Re: [qubes-users] Re: fedora-24 update error: nothing provides ostree-libs(x86-64) >= 2016.14 needed by flatpak-0.8.3-3.fc24.x86_64

2017-03-09 Thread raahelps
On Sunday, March 5, 2017 at 8:29:28 PM UTC-5, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-03-05 12:05, raahe...@gmail.com wrote:
> > On Sunday, March 5, 2017 at 5:31:48 AM UTC-5, Andrew David Wong wrote:
> > On 2017-03-03 15:41, raahe...@gmail.com wrote:
>  On Friday, March 3, 2017 at 6:38:24 PM UTC-5, raah...@gmail.com
>  wrote:
> > On Friday, March 3, 2017 at 9:40:20 AM UTC-5,
> > mitte...@digitrace.de wrote:
> >> Hello fellow Qubes users,
> >>
> >> If I execute update of the fedora-24 template via the Qubes VM
> >> manager, it aborts with the error
> >>
> >> nothing provides ostree-libs(x86-64) >= 2016.14 needed by 
> >> flatpak-0.8.3-3.fc24.x86_64
> >>
> >> If I use sudo dnf upgrade from the terminal within fedora-24
> >> the command is executed, but later executions list the problem
> >> with flatpack (broken dependencies)
> >>
> >> of course I can remove flatpack, but I don't know whether I may
> >> need it?!
> >>
> >> thanks
> >
> > I removed it haven't noticed any problems.  But I also wonder
> > what it is.
> 
>  Hopefully removing it did not lessen my security?
> 
> > 
> > Relevant issue: https://github.com/QubesOS/qubes-issues/issues/2656
> > 
> > 
> > yes but is removing flatpack bad for my security? maybe I should install it 
> > again?
> > 
> 
> Sorry, I have no idea. I'm guessing not, since it appears to be absent
> from the fedora-minimal template.
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYvLtlAAoJENtN07w5UDAwkgMP/1LvO8CB7M/UntbE3XFiufmu
> wz67nbrHEcXBbFHTm310rdh0XTxCvubLhwdVzNc1UQlP0Kc6KbcaJBW592EATTt1
> bHfixs2eZ56VRu3P6WGADijf1VN8SkCCG6B0AEsijwWQqcK0Ejn5qdvyWYTaApmj
> u1IpZ3Q2DZFUoze0H/FgwVvVT0VavqcYv6jExa22Yug/hqYrjCB/lRCLe6hTOJiP
> gxVINpionWeonUpAlVuQDNGyF9+FumDf+AX7vMBR1r0DgTuslDc36/AnHx8KuMFK
> nOjetkbvD5bYMPQ/k3FkCP1c+OodX9IU0SwL/I3hLCZIfE6oS+hZNHi2NeUmrB3W
> xno4C58cGEsDKbPs4eZ2SlgXmM2PTekVzlU1rikjOeADz3W9off7n1Hbg6aPY3on
> dWBJFmD1W9Uk5INTQNFj97rtjixmyv1U28P8Ia5/aOcUTS40rYJyOJNghfXv5phM
> MvZY/buVb61M2t6MNObKLvbsRkmkAz9JOq7iLI5HwC0ZpReDWQmpXaGPUJ3WY5ot
> tt/cWQ9KlZIH87gKanyANZLI2CyMf2Afk86fKzjZB2AS6o5XjXf1mcVKdSvSVGO7
> kFoWb6t/M5Gm7+bsr/TJyG92Rvv5x9PC7xhQ19OmmIgsUyS4NsZ55hwuvvhS7wi6
> 7XNilGUhv9Nr4BJWUzAj
> =TEcT
> -END PGP SIGNATURE-

tks was wondering that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cb017572-4f47-4ecc-9b34-7e8cacc6247f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] removing of f23 template did not go as planned

2017-03-09 Thread raahelps
On Thursday, March 9, 2017 at 1:21:54 PM UTC-5, raah...@gmail.com wrote:
> actually I see debian, qubes, and whonix files in there.  I don't even see 
> fedora-24 in that directory.

oh sorry this is another machine I just happened to notice fedora-23 on start 
menu. I never noticed before lol one of the steps 1-3 did it on here.

I'll try step 4 on the other machine that has fedora-23 in start menu which 
I've already tried steps 1-3 on.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37d5a717-dea6-43a0-be94-fd0dae51d0c6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] removing of f23 template did not go as planned

2017-03-09 Thread raahelps
actually I see debian, qubes, and whonix files in there.  I don't even see 
fedora-24 in that directory. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c5d39594-b6b6-4fd7-9a37-dd98e62a6669%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] removing of f23 template did not go as planned

2017-03-09 Thread raahelps
On Thursday, March 9, 2017 at 11:35:51 AM UTC-5, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-03-09 08:31, Andrew David Wong wrote:
> > On 2017-03-09 08:28, Grzesiek Chodzicki wrote:
> >> W dniu czwartek, 9 marca 2017 17:19:31 UTC+1 użytkownik Andrew 
> >> David Wong napisał: On 2017-03-09 08:10, Grzesiek Chodzicki 
> >> wrote:
> > W dniu wtorek, 3 stycznia 2017 22:06:05 UTC+1 użytkownik 
> > Andrew David Wong napisał: On 2017-01-03 11:48, cubit 
> > wrote:
>  Has anyone else run into this.  I was attempting to 
>  remove the Fedora 23  template as I no longer use 
>  it.
>  
>  I removed my cloned F23 templates with the gui 
>  manager and that went OK but when I did a dnf remove 
>  from terminal in dom0  for the main template I got a 
>  bunch of file not found errors and even though it 
>  says it removed the template and can't be found with 
>  dnf list or in qubes manager,  the template entry is 
>  still in my application menu.
>  
>  Any suggestions on how to clean this up properly 
>  would be appreciated
>  
>  Below if the output of dnf remove
>  
>  [...]
> > 
> > Not sure why the removal failed, but you can clean up any 
> > remnants by following these instructions:
> > 
> > https://www.qubes-os.org/doc/remove-vm-manually/
> > 
> > 
> > Hi Andrew,
> > 
> > THe provided insutrctions still leave the fedora-23 entry 
> > in the Applications Menu. Any hint on how to remove that?
> > 
> > 
> >> I recall a message or thread recently that explained how to 
> >> remove that. You might want to try searching the archives.
> > 
> > 
> >> Found it! sudo rm 
> >> /etc/xdg/menus/applications-merged/fedora-23-vm.menu I'll send a 
> >> PR to the appropriate page.
> > 
> > 
> > Thanks!
> > 
> 
> I've confirmed that the fourth steps fixes the issue. This bug is
> being tracked here:
> 
> https://github.com/QubesOS/qubes-issues/issues/2689
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYwYRUAAoJENtN07w5UDAwuKEQALS8BTOSSQGm/gT9TkJcZZzQ
> kWTPmF1nPi+EP9H0A1tOPA1y/Ttd3lG9A/rrFGCo4IN159DYZrJUx6jmyGhuJKvC
> Z2/npXg4tvdzssY7j2/1MffTXGPMxtaQabINojZoD4ENaIRUBcs7kXEhO3l0SSbU
> /hJAahDw+qYD0/B12unuGrYAFRQ/BbQa/fczP98zwjPOe9bVHJZoWyAn+kzMMhGK
> lUciEfoj2XTrSD8sab/AjM6Cg2ghg/qZmLbOVtjlEPNz+0xZOtQE4NoMDnEpbM2K
> aHKnhJ5BHnblnwC7Xzbcn+8FYTVY9prlsJtPZoBgbYhIUHE9OzqVWdMqfToEcr19
> cFQoXkUUjC+3PahZUchIF0o9P/3oIQyBRkBRN2hqHC0dmR5EQsGLfFzi/uk+0Xzc
> y/NQo+qymLiIdUFvavcTLV6R9pimNGutY9AsK9IuosRicsVr7asoHfA2HGB7lbEB
> mREoNAsZGbu0FSbwueiDd+6KtkCHfrXPppJHq3QuregLU6rwx+bVAMARa96nbPIV
> iutxiqY93c8Agfl7BwrGuSwYLPOIx7iMT5z0h66pKvZJGbVYDcnWBcIHzjKPJWBB
> a5NCtVwxRgog3LBr6dywXNsMLbMAKtXIV+MwqBYEbvA07KM95sbHHtWygI9n3K7a
> hf78XbXng/NlQvApnweQ
> =euWJ
> -END PGP SIGNATURE-

not working for me man even after a reboot fedora-23 still in the start menu. 
any ideas?  I looked in the applications-merged directory and don't see it?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e42edac2-d43a-44c8-a597-17e6881dde0d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] removing of f23 template did not go as planned

2017-03-09 Thread raahelps
On Thursday, March 9, 2017 at 11:28:18 AM UTC-5, Grzesiek Chodzicki wrote:
> W dniu czwartek, 9 marca 2017 17:19:31 UTC+1 użytkownik Andrew David Wong 
> napisał:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> > 
> > On 2017-03-09 08:10, Grzesiek Chodzicki wrote:
> > > W dniu wtorek, 3 stycznia 2017 22:06:05 UTC+1 użytkownik Andrew David 
> > > Wong napisał:
> > > On 2017-01-03 11:48, cubit wrote:
> >  Has anyone else run into this.  I was attempting to remove the Fedora 
> >  23  template as I no longer use it.
> > 
> >  I removed my cloned F23 templates with the gui manager and that went 
> >  OK but when I did a dnf remove from terminal in dom0  for the main 
> >  template I got a bunch of file not found errors and even though it 
> >  says it removed the template and can't be found with dnf list or in 
> >  qubes manager,  the template entry is still in my application menu.
> > 
> >  Any suggestions on how to clean this up properly would be appreciated
> > 
> >  Below if the output of dnf remove
> > 
> >  $ sudo dnf remove qubes-template-fedora-23
> >  Dependencies resolved.
> >  
> >   Package  Arch   Version   Repository  
> >  Size
> >  
> >  Removing:
> >   qubes-template-fedora-23 noarch 3.0.6-201608081228
> >  @qubes-dom0-cached 3.3 G
> > 
> >  Transaction Summary
> >  
> >  Remove  1 Package
> > 
> >  Installed size: 3.3 G
> >  Is this ok [y/N]: y
> >  Running transaction check
> >  Transaction check succeeded.
> >  Running transaction test
> >  Transaction test succeeded.
> >  Running transaction
> >  A VM with the name 'fedora-23-dvm' does not exist in the system.
> >  --> Removing menu shortcuts...
> >    Erasing : qubes-template-fedora-23-3.0.6-201608081228.noarch 
> >   1/1 
> >  warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.03: 
> >  remove failed: No such file or directory
> >  warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.02: 
> >  remove failed: No such file or directory
> >  warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.01: 
> >  remove failed: No such file or directory
> >  warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.00: 
> >  remove failed: No such file or directory
> >  warning: file /var/lib/qubes/vm-templates/fedora-23/apps.templates: 
> >  remove failed: No such file or directory
> >  warning: file /var/lib/qubes/vm-templates/fedora-23/apps.tempicons: 
> >  remove failed: No such file or directory
> >  warning: file /var/lib/qubes/vm-templates/fedora-23/apps: remove 
> >  failed: No such file or directory
> >    Verifying   : qubes-template-fedora-23-3.0.6-201608081228.noarch 
> >   1/1 
> > 
> >  Removed:
> >    qubes-template-fedora-23.noarch 3.0.6-201608081228   
> >   
> > 
> >  Complete!
> > 
> > > 
> > > Not sure why the removal failed, but you can clean up any remnants by 
> > > following these instructions:
> > > 
> > > https://www.qubes-os.org/doc/remove-vm-manually/
> > > 
> > > 
> > > Hi Andrew,
> > > 
> > > THe provided insutrctions still leave the fedora-23 entry in the 
> > > Applications Menu. Any hint on how to remove that?
> > > 
> > 
> > I recall a message or thread recently that explained how to remove that. 
> > You might want to try searching the archives.
> > 
> > - -- 
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIcBAEBCgAGBQJYwYCAAAoJENtN07w5UDAwgkUP/12GUoHRpgnFjNWq/3WjoTsi
> > 0Rb1g7I8gPMJKKWew1BKdEt0i7IJW+mhUL8XWZu+h429jxX+gOV7n/z21yimGV/1
> > 8v/25HXvSft9G5FYxW2BG2UtsX+2a1DHnidz46w8kKD6SdfPCVJAdt6Lu50fjRdH
> > qWkkx50bDHAApMh05pGfLTVftqkZUiT5AuQxdTItRbcLerx4PQ/KTeHtImN6OoJS
> > k+4LJOeCbXZ/ksowgU0xLpBhE+LDbtQ+3egTwtY6jrHaTObB8jK8Z/sN2oEYbO+1
> > LiVfvosYFBEn087M8Cxrzd4ly7QqXOj8M+KlR39P6Z3cTNBQJtUxRDwUvgcjbAG3
> > aK4GTHr+XSCz5zQyNEvRC8cLtQ+ggP5G6T40QvrqvQ7QVCCyc/cRGvXaQiMf2KQN
> > zUQDWjcrOq9MYByzkCQIRKFZ70gbAHl3UO7eZikFtA+2BneMlLMKdaWAU5pJhm2Y
> > zhAzJJy1aKgpVmm+NWbupPmBEoXeydlGRkDOFDQ6JRfzn8VDisq0E9uaY+1A5t0M
> > Yzb0y1UdB4gChJKX7HBzCigp/T9tPJ/E2KaZ/MXx/Al/8mw48cd31hshlu2xxcJk
> > WrLkEs+DLSp8DFke2rkt6rrJHRrUilZQ7PAqJr7P9/JSynLOS5XAAJ+JgA74W6D9
> > /zgtq0Whg8J1NRqjQ4Ig
> > =aVkZ
> > -END PGP SIGNATURE-
> 
> Found it!
> sudo rm /etc/xdg/menus/applications-merged/fedora-23-vm.menu
> I'll send a PR to the appropriate page.

