[qubes-users] Re: Qubes OS 4.0 has been released!

2018-04-01 Thread Amilton Justino
Em quarta-feira, 28 de março de 2018 13:36:46 UTC-4, Andrew David Wong  
escreveu:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> After nearly two years in development and countless hours of testing,
> we're pleased to announce the stable release of Qubes OS 4.0!
> 
> 
> Major changes in version 4.0
> 
> 
> Version 4.0 includes several fundamental improvements to the security
> and functionality of Qubes OS:
> 
>  * The Qubes Admin API [01]
>  * Qubes Core Stack version 3 [02]
>  * Fully virtualized VMs for enhanced security [03]
>  * Multiple, flexible Disposable VM templates [04]
>  * A more expressive, user-friendly Qubes RPC policy system [05]
>  * A powerful new VM volume manager that makes it easy to keep VMs on
>external drives [06]
>  * Enhanced TemplateVM security via split packages [07] and network
>interface removal [08]
>  * More secure backups with scrypt for stronger key derivation [09] and
>enforced encryption
>  * Rewritten command-line tools with new options [10]
> 
> This release delivers on the features we promised in our announcement of
> Qubes 4.0-rc1 [11], with some course corrections along the way, such as
> the switch from HVM to PVH for most VMs in response to Meltdown and
> Spectre [03]. For more details, please see the full Release Notes [12].
> The Qubes 4.0 installation image is available on the Downloads [13]
> page, along with the complete Installation Guide [14].
> 
> 
> Current 4.0 release candidate users
> ===
> 
> In our Qubes 4.0-rc5 announcement [15], we explained that if the testing
> of 4.0-rc5 did not reveal any major problems, we would declare it to be
> the stable 4.0 release without any further significant changes and that,
> in this scenario, any bugs discovered during the testing process would
> be fixed in subsequent updates. This is, in fact, what has occurred. We
> found that, with the fifth release candidate, 4.0 had finally reached a
> level of stability that met our standards such that we were comfortable
> designating it the stable release. Accordingly, current users of 4.0-rc5
> can upgrade in-place by downloading the latest updates from the *stable*
> repositories in both dom0 [16] and TemplateVMs [17].
> 
> We know that this stable release has been a long time in coming for many
> you. We sincerely appreciate your patience. Thank you for sticking with
> us. We're especially grateful to all of you who have contributed code
> [18] and documentation [19] to this release, tested [20] release
> candidates, and diligently reported bugs [21]. This stable release would
> not have been possible without your efforts. Your involvement makes
> Qubes a truly open-source project. Your energy, skill, and good will
> make this project a joy to work on. We are lucky to have you.
> 
> 
> The past and the future
> ===
> 
> Since first announcing extended support for Qubes 3.2 [22], we
> determined that users would be better served by having a version of
> Qubes 3.2 with updated TemplateVMs and a newer kernel. We've designated
> this release Qubes 3.2.1. As the name suggests, this is a point release
> for Qubes 3.2 that does not contain any major changes, and it is this
> release to which the extended support period will apply. We intend for
> Qubes 3.2.1 to be a viable alternative to version 4.0 for those who wish
> to use Qubes on hardware that does not meet the system requirements for
> Qubes 4.0 [23]. While our standard policy [24] is to support each Qubes
> release for six months after the next major or minor release, the
> special extension for 3.2.1 raises this period to one full year.
> Therefore, the stable release of Qubes 4.0 sets the EOL (end-of-life)
> date for Qubes 3.2.1 at one year from today on 2019-03-28. We expect
> 3.2.1 to be available soon, after Kernel 4.9 testing is completed.
> 
> Looking forward, our work on Qubes 4.x has only just begun. Our sights
> are now set on Qubes 4.1, for which we have a growing list [25] of
> planned enhancements to nearly every aspect of Qubes OS. Whether you're
> new to Qubes or have been here for years, we welcome you to join us and
> get involved [26]. We've personally chosen to devote our time and skills
> to making Qubes freely available to the world because we believe that
> being open-source is essential to Qubes being trustworthy and secure. If
> Qubes is valuable to you, we ask that you please consider making a
> donation [27] to the project. With your support, we can continue to make
> reasonable security a reality for many years to come.
> 
> 
> [01] https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/
> [02] https://www.qubes-os.org/news/2017/10/03/core3/
> [03] 
> https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-037-2018.txt
> [04] https://github.com/QubesOS/qubes-issues/issues/2253
> [05] 
> https://www.qubes-os.org/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later
> [06] 

[qubes-users] HCL - Dell Inspiron 14z 5423

2018-04-01 Thread Amilton Justino
Completely compatible with R4.0. Notebook, fully functional, including ipv6.
-- 
Amilton Justino
PGP Key ID 01AD6182

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAH_11fDN%3DnODJwic9-jWj5wvKYrLD0grOOG3H1bLC_BaO0Kvug%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Dell_Inc_-Inspiron_5423-20180401-102553.yml
Description: application/yaml


[qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-07 Thread amilton
Thanks for the great news Andrew.
Congratulations to the team.

