92m9+DLWd/l934QGe90W
bgAOOeSRO8F4rMtfSGyesQXtv4ROtPEDUapL6pMPvRh3xixaaoG/WEeEWppcGWgM
pPyrhTYx/lKjf1JA5iR0C09Jvc16Ho1jZ+T6KteKqiMusuwd1jP1s1L2Bz1MPkBF
s19kVcmngTf4r3Apu1iQf+0ecRfazxFm+JTX+2Vgx26ffcDrRkHSNE5sSQVebWSp
SzTMRu0TYWBj92048ZD7efLWf93hL4Olo3Bt4XUmZ1gltRPUN6DqOgub+7qFJ9mO
BivxyiRvlsPDzlbPtUl/nh9KPII2R3hNol/nuE5R1yms3PyC+IdbRFIxgJWa4112
Jglt6IomVyTssS3CDqEL1xlO897sMxsGC1wEBm59oaD2uo8VVleRXklnRgMHZiHI
9RDExS+3FC9cRZhDzi3JHuY8OFx3a3oFABYWVW+fyP70gX41K8LVQ6eb6nQD9BUk
AFIIPVsZ/H1fplRjZMwQ74Rhejwy7pbn90HfJ/dcJJVfLIhuYSv8nBWT4oaRok4l
i9EkENaPauhZuJCGVlW6yEEH+YYY1IzTiahFLe7QHxy+0l9JhGyHWA2WFWKNXaP2
RNArYr9756HDE+cWItV8
=hYOC
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9c225c3-d280-756f-56e4-3d64b3905e34%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-devel] Re: [qubes-users] Re: Request for feedback: 4.9 Kernel

2017-06-19 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/18/2017 11:04 PM, Marek Marczykowski-Górecki wrote:

> Make sure you have up to date qubes-gui-agent (qubes-gui-vm). There
> were some issues recently affecting integrity of window content
> affecting F24 (or F25 - depending on gui-agent version ;) ).

Now I'm pretty sure I hit by bug describe in #1495


> After changing netvm for fedora-25-dvm you need to regenerate
> DispVM savefile.

FYI: that was the missing step. which is a general issue about
changing VM kernels, which is not 4.9 specific issue.


>>> i915.preliminary_hw_support=0


> I've seen some graphics issues (different than yours) on
> Broadwell-based hardware, on 4.9 kernel. Adding iommu=no-igfx to
> Xen cmdline helped. See here: 
> https://github.com/QubesOS/qubes-issues/issues/2836

Thanks, will try both xen and the mentioned kernel parameters.



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=dNg2
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7714d1a6-874d-16ab-bc23-55ef46672212%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Request for feedback: 4.9 Kernel

2017-06-15 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/15/2017 10:02 PM, Reg Tiangha wrote:
> On 06/15/2017 01:53 PM, Zrubi wrote:

>> Maybe it is a know issue, but: online netvm change on a
>> disposable VM is also broken on the latest 4.9 VM kernel. (Qubes
>> Manager shows it is changed, but not working in practice)
>> 
> I've *never* ever had this work for me (although it might have
> worked once in R3.0 or something old like that); I've always had to
> shut down the Disp VM first, alter the dvm template, and then start
> up a new one in order to change NetVMs.

well this is such a basic feature I would go crazy if that would not
work...

I'm using this feature from the beginning. And it was always working
in general. I remember for some broken kernel releases. But this
feature should work in general. As it is working with my setup, in
case of kernel VM 4.4 - but not in case of VM kernel 4.9


Do we already have any git issues about 4.9 and its currently known
problems?