thanks!!

-- 
You received this message because you are subscribed to the Google 

Re: [qubes-users] removing of f23 template did not go as planned

2017-03-08 Thread raahelps
you might want to give example template name cause I was typing 
qubes-template-fedora-23 before realizing needed to be just fedora-23.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7da36aa7-3b76-45ed-bb6f-265b3f7cf96d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] removing of f23 template did not go as planned

2017-03-08 Thread raahelps
it just happened to me

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/54c6f4e7-0485-4469-a99f-852d09630357%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4 - Walk The Talk

2017-03-08 Thread raahelps
On Wednesday, March 8, 2017 at 12:03:08 PM UTC-5, Wojtek Porczyk wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Wed, Mar 08, 2017 at 11:18:51AM -0500, 'Sudoyum' via qubes-users wrote:
> > First of all I would like to congratulate the Qubes team and their very
> > pro-active User community on creating their highly regarded Qubes OS.
> > 
> > As an IT professional working for a large multi-national, I have been
> > following, closely, the development of Qubes for some time, with the
> > ultimate intent of perhaps rolling out Qubes on an experimental basis within
> > our IT Department.
> > 
> > As you'd expect, when we consider entering into a partnering relationships,
> > our primary considerations after costs are reliability and integrity - it is
> > imperative that all our partners "walk the talk". In other words, if new
> > software is planned to be released on a forthcoming date, that date must be
> > met. If problems exist they need to be discussed in an open and honest way
> > and if necessary revised dates agreed.
> > 
> > I hope this short note explains what most professional Clients demand of
> > their Suppliers. Keep up the good work and do your best to give us
> > a reliable release date for Qubes 4.
> 
> As an IT professional working for a large multi-national, you are very much
> welcome to send inquiries about any offered partnership (which would include
> agreement about deliverables and their deadlines) to bussin...@qubes-os.org.
> This way your enterprise needs will get proper attention. Until then, we work
> on "when it will be ready" schedule, in cooperation with our open and
> sometimes very honest community.
> 
> 
> - -- 
> pozdrawiam / best regards   _.-._
> Wojtek Porczyk   .-^'   '^-.
> Invisible Things Lab |'-.-^-.-'|
>  |  |   |  |
>  I do not fear computers,|  '-.-'  |
>  I fear lack of them.'-._ :  ,-'
> -- Isaac Asimov `^-^-_>
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQIcBAEBCAAGBQJYwDU0AAoJEL9r2TIQOiNRWw0P/13R4igDcmGLefXcQMeyhKZA
> 3YcfnXsNBeis2qI2RTbHgf4Sefmlm4uPysw8/zWD/4UGjYrgRsdk+RRDIG0rMGG0
> YRMldMVh+BOVF5oRd526/+psbZLwxBWF8qghrX/m+COAuaPHb+NEZfSuNG3HWJSE
> GtnW7jupNEoyDS1XxIh0L6zbNNpwI4k7JPySi4TpNrNg/KDwpjz4oopQYkQtumLA
> LVehvvt57E0GbRZjFHyUTL+v/K/KjYrwy/9bbJJiltu+kvnnFoKohyAL6yDA5DlI
> dzA2+1f4hT2zzJZahc+ZUZ3DRxXuXIqrnEkavPd4gc3+j3MB0BKq+zBCURAuVqIT
> iNWET4Z8eq1cTbOarEYZozEKrBwuFg0LdHNC/GSqesTSp8qjBjjE+opNClPZwmZE
> 4iANkoIpYz7Wby3lio7pZs17GKc42QyivTpWboHf9MByw6aECnYsMFGqJ/ye6E8L
> jiiBj3Ca8RH6xa3SdkX6dliiUWZrUfj+KIyDDSTuAnGcQVbVpGKlaz+LLnHtVT8Y
> e+w6oXqE7ut3tcegjhpnTeoPH74O+8Y+kA7MCmxonXtFayHYRSV21NPQ29viBcZW
> CAatoEFDyaN8hDvusySLcmS8dHzICEGVBEoLzzMAtGaRu9trer9phc6r+wwPtqSp
> WVMpB4NFWzwV3ML5nqS+
> =RJtW
> -END PGP SIGNATURE-

I always thought large businesses were always leary about wanting newly 
released versions of software to fix what isn't broke.  Unless they is a 
specific feature they are waiting for they usually stick with older versions 
they know are stable.  For example most businesses still use windows 7.  Debian 
stable goes a long time before a major release.  

Its usually the home user that always wants the latest versions of software for 
no particular reason.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c79e9755-9fcc-4615-b5fa-928e9004779e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Upgrading from Qubes 3 to 4.

2017-03-07 Thread raahelps
On Tuesday, March 7, 2017 at 2:34:48 PM UTC-5, Vít Šesták wrote:
> AFAIR you will have to perform full reinstall when upgrading to Q4 because of 
> switch to LVM.
> 
> I am in similar situation. I plan buying a new laptop, because my current 
> laptop EOLs soon (end of 5Y warranty). I cannot migrate to Qubes 4 before 
> that (compatibility issues) and I don't want to install 3.2 on the new laptop 
> and perform full reinstall in few weeks/months.
> 
> Regards,
> Vít Šesták 'v6ak'

its pretty quick and easy though if restoring backup vms.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62bb230b-c6ff-4c7a-a120-d9391f6bc3c7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: app-vm distorted sound

2017-03-07 Thread raahelps
On Tuesday, March 7, 2017 at 3:21:48 AM UTC-5, legaw...@gmail.com wrote:
> Hi all! I was watching movie by VLC player in my Debian-8 App-VM, and 
> discovered that I can set up volume in it up to 200% with mouse wheel 
> (instead of maximum 125% in the classical way), then I closed VLC at this 
> volume... After that system volume (in app-vm i guess) became distorted (stay 
> at 200%?). Any manipulations with audio mixer did nothing, reboot did nothing 
> as well. How can I drop audio mixer or app-vm's volume to defaults?

weird,  alsamixer from terminal maybe.  try in dom0 as well unmute everything. 
if using pulse maybe pavucontrol?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5177125-e859-419d-87dc-81fea3cb812b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Screen stuck at network configuration.

2017-03-07 Thread raahelps
On Tuesday, March 7, 2017 at 5:34:01 AM UTC-5, shubham dubey wrote:
> I am trying to install qubes os. The installation happen successfully but on 
> configuration screen the os get stuck on network configuration dialog. I have 
> tried the to disable the ethernet card on bios as given in this post 
> https://groups.google.com/forum/#!topic/qubes-users/X5Iomlu_oo4 (as
> it seems same problem) but that option is not available in my bios.So can 
> anyone have any other solution.
> 
> The option I am selecting on configuration screen is only create system level 
> vm.My system is lenovo z50-70 with 4 GB ram.
> 
> Thanks,
> Shubham

maybe u can try and create network vm after install instead of a automatically. 
 Also 4gb is alittle low for Qubes, fyi prolly only be able to run 1 or 2 
appvms at a time, but it should work fine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9795357-b21c-4b4b-ad89-e4018951d477%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Upgrading from Qubes 3 to 4.

2017-03-07 Thread raahelps
On Tuesday, March 7, 2017 at 4:34:32 AM UTC-5, lok...@gmail.com wrote:
> On Tuesday, 7 March 2017 03:56:20 UTC+8, Jean-Philippe Ouellet  wrote:
> 
> > https://www.qubes-os.org/news/2016/09/02/4-0-minimum-requirements-3-2-extended-support/
> > 
> > Note that those are bare minimum requirements, and that you will
> > probably want more. If you need to run windows HVMs, I'd say at least
> > double those recommendations.
> > 
> > I'm probably something of a power user, but used to run out of memory
> > regularly with 8gb and am about to run out of disk with 500gb.
> > 
> > I think perhaps we should consider adding a "recommended requirements"
> > section instead of just "minimum requirements".
> 
> Thank you. I have read that, and I have already settled on getting a 32 GB 
> laptop. My question, however, was whether it's expected that the upgrade 
> procedure will be difficult to the point where doing a full reinstall is 
> easier.
> 
> In particular, I'd like to know if existing QVM's will be compatible with 
> Qubes 4 (i.e. can I just back them up and load them into Qubes 4?).
> 
> Of course, if Qubes 4 isn't going to be out until much later, then the entire 
> question is moot anyway since I'll have no choice but to go for Qubes 3.2 
> anyway. That is the reason I was asking whether there is a release date for 
> Qubes 4 yet.