Em terça-feira, 6 de março de 2018 22:03:05 UTC-3, Andrew David Wong  escreveu:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Dear Qubes Community,
> 
> We're pleased to announce the fifth release candidate for Qubes 4.0!
> This release contains bug fixes for the issues discovered in the
> [previous release candidate][4.0-rc4]. A full list of the Qubes 4.0
> issues closed so far is available [here][closed-issues]. Further
> details about this release, including full installation instructions,
> are available in the [Qubes 4.0 release notes][release-notes]. The new
> installation image is available on the [Downloads] page.
> 
> As always, we're immensely grateful to our community of testers for
> taking the time to [discover and report bugs]. Thanks to your efforts,
> we're able to fix these bugs *before* the final release of Qubes 4.0. We
> encourage you to continue diligently testing this fourth release
> candidate so that we can work together to improve Qubes 4.0 before the
> stable release.
> 
> The Qubes 4.0 stable release
> - 
> 
> If the testing of 4.0-rc5 does not reveal any major problems, we hope to
> declare it the stable 4.0 release without any further significant
> changes. In this scenario, any bugs discovered during the testing
> process would be fixed in subsequent updates.
> 
> If, on the other hand, a major issue is discovered, we will continue
> with the standard [release schedule], and Qubes 4.0 stable will be a
> separate, later release.
> 
> Current Qubes 4.0 Users
> - ---
> 
> Current users of Qubes 4.0-rc4 can upgrade in-place by downloading the
> latest updates from the testing repositories in both
> [dom0][dom0-testing] and [TemplateVMs][domU-testing].
> 
> 
> [4.0-rc4]: https://www.qubes-os.org/news/2018/01/31/qubes-40-rc4/
> [closed-issues]: 
> https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+milestone%3A%22Release+4.0%22+is%3Aclosed
> [release-notes]: https://www.qubes-os.org/doc/releases/4.0/release-notes/
> [Downloads]: https://www.qubes-os.org/downloads/
> [discover and report bugs]: https://www.qubes-os.org/doc/reporting-bugs/
> [release schedule]: 
> https://www.qubes-os.org/doc/version-scheme/#release-schedule
> [dom0-testing]: 
> https://www.qubes-os.org/doc/software-update-dom0/#testing-repositories
> [domU-testing]: 
> https://www.qubes-os.org/doc/software-update-vm/#testing-repositories
> 
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2018/03/06/qubes-40-rc5/
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> 
> -BEGIN PGP SIGNATURE-
> 
> iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlqfOjgACgkQ203TvDlQ
> MDD85w/+NXqtxDpaC84CeETA/1/HK6WcbYoNmt1ZjRouKJmmrW2pxyUsYo7vZNsN
> +qgupvvHkE+AFhKuwRrQJq8k6fHPzaY2GWvLpJGQ/bEFqO8fWnrvFzR0OzQb/sYI
> NfRZoSA9lKyt05QJPfxG3aHqAXJeVwslj337arE/lhws6zsVS0zhtHxCyB9w/Wag
> c+YWy2BrWjzujlJZC1SDGFrD0bdd+voD2GTOcUrCSXOP4IxH9ym/VWVtD8O5Tssx
> WIU1qvSumpMaIWN2GsbVIQXqjxv2+AvtNg28neAyAoudpqq4EmX3/ugNe9ngVV0U
> 8wAKGnRAm5keV7tNV48Kqrsd26N95kkB/0U3AYLG5o1ZwTV2dId5ERxj1hkE8/FC
> TDIlFcC3S94N39pUwfMcE0wFr6q8m6Mt7XJdDjII2OCrhxbpgoPRrCeUOH0Vkj5d
> F8VETME1w1taoPjoVIO7jclgaBWChgLLBRjelYUj0fYFIRu3WCQDG1l86ZFWa96q
> qHLBPSdddzMxdj9G2MQFRamv4cmefUHZx9XbDLK5tjZcX8lfKPS96avNg1iAa3x8
> wZGwkk96Lo5MoapH+ZlYde0oTacyssmDSvDw4qmhSAyRbM1TrFlCCtv2TMNkLFHW
> DaN4GgYeh1XSmw0M7fAf/TmBjjKVxz0oMOgaGhjrmK0vmH29C0w=
> =BkQO
> -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f7ee59a2-1c1a-4a36-b247-9ff71c52e82f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Security questions (templates and kde)

2018-03-06 Thread Amilton Justino
Em segunda-feira, 5 de março de 2018 19:39:37 UTC-3, sevas  escreveu:
> Does choosing a TemplateVM have any tactical advantage to security?
> 
> 
> Does installing KDE have any tactical disadvantage to security?