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJZQvNTAAoJEH7adOMCkunm484P/inwOl/oiI4H/3wOyBc7bASj
tGws7IwJCIiIzfzFYk1yBncSI0bKkgIMR9r1PnYZ/UcW0P2Ixs6a6hYS553t8GpZ
Y9UJbNgfOUbicfozsO53YBaonyo6sapp/1juQ6NIHcTqlJzBkk5s/oKjYWfln0jB
9sn2pT+4fZSn2w0c10cTxSVYPGHmUh2aIeMhuqQPcckCiOmgl/Fqz07d3EA6JI3y
WZR3DOG8B0D1WXGnhcqSH3J5yqpPjaQ7QwWlcDNj9mFqqBAeRiQyRvgDxcyL6JXX
rjEmnnF+XE4ULa+eV2Cpz/p1Ws43ga0YOWCEi51Ie1JBQIABkN5ngdX2KjlOFjZn
NxLQ3ga6AK0q2hk8e9IjJUEus8cLjqSVTvXSpiqaQBO/eEsNWp2LqC63xnxpeiqE
2bDbrvMpqiHUZ2Qrqsx8M21tjngNLNI4og2LipJTMQD6X01qgJBw8+J8EQePdn+E
hsdRetkXjPY7afEtky+Qp5Z3lHQOEz1XEbvjVRRZpFEIFB1WcWXvY8QVqDkugPi2
zXQBgJcr5fqqXMkk6JjDdVCaRieS6UtbPT6An9Ih0jZN+5mCXbax0eLPvWrSa+mT
Zc8bsCoj6l7+EDyo9kGDOToMATmr82mXQLDJgXx/RwTelvH3PafNs98700NLpMag
thWMU8mtF7cS9MPIrTsV
=z98C
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b0cf7cf-f9b9-bda8-2aa6-442b71199d5c%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Request for feedback: 4.9 Kernel

2017-06-15 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/15/2017 06:34 PM, Reg Tiangha wrote:

> Curious:  For those apps that exhibit that behavior, are they
> running on Debian 9 or Fedora 25 templates?

Nope.
Fedora 24 mainly, and Debian 8
The later is only for sys-net, so all my taskbar icons coming from a
F24 based template.


> Since it works fine in Debian 8 (I haven't tested much with any 
> Fedoras), I'm wondering if it's less a kernel issue and more of an
> issue with newer X or how Qubes integrates with newer X (but I
> guess if it works properly on 4.4, it may be a combination of the
> three; don't know how to fix it though).

Maybe it is a know issue, but:
online netvm change on a disposable VM is also broken on the latest
4.9 VM kernel. (Qubes Manager shows it is changed, but not working in
practice)


> I can't play around with this until later today, but in the
> meantime, what graphics hardware are you running, Zrubi? And which
> version of 4.4 are you running where things work fine? And finally
> if you can, if it's an Intel card, can you try booting with this
> kernel option to see if it makes a difference?
> 
> i915.preliminary_hw_support=0

I believe this setting will not affect this chipset. But will try if I
have a chance. (This is my only Qubes Laptop atm and using it for
production)

HW details:

Intel(R) Core(TM) i5-5300U CPU @ 2.30GHz
Intel Corporation Broadwell-U Host Bridge -OPI [8086:1604] (rev 09)
Intel Corporation HD Graphics 5500 [8086:1616] (rev 09) (prog-if 00

SW versions:
Qubes 3.2
xen: 4.6.5
kernel: 4.4.62-12



- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=uAxB
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/edc2e6c0-7c07-fc09-d9c7-263410060af3%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] tools for "burning" bootable USB to install qubes

2017-06-15 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/14/2017 05:56 PM, Raymond Rizzuto wrote:
> Are their any other Windows tools aside from Rufus that can be used
> to successfully create a bootable USB drive for installing Qubes?
> I.e. Etcher, Unetbootin, YUMI, etc.