I've run into problems twice trying to upgrade so a full reinstall with backup 
vms was much easier and quick too.  one note is if you have custom templates 
use clones instead of defaults to make restoring easier.

most likely you will have to use Qubes 3.2 for a while. Probably a good idea to 
go to 3.2 first before v 4 if you're restoring older backups. which I know will 
restore fine on 3.2.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eb5f32c0-0fc9-4ee3-a734-fb5c4b798c39%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4 Release Date

2017-03-07 Thread raahelps
I think most new users want more passthrough like gpu. IMO if I want to be 
secure on my pc i try to avoid those things.  I have a separate machine for 
gaming for example.  But I guess the idea of qubes is to be able to do risky 
things more securely in isolated manner and is originally aimed at home users.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a12730a3-111f-4dd8-bf17-5748a49f1fcd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Asus H97M-E

2017-03-05 Thread raahelps
On Saturday, March 4, 2017 at 3:37:25 PM UTC-5, Timo Saarinen wrote:
> 

nice 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b8663656-b24c-4ed6-9d6e-1a7df203562d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Attaching a single USB device to a qube (USB passthrough)

2017-03-05 Thread raahelps
On Saturday, March 4, 2017 at 8:06:55 PM UTC-5, Francesco wrote:
> On Sat, Mar 4, 2017 at 5:14 PM,   wrote:
> 
> 
> On Saturday, March 4, 2017 at 10:18:18 AM UTC-5, Francesco wrote:
> 
> > Hello,
> 
> > for the first time I am trying this new feature of Qubes 3.2 with the idea 
> > of using attaching a scanner to a scannerVM.
> 
> >
> 
> > Fist installed qubes-usb-proxy and simple-scan in the template from which 
> > both sys-usb and scannerVM depend.
> 
> >
> 
> > Then connected the usb cable and the scanner appeared in sys-usb terminal:
> 
> > user@sys-usb:~$ lsusb
> 
> > Bus 003 Device 005: ID 04a9:190f Canon, Inc.
> 
> > but
> 
> > it does not show in dom0 with
> 
> > qvm-usb
> 
> > as taught at the end of this document:
> 
> > https://www.qubes-os.org/doc/usb/
> 
> > In fact only the webcam appears there.
> 
> >
> 
> >
> 
> > So which is the difference between webcam and scanner? Perhaps that the 
> > webcam was already installed at boot, while the scanner was connected 
> > after? But from a security point of view is it advisable to boot with the 
> > scanner already connected?
> 
> > Best
> 
> > Fran
> 
> 
> 
> did you install proxy in the usb vm too?> 
> 
> 
> yes 
>  not sure havent; tried with a scanner only printer.  I still print and scan 
> over network with a raspberry pi that i set up on earlier version of Qubes.
> 
> 
> That may be a cleaner way to do that 
> 
>   I;ve gotten android phone to work as single usb device though too.  maybe 
> scanner use some diff protocol or port?
> 
> 
> 
> May be, but it seems strange that qvm-usb does not see it
> 
> Best
> 
> Fran 
> 
> 
> 
> 
> 
> --
> 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> 
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users...@googlegroups.com.
> 
> To post to this group, send email to qubes...@googlegroups.com.
> 
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/5fe54565-d6f7-4aa3-a61d-28ed0e0cefbb%40googlegroups.com.
> 
> For more options, visit https://groups.google.com/d/optout.

did it work with it plugged in at boot?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/99c1aacc-d9c2-43ec-b11f-24279246a61c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: fedora-24 update error: nothing provides ostree-libs(x86-64) >= 2016.14 needed by flatpak-0.8.3-3.fc24.x86_64

2017-03-05 Thread raahelps
On Sunday, March 5, 2017 at 5:31:48 AM UTC-5, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-03-03 15:41, raahe...@gmail.com wrote:
> > On Friday, March 3, 2017 at 6:38:24 PM UTC-5, raah...@gmail.com
> > wrote:
> >> On Friday, March 3, 2017 at 9:40:20 AM UTC-5,
> >> mitte...@digitrace.de wrote:
> >>> Hello fellow Qubes users,
> >>> 
> >>> If I execute update of the fedora-24 template via the Qubes VM
> >>> manager, it aborts with the error
> >>> 
> >>> nothing provides ostree-libs(x86-64) >= 2016.14 needed by 
> >>> flatpak-0.8.3-3.fc24.x86_64
> >>> 
> >>> If I use sudo dnf upgrade from the terminal within fedora-24
> >>> the command is executed, but later executions list the problem
> >>> with flatpack (broken dependencies)
> >>> 
> >>> of course I can remove flatpack, but I don't know whether I may
> >>> need it?!
> >>> 
> >>> thanks
> >> 
> >> I removed it haven't noticed any problems.  But I also wonder
> >> what it is.
> > 
> > Hopefully removing it did not lessen my security?
> > 
> 
> Relevant issue: https://github.com/QubesOS/qubes-issues/issues/2656
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYu+kAAAoJENtN07w5UDAweDQQAI+mO/IQk2Q8OV+O7HtjwcGb
> 91FDO8I8tL726x6glu3xKT32w9b4t5x8002lONNKF+VNOqhdbyXMgUenlejIVMzV
> Mil/BtTnfmi8OJ1zDeq1agOxYr/T6SecmObLpDG/FTy7tlGDVhRYVksKTQsHue2+
> Nbx01D4/hJzN55lpu/YQ18H23vTARGXTHNKCy+VPOn1GDQsuzkr2nv2twVwpyPwt
> IZCdEFP//y7/BfeXYGRlb0Z6P/gj8dFxmhsJPcHTGUuX2SzaxfKDQQjmHGVjsVrm
> GFfB7RpkbzBGK4VJ1KFIYSQsY6WZz3yJ6ch2hmu3LO/wXfjsoUzkAAn5jWjJ8zjm
> KmSkVvMshVmN+Ft02w0pAzrJtc2YFZttw6I2YXs/C6Dl84LUKubeCyXAwv2UEkLO
> 5BqgNuQ1R/TKaFHewiU9tyWVNtHFS9tYCvxEdJJkpZtbTVMEvlrKV1yOY0kyqJfG
> f6kcP/MmKR8bUSsJx8LiSKjJ7/ZX1CLLxbX5o5G5HfK00qq/59boOvIYtOi5pAed
> P+3/gZ5AV63etcFLRSdjMzO59dTsBNyN2OmkeWzxjTJYUxZYf50id2Qe65DnKhAH
> v9FOnju8ihlF0TDcyfGaJ88rIrbudEqJtf88+FjfXQLsrm2W8wr9ElxB4QmHJVQX
> yW3b48SuJTfLdHm138Fn
> =4Kzv
> -END PGP SIGNATURE-

yes but is removing flatpack bad for my security? maybe I should install it 
again?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6a0884cb-1854-4555-bf2b-f8a1402d5bd4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes and ram

2017-03-04 Thread raahelps
On Wednesday, February 22, 2017 at 10:35:11 AM UTC-5, Laszlo Zrubecz wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On 02/22/2017 04:09 PM, Ted Brenner wrote:
> > I have 8 GB of RAM and I feel like I can't have more than 3 AppVMs
> > open (with Chrome) before I hit a limit and can't open up anymore
> > appVMs. Could be my configuration in terms of what minimal amount
> > of memory I assign though I'm using everything as it comes right
> > out of the box. If someone can get 12, I must be doing something
> > wrong.
> 
> Well that 12 online VM are distrbuted something like:
> 
> sys-firewall
> WiFi
> Ethernet
> sys-usb
> 2 different VPN proxy VM
> 
> those are with only 300Mb initial 512Mb max memory.
> 
> the remaining ~6  AppVMs are starting with 512Mb to 2048Mb max.
> 
> Of course all depend on what you are suing in those VM's. But I
> usually have at least 1 browser +terminals  +mail clients open.
> 
> 
> - -- 
> Zrubi
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQIcBAEBCAAGBQJYra+gAAoJEH7adOMCkunmCkQQAI10dZeSNyrth4HpPYZFzOG0
> zgqVBdzfb0hQuG9ZVe0djVmEmn3kDueDFNDZx3xB28KrM3vuHLnW9jz8We1tkuAx
> MqhUXjcxzkJRu2ZuWwRiXPa/TWI3h3vIALZosgvuKhQJ/QVFzvqIQKf4gqPzszkn
> nglHgdrZK8rH90bxbFko798Ti7gU74tEIK3N6xq6/5KIRAC/9JJpCBr0zzmSqUaK
> srsq1Sn2Ve5vtQmSSL/QC7E6Qr8FUkwsJYOYEMwHubr7QkNGIfmyc6UfI1YkLo6z
> RjTZzxuyv7TXHa0sdK72NoLMI9xpoBTmWDiFTu5AYXiDo+Nc2mhXYa1iuYr2bPLy
> TM049KFGqUBd+RD2FT1vDx3JjkVGtYCgBQEBesypOFUnyZYRuc+nbuUTqVqm4g4g
> E72C9eKO2dH0IqaTYiBJQGyQVIK3k5cg/01brPhDFyWOV7ws2zzKwKHmRMJY0COc
> dKiI2P+1w52Xo7XJ7OS/rB6M8A7h9d09dDw92fUGZdBl/vAYObnFAL8/+7pERZz7
> YydSnTjY9k+OG05f4kd+PrCjV2BJSNkmNT2VyzIHKI5EaRwLsOcMWPvmp8TvjG3Y
> Xzzo7uUE0BDZ67iiH5D4NFDmWaqnDXLl7z486e1MqPosWozm1Kta+bma9TqHRaQt
> zYzHA79W2uCaBimT7eKU
> =xQ1o
> -END PGP SIGNATURE-

ya just browsing can eat all 8gb of ram nowadays haha.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82ae3fc5-f131-49a0-8790-9a8b9d6d2a1e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes and ram

2017-03-04 Thread raahelps
On Wednesday, February 22, 2017 at 10:09:31 AM UTC-5, Ted Brenner wrote:
> I have 8 GB of RAM and I feel like I can't have more than 3 AppVMs open (with 
> Chrome) before I hit a limit and can't open up anymore appVMs. Could be my 
> configuration in terms of what minimal amount of memory I assign though I'm 
> using everything as it comes right out of the box. If someone can get 12, I 
> must be doing something wrong.
> 
> 
> On Wed, Feb 22, 2017 at 4:55 AM, Zrubi  wrote:
> -BEGIN PGP SIGNED MESSAGE-
> 
> Hash: SHA256
> 
> 
> 
> On 02/22/2017 11:36 AM, sgshsjj...@gmail.com wrote:
> 
> > How does Qubes uses memory? I use about 20VMs (AppVMs, NetVMs,
> 
> > ProxyVMs, etc) and i don't see any difference between 8 and 16 gigs
> 
> > on laptop, does it make sense to add more memory?
> 
> 
> 
> there is no such thing as too much RAM. :)
> 
> 
> 
> I'm using ~12 online VMs  and usually hitting memory limits of my 8Gb.
> 
> 
> 
> - --
> 
> Zrubi
> 
> -BEGIN PGP SIGNATURE-
> 
> Version: GnuPG v2
> 
> 
> 
> iQIcBAEBCAAGBQJYrW4gAAoJEH7adOMCkunmDooP/RVipZoCy6sIaYxMH83Cuz4V
> 
> HLVZjYPRxss/GiXf59XA/0XmnXTEBt9KoZQEr4JQ3MwaJUzL3r4wsdb4IL0DdEgO
> 
> NzcCGnLaOI4y2KXVOBRiKOyTYi0FujNorMGCpNdmW4BWmtPjq4jWiwcXLPnsWd35
> 
> ZrPKTCdmtBHQLRtZv4TLIfso1d2RKMtpBHKmlLDwGOlt4WC2mKnNdRFLGoSe4waM
> 
> dCfiKjyiWHhPSwhR1o/PzvnMe0N5NgC8AvwVEd52NqZHfjDks3IS1qgLPhRQ5KPO
> 
> QlWN+2cmQpYfpSPmJAM1g4eWheuh+6OcJLieFjDqdqYj3zFnclEQnGKlD0XRRfg6
> 
> T+tMI/akoIh5NcxTGdRLz5WdKI2VzF699GW0dJ5H5TWw4W7BQkhQrNUQRgeZNhp8
> 
> 6IpTrgBNaYiyg7pXXMv/0lq0QslV/0Onmg/dYc/g7wQHGVk6N8g40/J2r6uckZNu
> 
> Py5nNDBEiLLkAk5KLuq9isXIo5BlcJvxNvOvvrcaMU32wgjDClr5in4Qo9ea3R/o
> 
> 48zFzz2kbHtlS40STPE3FFI+pNxk9NiH7s2Oao2Jy9p/to6+8a7kCU2jl7KZC6Bs
> 
> x36GToI6OUNZur5IiWvc8cHrC4H2yXl/ONlezR26VGxNjgBmeSxe+xDJZnlvw7uU
> 
> cDb9JeORSf7zWpQGShVl
> 
> =jySu
> 
> -END PGP SIGNATURE-
> 
> 
> 
> --
> 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> 
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users...@googlegroups.com.
> 
> To post to this group, send email to qubes...@googlegroups.com.
> 
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/bae9891a-e216-dab9-4c30-3606ab69842a%40zrubi.hu.
> 
> 
> 
> For more options, visit https://groups.google.com/d/optout.
> 
> 
> 
> 
> 
> -- 
> 
> Sent from my Desktop