Hello everyone
I agree with Chris Laprise: the choice of the model is not critical.
I use some distros in Qubes:
Debian, Fedora, Ubuntu, slackware, blackarch
More important than distro is their mindset for workflow, segmentation and 
security issues.

Thank you for the explanations Yuraeitha and Chris Laprise.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f1c11bf2-d6fa-4945-aabe-4e973f91adf2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R3.2 on Thinkpad X250: cannot install Windows 7 (hangs on "Starting Windows" at install)

2017-07-04 Thread Amilton Justino
Many thank's for that great Tip Scot Anderson. Work Fine !

Em terça-feira, 9 de maio de 2017 23:19:32 UTC-3, sh di  escreveu:
> On Friday, November 11, 2016 at 4:14:49 PM UTC-5, Myron Weber wrote:
> > On Wednesday, November 9, 2016 at 5:03:12 AM UTC-8, Pablo Di Noto wrote:
> > > Hello,
> > > 
> > > Never had much use for a Windows7 HVM so far.
> > > 
> > > Months ago, I installed W7 on Qubes just for the sake of testing. Got to 
> > > the point of installing qubes-windows-tools and had some success with it, 
> > > but never used it much (in fact, never activated a license on the 
> > > resulting W7 install).
> > > 
> > > Now I want to start from scratch, but cannot make a HVM to go further 
> > > than "Starting Windows" screen on the install phase.
> > > 
> > > Only changes I recognize on my setup are:
> > > - R3.2 final installed (which included several Xen updates, 4.6 to 4.6.3 
> > > IIRC)
> > > - Got a "storage pool" enabled, to use the machine SHDD together with the 
> > > boot SSD.
> > > 
> > > So far, tried all this:
> > > - several W7 ISO versions (including the ones I successfully used before).
> > > - creating the HVM with 2, 3 and 4gb of memory.
> > > - creating the HVM on my "big storage" pool, the local SHDD, using -P 
> > > option in the qvm-create command
> > > - creating the HVM on the original storage pool, the local boot 
> > > qubes-dom0-root volume, using the GUI to create the machine.
> > > - using debug options on all the attempts, but logs show absolutely 
> > > nothing that I can recognize as error.
> > > 
> > > Any pointers on what to try next, or how to debug?
> > > 
> > > Thanks in advance!
> > > ///Pablo
> > 
> > I don't have any answers, but a data point that might be useful. I've 
> > installed windows HVMs on Qubes 3.2 on both Lenovo T460 and x260 recently, 
> > and had no issues. The x250 should be similar. One variable I see is that 
> > you have a storage pool whereas mine both had a single drive. Don't know if 
> > that makes a difference.
> 
> Hello Mr. weber. I also have a x260, im having issues installing windows app 
> vms, but off topic, does your system shut down and reboot normally? i get 
> errors for memmap not enabled... ive been shutting down by holding onto power 
> button since and i know i have to find a solution soon.. hope this message 
> gets to you. thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b48a98db-2c52-419d-8ca9-9d255a391fd1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Abridged summary of qube...@googlegroups.com - 33 updates in 17 topics

2017-03-06 Thread Amilton Justino
Em domingo, 5 de março de 2017 16:56:27 UTC-3, cooloutac  escreveu:
> On Sunday, March 5, 2017 at 1:47:46 PM UTC-5, Amilton Justino wrote:
> > Hello all,
> > 
> > I am not able to put ssh-agent and ssh-add to work automatically in an
> > AppVM with fedora 23.
> > Manually running every login works correctly. Has anyone got it?
> > 
> > Thanks in advance,
> 
> not sure what you mean?  maybe you can make a script on startup like here 
> https://www.qubes-os.org/doc/config-files/

Thank you, I'll see what I get with this.
Sorry for my poor English.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/adc97736-55ca-4d3f-939d-f61d3cb5d799%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Abridged summary of qubes-users@googlegroups.com - 33 updates in 17 topics

2017-03-05 Thread Amilton Justino
Hello all,

I am not able to put ssh-agent and ssh-add to work automatically in an
AppVM with fedora 23.
Manually running every login works correctly. Has anyone got it?

Thanks in advance,

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d16e31c2-ec46-d648-6b74-a43e6c4926c4%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


0x01AD6182.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature


[qubes-users] HCL - Dell Inspiron 5423

2016-11-22 Thread Amilton Justino
Video ok
Networking ok
Energy Management ok
Second Monitor Dell ok
HDMI ok
Mouse USB ok
UEFI and Legacy boot ok
Crypt ok
bluetooth Mic webcam not working (great ;-) I don't need this )


Thanks a lot Qubes Team.
-- 
Amilton Justino
https://br.linkedin.com/in/amiltonjustino

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAH_11fDCk%3D%2BBNDWmK8h%3Dgs0K%2Bef%3DSHc5Bucbf_wYqrHw_oNa%2Bw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Dell_Inc_-Inspiron_5423-20161122-115500.yml
Description: application/yaml