The most simple and reliable one:
https://www.netbsd.org/~martin/rawrite32/download.html


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=y6rU
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/046b29ad-0ca6-4176-7b9a-ed41e199ad6a%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Use your multi-button mouse - for easy inter-vm copy paste

2017-05-19 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

I just wrote an article about how to map the qubes copy-paste key
combination to a single mouse button:

http://zrubi.hu/en/2017/use-more-buttons/

The solution is not Qubes specific in general, but inspired and
motivated by the qubes copy-paste operation :)



Feel free to use this article - as a whole, or parts
of it, or any derived work - for the Qubes Documentation Project.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=H9QH
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bca6f301-9456-6e43-7e3d-aa3c224d070d%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] which things are, and which things are not encrypted on the disk.

2017-05-18 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 05/18/2017 09:48 AM, pandakaas...@gmail.com wrote:
> I recently came across this PDF file stating that dom0 and the
> hypervisor (Xen) are stored unencrypted on the disk, because the
> disk wouldnt be able to boot(According to the PDF). but as far as I
> know, only /boot and GRUB are stored unencrypted.  so is this PDF
> file wrong, or was I wrong (or both?).
> 
> Here you have a link to the file, you can find it on page 7: 
> http://www.cs.uu.nl/docs/vakken/b3sec/Proj15/QubesOS.pdf
> 

The Xen itself and the dom0 kernel (located in /boot) are both
unencrypted.

This can be the reason using TPM and AEM:
https://blog.invisiblethings.org/2011/09/07/anti-evil-maid.html
https://www.qubes-os.org/doc/anti-evil-maid/


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJZHVNBAAoJEH7adOMCkunmeHYP/R9HZ8OKmJQqVsFguS7ozIfj
1CiwrWuTK/RskzRv0X3RSzk/+9BvF66MuL7KldfmuQQ2l8UKO8FX7BPjKj9ITYz4
QbGPZkt+ysAADU26v4vzxLh0jUE360RGEDLQYc+pB1h/sOWMrLhufRZROXLiNXfU
xmXXBowEDfcZ/LbT59SdKX2PSMKjYkIWTenelxeyH6/zxwzruRVl0YXblyXYT5CR
G0Fp3RMrWFGYWoMhkg60VXAyHrA56QfzodmPy9zNRULc8Vj3sh+2pTDH58350AQv
fznfYLpoVRKJzvO/H/um5ISePFNbQdl27/uLGBKnj7WuEybAoAFoPXL+1Y4VC9Za
Gy2e1BO5GKYYgriLi/LVFzvix4Qn0OIinwNr+/7JhFJ99TgK1Xt4aWBH1zm92G8K
MyIbXqvkDRPDGSdjVDPAYnnnOWYJh46BRUE+0JzhhonIWO71IfjDNbh6Eg45cEU/
hPC+NbMvqVLcdlD+us8746Sv8cNJZG3tMKzLo0FDERqA/ZDvIdXjwcKMG9l8WHM8
rX+Xrs0k9PD15q7G08gMkgqgsqzTrBdc6Vr1Aa33oAMkrwGqiWfrqUboRJwmHu9h
Nlyu2ZW7tm/ipjCGlV/Rw1x6T2D/tpqbZa9V+GjibPOSF0KXSTjcyDSVU+SpEyJH
do+i3HNd00VK+um5cX0i
=69AL
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc9cd077-2a20-7491-d859-396d43c3b6de%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help adding documentation to Qubes Repository

2017-05-12 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 05/11/2017 11:51 PM, 'PR' via qubes-users wrote:
> Hello,
> 
> I need some help understanding how the collaborative documentation
> with GitHub works.

https://www.qubes-os.org/doc/doc-guidelines/

TL;DR:
you only missed the create a pull request part.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=MsWk
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/574f7cfc-8b27-9171-92dc-5578e9d3c4a4%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: can we have debian-minimal?

2017-04-25 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 03/19/2017 07:49 PM, tnt_bom_...@keemail.me wrote:
> its difficult to remove the packages inside debian-qubes , because
> most of the time u will end up on crashing/destroying it.