haha no u doing it right,   I saw 20 vms for 8gb and was like what!>!   Depends 
on what you using your vms for. whats running on them etc...  in other words 
you actually use your pc for more then just looking at it.

on my 8g i can only have like 6 or 7 vms running, including sys-vms.  on the 16 
gb machine about double that.  before I notice slowdown. or dom 0 ram going 
down.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7593856d-b7ec-4a78-8a5e-95fd71795442%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: shrink ntfs from qubes - what do use for this?

2017-03-04 Thread raahelps
diskpart on a windows boot disc? or make ur own boot media.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2d09c94f-bc98-49b4-a2c5-f9365dce5190%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Mssing WiFi capabilities Qubes OS R3.2

2017-03-04 Thread raahelps
On Saturday, March 4, 2017 at 11:35:12 AM UTC-5, hela...@gmail.com wrote:
> It loads the module R8723AU for the WiFi and that seems ok. On Lenovo the 
> WiFi card is listed under lsusb as an usb device. Do I then have to add the 
> whole USB controller to sys-net to be able to manage it ?

ya

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e945af59-628b-4242-a974-eaf5687e8e4e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fedora-24 Template Corrupted?

2017-03-04 Thread raahelps
On Saturday, March 4, 2017 at 7:48:27 AM UTC-5, qub...@tutanota.com wrote:
> --
> 
> 
> Securely sent with Tutanota. Claim your encrypted mailbox today!
> 
> 
> https://tutanota.com
> 
> 3. Mar 2017 23:35 by raah...@gmail.com:
> 
> On Friday, March 3, 2017 at 10:56:26 AM UTC-5, qub...@tutanota.com 
> wrote:Fedora-24 template shows updates available. However updates terminal 
> returns error [cannot copy/past results]. I then open gnome terminal and get 
> the following:
> [user@fedora-24 ~]$ sudo dnf update
> Last metadata expiration check: 2:23:51 ago on Fri Mar  3  2017.
> Dependencies resolved.
> 
>  Package   Arch  Version   Repository  
> Size
> 
> Skipping packages with broken dependencies:
>  gnome-software    x86_64    3.22.5-1.fc24 updates    9.3 
> M
> 
> Transaction Summary
> 
> Skip  1 Package
> 
> Nothing to do.
> Sending application list and icons to dom0
> The above output from gnome terminal is completely different from the updates 
> terminal - which refers to skipping "flatpak" package.
> To resolve I reloaded Qubes OS 3.2 but got same errors.
> Any thoughts?
> 
> 
> --
> 
> 
> Securely sent with Tutanota. Claim your encrypted mailbox today!
> 
> 
> https://tutanota.com
> I had the same exact issue. And yes you only get the message when running the 
> update from the qubes-manager, which halts the update.
> If updating manually from a terminal it will just skip that package and 
> proceed with rest of the updates.
> 
> What I did was sudo dnf autoremove and then sudo dnf remove flatpak and just 
> hit y to remove dependencies that were listed.  I haven't noticed any 
> problems running my vms after doing so, but I also wonder what it is.
> 
> 
> This issue has been fixed for me - Today, New template updates are available 
> from Fedora; - this installed 6 new packages associated with "flatpak"

well i;ve already removed them all lol.  hopefully that didn;t hurt my security.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3853530-b278-49af-ac08-c98da390dd4d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Attaching a single USB device to a qube (USB passthrough)

2017-03-04 Thread raahelps
On Saturday, March 4, 2017 at 10:18:18 AM UTC-5, Francesco wrote:
> Hello,
> for the first time I am trying this new feature of Qubes 3.2 with the idea of 
> using attaching a scanner to a scannerVM.
> 
> Fist installed qubes-usb-proxy and simple-scan in the template from which 
> both sys-usb and scannerVM depend.
> 
> Then connected the usb cable and the scanner appeared in sys-usb terminal:
> user@sys-usb:~$ lsusb
> Bus 003 Device 005: ID 04a9:190f Canon, Inc. 
> but 
> it does not show in dom0 with 
> qvm-usb
> as taught at the end of this document:
> https://www.qubes-os.org/doc/usb/
> In fact only the webcam appears there.
> 
> 
> So which is the difference between webcam and scanner? Perhaps that the 
> webcam was already installed at boot, while the scanner was connected after? 
> But from a security point of view is it advisable to boot with the scanner 
> already connected?
> Best
> Fran

did you install proxy in the usb vm too?>  not sure havent; tried with a 
scanner only printer.  I still print and scan over network with a raspberry pi 
that i set up on earlier version of Qubes.  I;ve gotten android phone to work 
as single usb device though too.  maybe scanner use some diff protocol or port?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5fe54565-d6f7-4aa3-a61d-28ed0e0cefbb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Time sync failed

2017-03-03 Thread raahelps
On Wednesday, March 1, 2017 at 11:03:01 AM UTC-5, Richard wrote:
> My clock is not syncing and I can't figure out what the issue is.  Any 
> assistance would be greatly appreciated.
> 
> I'm running Qubes 3.2 (R3.2)
> 
> From Dom0:
> $ qubes-pref
> clockvm   : sys-net
> default-fw-netvm  : sys-net
> default-kernel: 4.4.38-11
> default-netvm : sys-firewall
> 
> $ qvm-sync-clock --verbose
> --> Waiting for network for ClockVM.
> Time sync failed! - Exiting
> 
> $ timedatectl status
> Failed to query server: Input/output error

any special firewall settings on the sys-net vm?  What about the router or 
gateway connection?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c4eecf68-3742-4d02-8a88-4d3ae3f7c00d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Mssing WiFi capabilities Qubes OS R3.2

2017-03-03 Thread raahelps
On Friday, March 3, 2017 at 12:25:25 AM UTC-5, hela...@gmail.com wrote:
> Hi,
> 
> I just installed Qubes R3.2 on a Lenovo Ideapad Yoga i7 with a Realtek 
> RTL8732 NIC. I can't see the NIC under  sys-netvm and hence can't change it 
> to a managed device. dmesg shows that it finds it, but the kernel module for 
> the NIC does not seem loaded. In the menu I can only see 'Device not managed' 
> for networking as would be expected.
> 
> I have read a few posts about Realtek cards being troublesome to use under 
> Qubes.
> 
> Unfortunately I'm not by my Qubes laptop writing this so I cant' post any 
> outputs from the machine.
> 
> Anyone have any ideas how to proceed ?
> 
> Thanks

Might want to check what driver module needed for fedora. or Maybe you need to 
use a diff kernel

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8b08a7bc-2f51-441a-91f8-d1274866b9ec%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: fedora-24 update error: nothing provides ostree-libs(x86-64) >= 2016.14 needed by flatpak-0.8.3-3.fc24.x86_64

2017-03-03 Thread raahelps
On Friday, March 3, 2017 at 6:38:24 PM UTC-5, raah...@gmail.com wrote:
> On Friday, March 3, 2017 at 9:40:20 AM UTC-5, mitte...@digitrace.de wrote:
> > Hello fellow Qubes users,
> > 
> > If I execute update of the fedora-24 template via the Qubes VM manager,
> > it aborts with the error
> > 
> > nothing provides ostree-libs(x86-64) >= 2016.14 needed by
> > flatpak-0.8.3-3.fc24.x86_64
> > 
> > If I use
> > sudo dnf upgrade
> > from the terminal within fedora-24 the command is executed, but later
> > executions list the problem with flatpack (broken dependencies)
> > 
> > of course I can remove flatpack, but I don't know whether I may need it?!
> > 
> > thanks
> 
> I removed it haven't noticed any problems.  But I also wonder what it is.

Hopefully removing it did not lessen my security?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2beae5b2-0435-4eb8-bc90-9e36f7db124b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: fedora-24 update error: nothing provides ostree-libs(x86-64) >= 2016.14 needed by flatpak-0.8.3-3.fc24.x86_64

2017-03-03 Thread raahelps
On Friday, March 3, 2017 at 9:40:20 AM UTC-5, mitte...@digitrace.de wrote:
> Hello fellow Qubes users,
> 
> If I execute update of the fedora-24 template via the Qubes VM manager,
> it aborts with the error
> 
> nothing provides ostree-libs(x86-64) >= 2016.14 needed by
> flatpak-0.8.3-3.fc24.x86_64
> 
> If I use
> sudo dnf upgrade
> from the terminal within fedora-24 the command is executed, but later
> executions list the problem with flatpack (broken dependencies)
> 
> of course I can remove flatpack, but I don't know whether I may need it?!
> 
> thanks

I removed it haven't noticed any problems.  But I also wonder what it is.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/33686c18-1c6b-497d-a06b-c854f5ee96ff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fedora-24 Template Corrupted?

2017-03-03 Thread raahelps
On Friday, March 3, 2017 at 10:56:26 AM UTC-5, qub...@tutanota.com wrote:
> Fedora-24 template shows updates available. However updates terminal returns 
> error [cannot copy/past results]. I then open gnome terminal and get the 
> following:
> [user@fedora-24 ~]$ sudo dnf update
> Last metadata expiration check: 2:23:51 ago on Fri Mar  3  2017.
> Dependencies resolved.
> 
>  Package   Arch  Version   Repository  
> Size
> 
> Skipping packages with broken dependencies:
>  gnome-software    x86_64    3.22.5-1.fc24 updates    9.3 
> M
> 
> Transaction Summary
> 
> Skip  1 Package
> 
> Nothing to do.
> Sending application list and icons to dom0
> The above output from gnome terminal is completely different from the updates 
> terminal - which refers to skipping "flatpak" package.
> To resolve I reloaded Qubes OS 3.2 but got same errors.
> Any thoughts?
> 
> 
> --
> 
> 
> Securely sent with Tutanota. Claim your encrypted mailbox today!
> 
> 
> https://tutanota.com

I had the same exact issue. And yes you only get the message when running the 
update from the qubes-manager, which halts the update.
If updating manually from a terminal it will just skip that package and proceed 
with rest of the updates.