I just played a little and removed a lot of packages from the current
debian-8 template:

amd64-microcode aspell aspell-en bsd-mailx colord colord-data
cryptsetup cryptsetup-bin cups cups-browsed cups-client cups-common
cups-core-drivers cups-daemon cups-filters cups-filters-core-drivers
cups-pk-helper cups-ppdc cups-server-common dmidecode dnsmasq-base
dns-root-data docutils-doc doc-debian dosfstools eject emacs emacs24
emacs24-bin-common emacs24-common enchant evince evince-common
exfat-fuse exfat-utils exim4 exim4-base exim4-config
exim4-daemon-light firefox-esr firmware-linux firmware-linux-free
firmware-linux-nonfree ftp gdisk gedit gedit-common gnome-sushi
gnome-user-guide gstreamer1.0-libav:amd64
gstreamer1.0-plugins-base:amd64 gstreamer1.0-plugins-good:amd64
gstreamer1.0-x:amd64 hwdata i965-va-driver:amd64 icedove
iceowl-extension iceweasel info intel-microcode iucode-tool keepassx
man-db mutt nano nautilus nfs-common printer-driver-gutenprint
procmail qubes-img-converter qubes-pdf-converter qubes-thunderbird
reportbug rpcbind rsyslog sane-utils system-config-printer
system-config-printer-udev tasksel tasksel-data upower usbmuxd
usbutils usb-modeswitch usb-modeswitch-data va-driver-all:amd64
vdpau-va-driver:amd64 w3m wamerican yelp yelp-xsl

After removed (sudo dpkg --purge ) those let's run:
sudo apt-get autoremove

The result still contains more than the must have packages, but I not
purged the ones I actually need:
NetVM and FirewallVM related packages, vim, gnome-terminal and
standard networking tools

Of course it will not save disk space unless you free it using:
qvm-trim-template (from dom0)


Now my debian template is much closer to fedora-minimal - while still
booting and working :)


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=0Z77
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53ace73b-85ef-3b8b-ba2a-343fb017acff%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Intrusion detection daemons in VMs

2017-04-24 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 11/04/2016 10:35 AM, Zrubi wrote:

> Another - currently implementable - way to use a proxy VM (as it
> is currently used as a dnf/yum proxy) and install your desired
> intrusion detection software there. Suricata is a good candidate
> for such thing: https://suricata-ids.org/
> 
> (I would just need more time and more RAM to play with such things
> ;)

And finally now I have enough RAM, and got some time too :)
Here is the result:

http://zrubi.hu/en/2017/traffic-analysis-qubes/



Any comments and/or suggestions are welcome.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=XRSk
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0f1b709b-7694-6611-e011-1d2608fb691b%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to handle untrusted applications?

2017-04-18 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 04/18/2017 11:30 AM, nonse...@graumannschaft.org wrote:
> What is a sane way to manage applications one doesn't trust (e.g.
> Skype )? As far as I understand the qubes concept so far, I would
> either have to install the app in my general template (which I do
> not want ) or create a dedicated template just for the app vm that
> is supposed to run that app ... is that correct?

Yes, this is the two way I know.
Moreover the best is to not use it at all, if you not trust that app ;)


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=vAF/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9f59173d-94a9-0a00-5eac-123fc0216db3%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-13 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 04/13/2017 09:15 AM, rubboe...@gmail.com wrote:
> Hi,
> 
> I'm new to Qubes and yesterday i've installed qubes, everything
> went fine. When qubes was almost done it asked me for my disk
> password. So I thought that that would be the passphrase, i entered
> the passphrase but it was wrong. I litteraly tried evey possible
> answer. Is there a possibbilitie to delete qubes or something
> because i'm completely stuck. I can't do something else with my
> pc I hope someone could help, because this is just a new pc and
> this is already a big problem...
> 

It can be a keyboard layout problem, if you not using the default US

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=JEqX
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/92f2c467-abf5-f18b-d026-7af8ad2fbfcf%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Breaking the Security Model of Subgraph OS

2017-04-12 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 04/12/2017 10:34 AM, Bernhard wrote:

> I perfectly agree that this 'phone home' business is inaccaptable.
> If you consider that this type of firewall is easy to set up within
> qubes I invite you to write a small tutorial on the subject for
> 'normal users'  thank you! Bernhard

Such advanced firewall is on my todo list for ages.
My first candidate is running suricata in a proxyVM

https://suricata-ids.org/

However I had no RAM to play with such things in my machines.
No I have enough computing resource - but not enough free time :(


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=DZ1F
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6eb2987e-949c-4e2b-4018-8d4fdbc02841%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: dnf over VPN with qubes-updates-proxy

2017-03-29 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 03/28/2017 02:14 PM, Nemo wrote:
> Doing updates through the VPN would be perfect if possible.

For this you can simply skip the updates proxy, and let your template
access the same networks as you appVMs.

You just have to edit the /etc/dnf/dnf.conf in your template, and
comment out the qubes proxy line.

Of course this will disable the original "template protection" where
you can only reach the updates proxy.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJY23AqAAoJEH7adOMCkunmBJMP/RL0i7xF/tY3+xdtvMuXiCUt
W6jsuUcvsC2VlTsW2WSskBnixGEZuZlFaTxo6yA1HXpRCTgOiJm6mHrmLLcyV4im
jbuEpkI/wcoKodSzyhvQ6NBIj1PUBZehuOIbK3NoBkasnzqSDQ/cSB30z72QljOn
S/T/njAQ3PFju3+yA6l7jrE7gJiICXecR2zwN78Y2b9KdxSs/JwnQBVdh+ahvxI4
A4fEF45gvtJ+5QkK3A2zmrnkhl39k/b54NjglN993LL0uUB4j8cbgUUjG6mjnPYj
YEW4MlvSKbAHp8wzwDpWT1yb1zCzDt2F45K3ILDwO0G119TBC1Ur8qwz5YELRwcm
9ZDrDK9gLaVfWxj4aBv4N1ecZZu9pVN8RKtFsFHuvFGkCjLoDPVKjkgpSLMhDNpi
aUAo61cpsVxgE6AocepbHykrbrhyQnncUO0LcZT1Ozl9g9hCyFT5LgMvRN3k9vRb
QwNZVptA2ktps7X9BtjPSjcYUgdhEFxqxxt85Sy0BS61bfH2UlgPzEIr+I7XRxaa
SIj6yUG9SpRTz/HBaP2Rt3IzKkwLzkOaQDRKebNofsl8X+z9fF3Oq7cVOSFqj2X5
LM+t/NXnkwCciwbD0V5m4v9qNorj5GYTdzlauAROLA4tRmAqPddOl7rfhMqnnlXs
S7P4liRGjwwbyYeK02y6
=h4kr
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/04d1b2db-bb80-056f-8fdd-c37cf07b2702%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: HCL - Sony SVF15A1C5E

2017-03-09 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 03/08/2017 05:39 PM, r.flo...@openmailbox.org wrote:

> I didn't know that `qubes-hcl-report` is a bash shell script. I've
> just saw how VT-d support is recognized. Probably there is a
> problem with `xl info`. It prints actually that this laptop
> supports VT-d. It's strange..
> 
> However I attached support files. I hope that we can resolve this
> 'mistery'.

According the data you sent me, your device is an Ivy Bridge + i7-3537U
https://pci-ids.ucw.cz/read/PC/8086/0154

According the intel official docs, this system is supprts vt-x and
vt-d as well:

http://www.intel.com/content/www/us/en/intelligent-systems/chief-river/e
mbedded-3rd-generation-intel-core-i7-processor-with-mobile-intel-hm76-ch
ipset.html

http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/7
- -series-chipset-pch-datasheet.pdf


So Xen (and qubes HCL script) reports about vt-d is seems to be true :)


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=dvHe
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ff0bcaa7-6616-4755-74a0-cd7dcb5c800e%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


  1   2   >