What I did was sudo dnf autoremove and then sudo dnf remove flatpak and just 
hit y to remove dependencies that were listed.  I haven't noticed any problems 
running my vms after doing so, but I also wonder what it is.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/93482035-dab8-4bcd-a26b-dd3a75ca6378%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: tox & webcam

2017-02-21 Thread raahelps
On Monday, February 20, 2017 at 4:12:15 PM UTC-5, haaber wrote:
> Hello,
> 
> did anyone try out uTox (for example)? I had this in my pre-qubes  life.
> I wonder whether a specific cloned & enriched fedora-24-minimal VM would
> be a better solution, so I tried. Of course there is no binaries
> available for fedora :)
> 
> So question one would be how to obtain a required package list that
> allows to compile some software (in this example utox)  in a cloned 
> f-24 vm.
> 
> Question two ist how to attach the internal webcam: It is visible in a
> minimal-f-24 usb VM (using lsusb), I installed the missing
> qubes-usb-proxy : helas, the qvm-usb command is still not available.
> What do I miss?
> 
> Thank you, Bernhard

why not use debian for it instead, i believe its already packaged for it.

Im not sure whether webcam work in a vm using a  minimal template.  Maybe 
someone else will know. but i believe you install usb proxy package in the 
appvm too.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1d8afb26-c69b-4c35-b24e-a675c800e116%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Hardware problems after using Qubes 3.2

2017-02-20 Thread raahelps
On Monday, February 20, 2017 at 8:24:28 PM UTC-5, raah...@gmail.com wrote:
> On Friday, February 17, 2017 at 5:19:38 AM UTC-5, evolution wrote:
> > Hi everybody!
> > 
> > I have the very strange problem after using qubes.
> > It's hard to describe.
> > 
> > My Laptop (Thinkpad T520 4243) is now a bit louder and by going on
> > buttons, links and everything that has to do with grafics (plaing
> > videos, loading software or website) makes noise that is similar to the
> > noise of HDD while it works (i have SSDs). Just strange cracking. Not
> > very loud, but still good to hear.
> > 
> > For the first i thought it was just a malfunction of the laptop and i
> > send it back. But now i have a new one and become just the same problem.
> > 
> > I think it has something to do with the virtualization.
> > But i have no idea how can virtualization crash something in that way.
> > 
> > Cubes was running on SSD in the optical bay.
> > 
> > So as it seems, i crashed with qubes the second laptop and i don't know,
> > what should i tell the seller now.
> > 
> > Do somebody have an idea?
> > 
> > thanks!
> 
> could be anything.  I have a pc makes strange morse code beep-like sounds 
> when cpu is in low frequency, like when idle.  could be a fan, could be 
> something on mobo.  make sure all ur caps are ok on the mobo, (not bent or 
> ready to pop) if so most likely safe to ignore.  I've ignored it for 7 years.
> 
> In ur case its the extra frequencies needed for graphics and virtualization 
> processing that seem to be causing it which is more common.
> 
> What do u mean by qubes is crashing. do u get anerror message?

try diff power settings on the mobo.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cac38b56-75d2-4a47-ac26-caf730611a14%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Hardware problems after using Qubes 3.2

2017-02-20 Thread raahelps
On Friday, February 17, 2017 at 5:19:38 AM UTC-5, evolution wrote:
> Hi everybody!
> 
> I have the very strange problem after using qubes.
> It's hard to describe.
> 
> My Laptop (Thinkpad T520 4243) is now a bit louder and by going on
> buttons, links and everything that has to do with grafics (plaing
> videos, loading software or website) makes noise that is similar to the
> noise of HDD while it works (i have SSDs). Just strange cracking. Not
> very loud, but still good to hear.
> 
> For the first i thought it was just a malfunction of the laptop and i
> send it back. But now i have a new one and become just the same problem.
> 
> I think it has something to do with the virtualization.
> But i have no idea how can virtualization crash something in that way.
> 
> Cubes was running on SSD in the optical bay.
> 
> So as it seems, i crashed with qubes the second laptop and i don't know,
> what should i tell the seller now.
> 
> Do somebody have an idea?
> 
> thanks!

could be anything.  I have a pc makes strange morse code beep-like sounds when 
cpu is in low frequency, like when idle.  could be a fan, could be something on 
mobo.  make sure all ur caps are ok on the mobo, (not bent or ready to pop) if 
so most likely safe to ignore.  I've ignored it for 7 years.

In ur case its the extra frequencies needed for graphics and virtualization 
processing that seem to be causing it which is more common.

What do u mean by qubes is crashing. do u get anerror message?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1c42571d-ccb7-40c2-9e09-4f9f1c24b4f2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Error: Failed to synchronize cache for repo 'updates'

2017-02-20 Thread raahelps
On Monday, February 20, 2017 at 3:25:43 PM UTC-5, tai...@gmx.com wrote:
> I am using fedora 24 template vm, how can I fix this?
> The internet is filled with plenty of "resolved" questions about that 
> error but no actual help.

its happened to me a few times with fedora.  try again later.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/386ce208-c5b0-43bc-96cf-b7f476d770ff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: can't customize dispvm

2017-02-16 Thread raahelps
On Thursday, February 16, 2017 at 11:32:37 PM UTC-5, raah...@gmail.com wrote:
> When running qvm-run -a fedora-24-clone-dvm gnome-terminal
> 
> I get Domain '-a' doesnt; exist (service qubes.VMShell called by domain 
> fedora-24-clone
> 
> If I do it without the -a I get Request refused.  Sudo doesn't help.  Any 
> ideas?

nevermind I'm an idiot was using wrong terminal please delete this thread.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/457c45db-5f56-4ab9-b6a7-3bcc27b8fa7f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] can't customize dispvm

2017-02-16 Thread raahelps
When running qvm-run -a fedora-24-clone-dvm gnome-terminal

I get Domain '-a' doesnt; exist (service qubes.VMShell called by domain 
fedora-24-clone

If I do it without the -a I get Request refused.  Sudo doesn't help.  Any ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/91eadaa2-1a95-4b3f-b2de-ae83931512f4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation Media Self-Check Confusion

2017-02-14 Thread raahelps
On Monday, February 13, 2017 at 2:26:42 PM UTC-5, bf18...@gmail.com wrote:
> On Monday, February 13, 2017 at 1:07:44 PM UTC-6, raah...@gmail.com wrote:
> > On Sunday, February 12, 2017 at 7:33:43 PM UTC-5, bf18...@gmail.com wrote:
> > > Hello,
> > > 
> > > I have been trying to install R3.2 and even though I have tried burning 
> > > both usbs and dvds and using different burning programs (including just 
> > > dd for the usb) it always results in it saying that the .iso is 
> > > unsupported and the install media is fragmented (20 count with a md5 
> > > sum(I can include that if it helps)). The weird part though is that it 
> > > says it before the media check starts and if I let it finish the check it 
> > > say's that it passed and will continue to the graphical interface. I also 
> > > verified it before burning and the files were (reasonably) trust-able. 
> > > Does anyone have any advice on if it can be trusted in general or have 
> > > had this happen before?
> > > 
> > > Thanks in-advance for even glancing
> > 
> > what happens when it goes to the graphicsal interface?
> > 
> > have you tried it on diff ports, diff pc?
> > 
> > what mobo? how exactly are you verifying it?
> 
> When it goes to the interface everything seems exactly the same as it used to 
> for anaconda (I have used qubes before in some of its earlier forms and 
> release candidates). It even runs a standard install but I'm not sure why it 
> would continue when it usually refuses if anything faults.
> 
> I've tried two pc's, one using windows and one using deb. 
> 
> I've verified with gpg4win and reg gpg with sha251 checks. Mobo is intel 
> celeron.

so on the other two pc's u get the same self check error message?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9b3cc7f4-8b07-45b7-9306-c3ac81ac4f34%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Amnesic QubesOS

2017-02-14 Thread raahelps
On Tuesday, February 14, 2017 at 11:56:21 AM UTC-5, pri aif wrote:
> Would this work?
> 
> Install Qubes onto USB Drive then boot up setup all VMs update everything and 
> power off then plug writeblocker between USB-Drive and USB-Port boot up and 
> once done turn off and no writing changes to the USB-Drive have been done?
> Only ever boot without the write-blocker to install updates preferably from a 
> different network only ever used for updates.
> Could this be a workaround to the last thing Tails is superior in (amnesia)?

probably not, don't think its a goal of Qubes-os, this is for normal desktop 
users.  There is the option to use a disposable vm for everything if you want?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4df20460-bd06-480a-afd0-8826857d7012%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to safely use Wireshark in Qubes?

2017-02-14 Thread raahelps


isn't tcpdump just as vulnerable though if not more?

I run things like that in sys-net since i consider it extremely untrusted, but 
if you have the resources or want only specific streams,  sure a separate 
template or seperate vm i would assume is more secure.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/933bdaa4-c7c1-40e3-9285-9bc14d5701f3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation Media Self-Check Confusion

2017-02-13 Thread raahelps
On Sunday, February 12, 2017 at 7:33:43 PM UTC-5, bf18...@gmail.com wrote:
> Hello,
> 
> I have been trying to install R3.2 and even though I have tried burning both 
> usbs and dvds and using different burning programs (including just dd for the 
> usb) it always results in it saying that the .iso is unsupported and the 
> install media is fragmented (20 count with a md5 sum(I can include that if it 
> helps)). The weird part though is that it says it before the media check 
> starts and if I let it finish the check it say's that it passed and will 
> continue to the graphical interface. I also verified it before burning and 
> the files were (reasonably) trust-able. Does anyone have any advice on if it 
> can be trusted in general or have had this happen before?
> 
> Thanks in-advance for even glancing

what happens when it goes to the graphicsal interface?

have you tried it on diff ports, diff pc?

what mobo? how exactly are you verifying it?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fcb8ea95-9568-4174-a83e-899c693ecb87%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Cannot install Qubes 3.2 - black screen of death

2017-02-11 Thread raahelps
On Saturday, February 11, 2017 at 4:03:53 PM UTC-5, raah...@gmail.com wrote:
> On Saturday, February 11, 2017 at 11:38:29 AM UTC-5, qubesn...@gmail.com 
> wrote:
> > I am attempting to install Qubes, version 3.2, never having used any prior 
> > versions.
> > 
> > My computer is custom-built with the following components:
> > 
> > CPU: Intel Core i7-7700K Quad-core 4.2 GHz LGA 1151 Processor
> > Motherboard: GIGABYTE Aorus GA-Z270X-Gaming 7 (rev 1.0)
> > RAM: G.SKILL TridentZ Series 64GB
> > Primary HDD: Samsung 850 EVO 2.5" 500GB 3-D Vertical Internal SSD
> > CD-ROM: Pioneer 16x BD-R Blu-ray Burner (BDR-209DBK)
> > 
> > I tried installing using the following types of media:
> > 
> > -ISO burned to DVD
> > -ISO burned to USB using Rufus in Windows and selecting dd mode
> > -ISO burned to USB using dd in Debian
> > 
> > When none of these worked, I started searching this newsgroup for similar 
> > problems.  I found one suggestion that I tried, which was to add 
> > "GRUB_CMDLINUX_XEN_DEFAULT iommu-no-igfx" to grub.cfg - I could not do this 
> > one because I could not get the USB device out of read-only mode
> > 
> > I removed the "quiet" option from the install, but still no success
> > 
> > Afterward, I disabled VT-d in BIOS, but again, no success
> > 
> > Every time, I get the splash screen with the options for installation. For 
> > any option I pick, it gets to the point where I believe Xen is launching 
> > the graphics for the installer. At that point, the screen goes completely 
> > black.  In the case where I use the DVD, the drive stops spinning, and 
> > nothing else happens.
> > 
> > I am at a loss, and any help would be greatly appreciated.
> 
> hmm  tried a diff usb stick,  checked the signatures of the downloaded iso, 
> used only onboard gpu unplug pcie one. check gpu bios options,unplug all 
> other usb devices,  check mobo for options,  update mobo bios,  does the 
> baremetal fedora 24 installer work?
> 
> That board looks like it should work good with qubes,  if I can think of 
> anything else I'll post back.
> 
> Also

oh and legacy boot mode.  check usb controller options too.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bb643148-619c-4125-beef-11141f1793b4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Cannot install Qubes 3.2 - black screen of death

2017-02-11 Thread raahelps
On Saturday, February 11, 2017 at 11:38:29 AM UTC-5, qubesn...@gmail.com wrote:
> I am attempting to install Qubes, version 3.2, never having used any prior 
> versions.
> 
> My computer is custom-built with the following components:
> 
> CPU: Intel Core i7-7700K Quad-core 4.2 GHz LGA 1151 Processor
> Motherboard: GIGABYTE Aorus GA-Z270X-Gaming 7 (rev 1.0)
> RAM: G.SKILL TridentZ Series 64GB
> Primary HDD: Samsung 850 EVO 2.5" 500GB 3-D Vertical Internal SSD
> CD-ROM: Pioneer 16x BD-R Blu-ray Burner (BDR-209DBK)
> 
> I tried installing using the following types of media:
> 
> -ISO burned to DVD
> -ISO burned to USB using Rufus in Windows and selecting dd mode
> -ISO burned to USB using dd in Debian
> 
> When none of these worked, I started searching this newsgroup for similar 
> problems.  I found one suggestion that I tried, which was to add 
> "GRUB_CMDLINUX_XEN_DEFAULT iommu-no-igfx" to grub.cfg - I could not do this 
> one because I could not get the USB device out of read-only mode
> 
> I removed the "quiet" option from the install, but still no success
> 
> Afterward, I disabled VT-d in BIOS, but again, no success
> 
> Every time, I get the splash screen with the options for installation. For 
> any option I pick, it gets to the point where I believe Xen is launching the 
> graphics for the installer. At that point, the screen goes completely black.  
> In the case where I use the DVD, the drive stops spinning, and nothing else 
> happens.
> 
> I am at a loss, and any help would be greatly appreciated.

hmm  tried a diff usb stick,  checked the signatures of the downloaded iso, 
used only onboard gpu unplug pcie one. check gpu bios options,unplug all 
other usb devices,  check mobo for options,  update mobo bios,  does the 
baremetal fedora 24 installer work?

That board looks like it should work good with qubes,  if I can think of 
anything else I'll post back.

Also

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a77b599-8d73-497c-91b2-25028f688555%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: What? Can I access a windows USB drive?

2017-02-10 Thread raahelps
Yes go to sys-usb in the start menu and select files.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ec361a0-1722-4de7-bbe5-06275f76e1d1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Just realized one of the major disadvantages of Qubes OS...

2017-02-01 Thread raahelps
On Tuesday, January 31, 2017 at 9:30:41 PM UTC-5, RSS wrote:
> > > no support for ipv6  
> > 
> > not really a problem. it is 2017 and I still haven't encountered any
> > situation where IPv6 is actually being used, despite working a lot
> > with computers and routers (IPv6 is there but nobody is using it...
> > Never ever had to use those ridiculous IPv6 addresses, yet)
> 
> Actually, I run IPv6-enabled mail servers, and I am (at least some
> times) getting IPv6 connections with Google's mail servers. This is
> fairly recent behavior. A good chunk of Amazon AWS has recently enabled
> IPv6. 
> 
> I rent (very cheap) two servers that have no public IPv4 IP addresses,
> only IPv6.
> 
> IPv6 is coming, count on it.

my isp going to start pushing ipv6 in a week or two.  I'm scared lol.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/df5ab178-35d7-4212-9340-6c0e7b275b2a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Possible to get usable Win7 gui?

2017-02-01 Thread raahelps
On Saturday, January 28, 2017 at 11:58:23 AM UTC-5, Jarle Thorsen wrote:
>  :
> 
> 
> 
> 
> hmm weird,  my windows 7 vm is a little laggy,  but I figured its normal.   
> it doesn't increase over time for me and doesn't seem that bad.  Have you 
> tried to set the windows system setting to performance mode?
> 
> 
> 
> If you try to do gpu intensive tasks it might be an issue though.
> 
> 
> The only Windows version I have tried is Windows 7 Enterprise 64-bit, with 
> all default settings apart from installing Qubes Windows tools.
> Tried this HVM on both a "normal" system and a performance system with 
> *plenty* of resources. Assigning the win 7 HVM 16 vcpu and 10GB RAM makes no 
> difference 
> 
> I do not see any increase in lag over time though, as observed by Robert.
> 
> 
> 
> Maybe I'll try a different version of Windows just to be sure...

I use the qubes windows tools maybe that would help.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90217de6-f3f3-4376-b6fe-f1c130735106%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Weird DHCP Problems in sys-net (Qubes 3.2)

2017-02-01 Thread raahelps
On Tuesday, January 31, 2017 at 12:10:25 PM UTC-5, na...@riseup.net wrote:
> Hello,
> 
> a friend of mine updated recently from Q3.1 to Q3.2. Since then he has weird
> issues with connecting to the internet. It looks like sys-net is not able to
> get an IP-address via DHCP. If he sets up a manual connection with fixed
> IP-addresses it works. We unsuccessfully tried to hunt down the problems
> source.
> - He tried to change the template on which sys-net is based from Fedora
> 23 to
>   Fedora 24 (from the official Qubes repository)
> - He tried out to use different kernels: 4.4.11-11 and 4.4.38-11
> - It works on the same machine with a xubuntu-live-system.
> - Here is a log from a DHCP attempt:
> 
> [user@sys-net Documents]$ cat NM_log.txt
> -- Logs begin at Mon 2017-01-30 13:53:38 CET. --
> Jan 31 00:09:03 sys-net dhclient[1181]: DHCPDISCOVER on wlp0s1 to
> 255.255.255.255 port 67 interval 20 (xid=0x40ab3d7d)
> Jan 31 00:09:07 sys-net dhclient[1181]: receive_packet failed on wlp0s1:
> Network is down
> Jan 31 00:09:07 sys-net NetworkManager[540]:   WiFi hardware radio
> set disabled
> Jan 31 00:09:07 sys-net NetworkManager[540]:   (wlp0s1): device
> state change: IP-config -> unavailable (reason 'none') [70 20 0]
> Jan 31 00:09:07 sys-net NetworkManager[540]:   (wlp0s1): canceled
> DHCP transaction, DHCP client pid 1181
> Jan 31 00:09:07 sys-net NetworkManager[540]:   (wlp0s1): DHCPv4
> state changed unknown -> done
> Jan 31 00:09:07 sys-net NetworkManager[540]:   NetworkManager
> state is now DISCONNECTED
> Jan 31 00:09:07 sys-net NetworkManager[540]:   WiFi now disabled
> by radio killswitch
> Jan 31 00:09:07 sys-net NetworkManager[540]:   Failed to
> GDBus.Error:fi.w1.wpa_supplicant1.NotConnected: This interface is not
> connected: disconnect.
> Jan 31 00:09:07 sys-net NetworkManager[540]:   Failed to
> GDBus.Error:fi.w1.wpa_supplicant1.NotConnected: This interface is not
> connected: disconnect.
> Jan 31 00:09:29 sys-net NetworkManager[540]:   WiFi hardware radio
> set enabled
> Jan 31 00:09:30 sys-net NetworkManager[540]:   WiFi now enabled by
> radio killswitch
> Jan 31 00:09:30 sys-net NetworkManager[540]:   (wlp0s1) supports 5
> scan SSIDs
> Jan 31 00:09:30 sys-net NetworkManager[540]:   (wlp0s1):
> supplicant interface state: starting -> ready
> Jan 31 00:09:30 sys-net NetworkManager[540]:   (wlp0s1): device
> state change: unavailable -> disconnected (reason
> 'supplicant-available') [20 30 42]
> Jan 31 00:09:32 sys-net NetworkManager[540]:   (wlp0s1):
> supplicant interface state: ready -> inactive
> Jan 31 00:09:39 sys-net NetworkManager[540]:   (wlp0s1):
> Activation: starting connection 'Hide'
> (8d633039-62bf-4625-8639-b23b318c13ff)
> Jan 31 00:09:39 sys-net NetworkManager[540]:   (wlp0s1): device
> state change: disconnected -> prepare (reason 'none') [30 40 0]
> Jan 31 00:09:39 sys-net NetworkManager[540]:   NetworkManager
> state is now CONNECTING
> Jan 31 00:09:39 sys-net NetworkManager[540]:   (wlp0s1): device
> state change: prepare -> config (reason 'none') [40 50 0]
> Jan 31 00:09:39 sys-net NetworkManager[540]:   (wlp0s1):
> Activation: (wifi) connection 'Hide' has security, and secrets
> exist.  No new secrets needed.
> Jan 31 00:09:39 sys-net NetworkManager[540]:   Config: added
> 'ssid' value 'Hide'
> Jan 31 00:09:39 sys-net NetworkManager[540]:   Config: added
> 'scan_ssid' value '1'
> Jan 31 00:09:39 sys-net NetworkManager[540]:   Config: added
> 'key_mgmt' value 'WPA-PSK'
> Jan 31 00:09:39 sys-net NetworkManager[540]:   Config: added 'psk'
> value ''
> Jan 31 00:09:39 sys-net NetworkManager[540]:   Config: set
> interface ap_scan to 1
> Jan 31 00:09:39 sys-net NetworkManager[540]:   (wlp0s1):
> supplicant interface state: inactive -> associating
> Jan 31 00:09:39 sys-net NetworkManager[540]:   (wlp0s1):
> supplicant interface state: associating -> associated
> Jan 31 00:09:40 sys-net NetworkManager[540]:   (wlp0s1):
> supplicant interface state: associated -> completed
> Jan 31 00:09:40 sys-net NetworkManager[540]:   (wlp0s1):
> Activation: (wifi) Stage 2 of 5 (Device Configure) successful.
> Connected to wireless network 'Hide'.
> Jan 31 00:09:40 sys-net NetworkManager[540]:   (wlp0s1): device
> state change: config -> IP-config (reason 'none') [50 70 0]
> Jan 31 00:09:40 sys-net NetworkManager[540]:   Activation (wlp0s1)
> Beginning DHCPv4 transaction (timeout in 45 seconds)
> Jan 31 00:09:40 sys-net NetworkManager[540]:   dhclient started
> with pid 1503
> Jan 31 00:09:40 sys-net dhclient[1503]: DHCPDISCOVER on wlp0s1 to
> 255.255.255.255 port 67 interval 6 (xid=0xf3604a3b)
> Jan 31 00:09:46 sys-net dhclient[1503]: DHCPDISCOVER on wlp0s1 to
> 255.255.255.255 port 67 interval 12 (xid=0xf3604a3b)
> Jan 31 00:09:58 sys-net dhclient[1503]: DHCPDISCOVER on wlp0s1 to
> 255.255.255.255 port 67 interval 16 (xid=0xf3604a3b)
> Jan 31 00:10:14 sys-net dhclient[1503]: DHCPDISCOVER on wlp0s1 to
> 

[qubes-users] Re: can't get Qubes 3.2 to install on a Lenovo E560 Thinkpad [novice user]

2017-02-01 Thread raahelps
On Tuesday, January 31, 2017 at 10:33:59 PM UTC-5, mindflow...@gmail.com wrote:
> Hello. I am trying to install Qubes, I burned and verified it on a DVD. The 
> problem I am having is the install disk boots up, but while installing it 
> reboots during initrd.img loading. I followed this link which describes my 
> problem, but the installer does not have the options to edit the bootcode 
> that is described in this work around as far as I can figure. Any help 
> appreciated, thanks.

if legacy boot is an option on your board it will save you some headache.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0a27a71-0aa5-49b6-b7a9-265e46b9fad0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Memory and network problems

2017-02-01 Thread raahelps


dom0 has no network by design.  A major point of qubes security.

The failed to start load kernel modules message is safe to ignore.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/df2fc4ef-f9c2-4701-acf1-d2765832d7f9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Remove menu entries in XFCE on Qubes

2017-02-01 Thread raahelps
On Tuesday, January 31, 2017 at 10:36:03 AM UTC-5, qubes-user-000 wrote:
> I'm trying to remove an entry in the applications menu for fedora 23 that's 
> still there from when I updated to 24. How can I do this?

I think its alt f3 to get the editing mode for start menu.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cacf3854-30d8-48ed-aad6-a3446a549b40%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: secure payments w/ qubes via banking VM best practice?

2017-01-28 Thread raahelps
On Saturday, January 28, 2017 at 11:41:40 AM UTC-5, Grzesiek Chodzicki wrote:
> W dniu sobota, 28 stycznia 2017 01:16:57 UTC+1 użytkownik Oleg Artemiev 
> napisał:
> > Actually I've banking VM as recommended. I'm even lazy enough not to
> > rename it to avoid default configurations. )) I use it for all sort of
> > legal payments and so on.
> > 
> > I've used paypal account on banking VM to pass a paymant to some
> > service. The service redirects me to paypal . I copy url from personal
> > vm to banking vm, authorize paypal to pay. When I'm looking into
> > payment details I'm accidentally opening the receiver company url.
> > 
> > I'm not hidding currently, but this sort of click by occassion to a
> > link provided by a paymet detalisation is an addon to attack surface.
> > 
> > I can run one VM per bank or payment system. But that is annoying. Any
> > better ideas?
> > 
> > -- 
> > Bye.Olli.
> > gpg --search-keys grey_olli , use key w/ fingerprint below:
> > Key fingerprint = 9901 6808 768C 8B89 544C  9BE0 49F9 5A46 2B98 147E
> > Blog keys (the blog is mostly in Russian): 
> > http://grey-olli.livejournal.com/tag/
> 
> I emailed my bank and asked for a list of domains used by their webapp. They 
> were reluctant at first but after I explained what domain whitelisting is 
> they provided me with a list of URL addresses and added a note explaining 
> what exactly are specific domains needed for. I don't know if your bank will 
> be as helpful as mine but paypal surely will.

you can do trial an error with extension like scriptsafe.  then add them to 
your qubes firewall as well for extra layer.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/13c90811-29a9-4544-8acf-56f0742848b2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Suggestions for RBAC for grsecurity-enabled kernel?

2017-01-28 Thread raahelps
On Saturday, January 28, 2017 at 11:43:51 AM UTC-5, raah...@gmail.com wrote:
> On Wednesday, January 25, 2017 at 5:19:00 PM UTC-5, Kopimi Security wrote:
> > On Wednesday, January 25, 2017 at 6:22:14 PM UTC+1, raah...@gmail.com wrote:
> > > On Tuesday, January 24, 2017 at 9:15:10 AM UTC-5, Kopimi Security wrote:
> > > > On Monday, January 23, 2017 at 8:38:56 PM UTC+1, Reg Tiangha wrote:
> > > > > Yeah, I tried it myself leaving my laptop turned on and on learning 
> > > > > mode
> > > > > for three weeks straight, but it didn't catch everything and certain
> > > > > things still failed so there's definitely some manual massaging that
> > > > > needs to be done.
> > > > 
> > > > Thank you for your input!
> > > > 
> > > > Would you think a sniffing approach, or a tripwire approach, to be 
> > > > better*?
> > > > 
> > > > * On a RAM-limited system
> > > 
> > > what do you mean by sniffing approach?  
> > 
> > Sorry for being unclear, I'm not a native speaker.
> > 
> > By "sniffing", I meant to refer to active monitoring of known attack types, 
> >  a pro-active approach as opposed to a more after-the-fact intrusion 
> > detection system.
> > Kind of like watchdogs for memory, and snort for ports.
> > 
> > Google recently wrote up some advice for hardening KVMs: 
> > https://cloudplatform.googleblog.com/2017/01/7-ways-we-harden-our-KVM-hypervisor-at-Google-Cloud-security-in-plaintext.html
> > 
> > Their number one advice is using a pro-active approach.
> 
> I think by proactive approach they mean pen testing.

https://www.amazon.com/Basics-Hacking-Penetration-Testing-Second/dp/0124116442

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e735a6eb-4625-4e73-af53-1c836f760ee0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Suggestions for RBAC for grsecurity-enabled kernel?

2017-01-28 Thread raahelps
On Wednesday, January 25, 2017 at 5:19:00 PM UTC-5, Kopimi Security wrote:
> On Wednesday, January 25, 2017 at 6:22:14 PM UTC+1, raah...@gmail.com wrote:
> > On Tuesday, January 24, 2017 at 9:15:10 AM UTC-5, Kopimi Security wrote:
> > > On Monday, January 23, 2017 at 8:38:56 PM UTC+1, Reg Tiangha wrote:
> > > > Yeah, I tried it myself leaving my laptop turned on and on learning mode
> > > > for three weeks straight, but it didn't catch everything and certain
> > > > things still failed so there's definitely some manual massaging that
> > > > needs to be done.
> > > 
> > > Thank you for your input!
> > > 
> > > Would you think a sniffing approach, or a tripwire approach, to be 
> > > better*?
> > > 
> > > * On a RAM-limited system
> > 
> > what do you mean by sniffing approach?  
> 
> Sorry for being unclear, I'm not a native speaker.
> 
> By "sniffing", I meant to refer to active monitoring of known attack types,  
> a pro-active approach as opposed to a more after-the-fact intrusion detection 
> system.
> Kind of like watchdogs for memory, and snort for ports.
> 
> Google recently wrote up some advice for hardening KVMs: 
> https://cloudplatform.googleblog.com/2017/01/7-ways-we-harden-our-KVM-hypervisor-at-Google-Cloud-security-in-plaintext.html
> 
> Their number one advice is using a pro-active approach.

I think by proactive approach they mean pen testing. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f81ee0e2-0751-432b-9f64-68c79b1c0388%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Unable to start any VM. Getting: error starting vm: internal error: unable to reset PCI device 0000:

2017-01-28 Thread raahelps
On Thursday, January 26, 2017 at 7:07:10 PM UTC-5, Pietro Speroni di Fenizio 
wrote:
> On Thursday, January 26, 2017 at 2:43:41 AM UTC+1, Andrew David Wong wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> > 
> > On 2017-01-25 14:22, Pietro Speroni di Fenizio wrote:
> > > On Wednesday, January 25, 2017 at 11:13:54 PM UTC+1, Andrew David Wong 
> > > wrote:
> > > On 2017-01-25 13:27, Pietro Speroni di Fenizio wrote:
> >  Hello, we just installed a Qubes in a linux machine I had.
> > 
> >  Unfortunately the system seem to be unable to start any VM.
> > 
> >  I always get the same error: ERROR: internal error: unable to reset
> >  PCI device :03:00.2 internal error: Active :03:00.0 devices
> >  on bus with 000:03:00.2, not doing bus reset
> > 
> >  Can someone point me to the right direction? I seem stuck as
> >  anything requires me first to start a VM, but no VM seem to be able
> >  to start. In fact when the computer turns on at the beginning only
> >  dom0 is active and even sys-net and sys-firewall are inactive.
> > 
> >  Many thanks, Pietro
> > 
> > > 
> > > It sounds like you have this device assigned to more than one VM.
> > > Check the "Devices" tab in the VM Settings for each VM that has any
> > > devices assigned to it.
> > > 
> > > 
> > > Thanks,
> > > I just checked. Nothing is assigned in the other VM. Only sys-net had 2 
> > > of the three PCI assigned. Once I assigned the third it started working. 
> > > But now it gives me a Device not Managed next to the red network icon 
> > > above.
> > > 
> > > Thank you very much
> > > 
> > 
> > Have you tried setting pci_strictreset to false? (Make sure you understand 
> > the security implications first.)
> > 
> > https://www.qubes-os.org/doc/user-faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot
> > 
> > - -- 
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIcBAEBCgAGBQJYiVQ5AAoJENtN07w5UDAwXRsP/1miXII9AR/4fTQ5rHQGMGUs
> > /zDhB098GKLgfP+x415tV376HjcGVuLM2wD61BTx+6etJdljwjwvuQ9YSzCYX4Uy
> > AMzIPlwmC/H7/Mqi0L2Dv95paNepKQnOin+W3uFWqejhOInMSR7mwYm5Nb0HBbRu
> > omsMQ9hsGwjpE6FErbT6H15D9mVYlDSGI8+pHqTciTMZgRQORXz8vUUJB1b6lQ+0
> > BRoflHllYKILVmQd4QL9nzO3fBEApgSPf4Psmvzl+V4wxt2seL27hux5lqgzay9l
> > VgPeNkMfmUqWXQodfy/9NP0Vb1YwZpTumCiDNDDxO20ju8cwgn6bMe1rd3CMsDB8
> > lSJZRnJ93tYh12IXbxd1vkaORH47HtZhfXEHSsuBNic8kazHhIDjQhawYfVFQnXd
> > S4waYC/cdE2NlJqRNrCyjbyUJxD4i1Wq+MvVjm7u4WnAwlJAcMw1vGR8RsxUg9VD
> > W8jkyCLTNk3JTC1sydTHH++uZ4z6RZ77WaPgVmsB2Wnw/63iiHbqiomLniPJLsrS
> > FI2r2YgNm+SE/LsM4hVzug7cKnlrL2dwBmEOcRhDn1qHLe+66rxxrAWGT9lsjxh7
> > Vni+SR40kAkgP/PZAbiAoI+7o3UXnUVoKKRH7eC4GwzQ2B9q6nWMj21uY0W79Njc
> > 84Ko8UGtCu0PNezI/5jr
> > =YE9m
> > -END PGP SIGNATURE
> 
> Update:
> I restarted the sys-net and now it just says:
> Ethernet Network
>disconnected
> 
> And under VPN connections >
> 
> So far I seem to be unable to run the wifi, but maybe it will be explained 
> later.
> 
> Thanks to all. I will now set this as complete.

wifi's are very sketchy in linux.  might need specific driver.  might want to 
google how to install your specific model wifi on fedora.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ff1a8d9-2c11-4cce-8e5c-837369718fa0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Possible to get usable Win7 gui?

2017-01-28 Thread raahelps
On Sunday, January 1, 2017 at 3:17:39 PM UTC-5, Robert Fisk wrote:
> On 12/30/2016 01:33 AM, Jarle Thorsen wrote:
> > torsdag 29. desember 2016 13.14.25 UTC+1 skrev Grzesiek Chodzicki følgende:
> >> W dniu czwartek, 29 grudnia 2016 13:07:44 UTC+1 użytkownik Jarle Thorsen 
> >> napisał:
> >>> Currently my Windows 7 StandaloneVM feels a bit sluggish.
> >>>
> >>> Moving windows (no phun intended) is a pain.
> >>>
> >>> Is it possible to have a Windows VM without any lag, or is this just a 
> >>> part of the deal with Qubes OS?
> >>>
> >>> What tweaks should I do to get my Windows VM as responsive as possible?
> >>>
> >>> I have no problems with lag in dom0 or any of the Linux VMs.
> >>>
> >>> My display is 2560x1440, maybe a large display is part of my problem?
> >>
> >> VM Performance is largely dependent on the CPU and RAM so ensure that your 
> >> Windows VM has enough vCPUs and RAM assigned to it.
> > 
> > Throwing more vCPUs and RAM at it hasn't made a big difference so far, but 
> > I'm moving my system to a way more powerful system the next couple of days, 
> > hope that will make a difference.
> > 
> > Can anybody please confirm that it is indeed possible to have a lag-free 
> > Windows experience under QubesOS?
> > 
> 
> I run a Win7 VM on a i5 gen 4 ULV machine. I have always had problems
> with lag increasing over time. On bootup the VM is fast, but after 20
> min it is unusable with each screen redraw taking ~4 sec and associated
> high CPU usage. This has happened both on R3.0 and R3.2.
> 
> I work around the issue by using Remmina (or other RDP client) in an
> appVM, and allowing IP forwarding in the firewall vm. This solution does
> not suffer from increasing lag, and should be usable for everything
> except gaming. See instructions here:
> 
> https://www.qubes-os.org/doc/firewall/
> 
> 
> Regards,
> Robert

hmm weird,  my windows 7 vm is a little laggy,  but I figured its normal.   it 
doesn't increase over time for me and doesn't seem that bad.  Have you tried to 
set the windows system setting to performance mode?

If you try to do gpu intensive tasks it might be an issue though.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/42e347be-d073-431e-a21c-239b4199db81%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Mouse and Keyboard Stuck After USB Qube

2017-01-28 Thread raahelps
On Friday, January 27, 2017 at 9:24:38 AM UTC-5, jgmalh...@gmail.com wrote:
> I just created a USB Qube, following the instructions from 
> https://www.qubes-os.org/doc/usb/.
> Immediately after booting the new qube, my mouse and keyboard stopped working.
> 
> After that, I waited for around 15 min, and nothing changed. So I powerd off 
> my pc by pressing the button in the CPU.
> 
> When I turned it on again, my mouse and keyboard kept stuck in the page to 
> input the password. The keyboard worked during the GRUB fase. 
> 
> I'm pretty sure that I only need to give the USB's control back to dom0, but 
> I have no ideia how to do that now that I can't even log in. 
> 
> Has any one experienced similar problems? Do you know how I could solve that?
> 
> PS: Sorry for the grammar errors. I'm using my phone right now

Like andrew said unplugging the mouse and plugging it back in will prompt you 
to allow it.  Why your kb don't works I have no idea. Thats weird to me.  maybe 
its a uefi thing?  I use legacy boot mode.  Also check in your bios, there is 
sometimes options for allowing or disasble usb to work before os boots.  maybe 
that helps?

I use a usb to pci adapter for my keyboard on desktop with only one controller. 
I think most laptop kb's are already pci?

On another machine i have two controllers and use one on dom0 just for kb and 
mouse.  the other controller i have on sys-usb for all other usb devices.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1af41b73-2c68-42bd-896b-152faaa116a8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: create new sys-net

2017-01-28 Thread raahelps
On Friday, January 27, 2017 at 4:00:43 PM UTC-5, haaber wrote:
> On 01/27/2017 09:47 PM, taii...@gmx.com wrote:
> > On 01/27/2017 10:11 AM, '01v3g4n10' via qubes-users wrote:
> >> On Friday, January 27, 2017 at 7:19:10 AM UTC-6, Bernhard wrote:
> >>> Hello,
> >>>
> >>> I still have my system bricked due to a dead sys-net.
> >>>
> >>> Could somebody help me to generate a new one, please?
> >>>
> >>> thank you, Bernhard
> >> Create a new VM : Name it, click the NetVM button then choose a color
> >> and template.
> >>
> >> Change sys-firewall to your new sys-net vm and use networkmanager or
> >> other means to establish connection.
> >>
> > Don't forget to check the "start on boot" option if you desire that.
> >
> Thank you that worked! Now my bricked system is only half-bricked :)
> 
> 1) fedora-24 is still in koma: it shows the mysterious  "ERROR: Cannot
> execute qrexec-daemon" and stays yellow.I consider (a) renaming it
> old-fedora, (b) moving it to the harddrive (to make space on SSD), (c)
> symlink it (d) install a fresh fedora-24 template.
>  
> Does this sound right / the most easy solution to you?
> 
> 2) my new debian based SYS-net can only acces ethernet. I installed the
> iwl-firmware in the template, and made sure the hardware is accessible
> in it. But that does not yet help. Do I have to verify the firmware
> in dom0 ?
> (wireless = intel 7620)
> Thank you, Bernhard

sorry didn't realize you were same person lol.

you just have to install it in the template used by the sys-net I believe.

maybe this thread will help.  
http://www.fedoraforum.org/forum/showthread.php?t=56694

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3332bcb6-ec1c-4eda-b07d-562fd4bf7d99%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: create new sys-net

2017-01-28 Thread raahelps
On Friday, January 27, 2017 at 8:19:10 AM UTC-5, Bernhard wrote:
> Hello,
> 
> I still have my system bricked due to a dead sys-net. 
> 
> Could somebody help me to generate a new one, please?
> 
> thank you, Bernhard

also I think deleting the sys-net and running the commands  qubes top.enabled 
sys-net
qubes state.highstate

will work?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c681730f-4dd4-4233-b75d-c30486676655%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] secure payments w/ qubes via banking VM best practice?

2017-01-28 Thread raahelps
On Friday, January 27, 2017 at 10:19:12 PM UTC-5, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-01-27 16:16, Oleg Artemiev wrote:
> > Actually I've banking VM as recommended. I'm even lazy enough not
> > to rename it to avoid default configurations. )) I use it for all
> > sort of legal payments and so on.
> > 
> > I've used paypal account on banking VM to pass a paymant to some 
> > service. The service redirects me to paypal . I copy url from
> > personal vm to banking vm, authorize paypal to pay. When I'm
> > looking into payment details I'm accidentally opening the receiver
> > company url.
> > 
> > I'm not hidding currently, but this sort of click by occassion to
> > a link provided by a paymet detalisation is an addon to attack
> > surface.
> > 
> > I can run one VM per bank or payment system. But that is annoying.
> > Any better ideas?
> > 
> 
> If you don't want to have separate VMs for different services, you
> could try using Qubes firewall rules. It won't be a clean solution,
> and you'll probably have to add a lot of CIDR blocks (so it'll be
> leaky, and there's the potential for overlap with servers you don't
> want access to), but it's probably your best bet.
> 
> Another option is a browser extension that allows you to whitelist the
> domains you want. This is less secure than Qubes firewall rules
> (because it's enforced from within the browser instead of from outside
> the VM), but it allows potentially much more fine-grained control than
> Qubes firewall rules currently allow.
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYjA2gAAoJENtN07w5UDAwZeUQAK39Il0DN4L1gBJ3//JypcfO
> piM30qsaDeN/XSMqWlPKqBQm44zCHEBSJrNLM2M+FyBpOKoSfVaRe846iWzS8UFZ
> woSqfrDwFU2nMsnjmcmpDYb6dxiq/h1NfH7LSIVyAxDzeGaiyGto6qn5nPzAaT7l
> QtnTGJSYs12j1Xhfmd28CM+7s6lcZiCz3l7KUlJA0sPuoAVpib5bqQLyqrYN712B
> USB2blFZ7M6HNKb4DoKBt2M+CAm3AlYpYDeVcwmysYRTrBZ1W8ERMQL0LY50M74z
> 77zICisRC3l9XT/u79roh4M4c6xNFT7YsZn6rG+YKaMJxSUVBVlNHcTAOAYTlvvM
> lQkKGcc6aCpdOZuii+GkOlSZ7IkF4w188y5Obwvl0Qbll1i73lP6BbXvKZV3seEB
> yXiP1VKUhsiB4f+G5ne0G0fYXKyhRxwUcnpfTXHsU+qitvBxuOsSVv4lLFrRSuIu
> a85OcnSzZDQCoLFjcWIbd9oEeEuZ5ZR1I/gFo61h2zJbXbxcGxFeORZ/5XpCE4Dq
> kEqDMbDNY9opxlegHg2u64vRItHxrTPHyFRY26z3Sl+g5oi0843iB/GFMKmGboeH
> uFjM10GbM/e6UGfOwkryuB+WQrUXOE5DQvBseNj75xqhPMlcHkRzn+d6j3EdtO2I
> /Z6BaxTN1yjB/iZvA+en
> =AENa
> -END PGP SIGNATURE-

I do both. Allowing specific https domains only.  I tried to go by ip address 
only but it got crazy after a while.

I use chromium with apparmor, https everywhere and scriptsafe.  

Also I try not to copy form less trusted vm into more trusted no matter what.  
It takes strict discipline like a shaolin monk..haha

When I do shopping.  I use a disposable vm always, cause alot of websites 
require some unencrypted pages. I preferably use paypal,  or a credit card that 
is only used online. two factor everything.  I keep separate banking vm and 
major credit cards vm.  separate store cards vm if page is secure.   and dispvm 
for everything else like shopping sites.  Always create a diff dispvm for diff 
transactions.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aaf49751-ccf3-4ca5-8748-8be166d3fbf9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: unable to shutdown sys-net

2017-01-28 Thread raahelps
On Saturday, January 28, 2017 at 4:45:57 AM UTC-5, Pietro Speroni di Fenizio 
wrote:
> First of all I am excited to say that I got Quebes to work for a brief, 
> although exciting evening.  Thanks to all. Now it is not working again and I 
> am trying to understand what is going on. Some problems which seemed solved 
> appeared again. In fact they seemed to appear after I updated dom0.
> 
> In any case right now the problem is:
> I try to restart the various VM, but the sys-net VM will not shutdown, and 
> always tells me that The VM 'sys-net' hasn't shutdown within the last 20 
> seconds, do you want to kill it?
> 
> If I wait for another 20 senconds I just receive the same message. If I kill 
> it I don't.
> 
> Is there any problem in killing it? Can I find out why this is happening? I 
> tried to run a ps -a to see what was running, but I could not see anything 
> running. While ps -ax gave me a list so long, that my noob eyes got lost 
> unable to find anything important.
> 
> Should I worry?
> 
> 
> Thanks.

How much memory you got?

if you worried just delete the vm and recreate it. I believe you can with: 

qubesctl top.enable sys-net
qubesctl state.highstate

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4fded8fb-71cc-4943-a3fe-e7f14caa1dc8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] mounting external encrypted (LUKS-debian8) hard drive ??

2017-01-28 Thread raahelps
On Saturday, January 28, 2017 at 5:57:51 AM UTC-5, ThierryIT wrote:
> Sorry for  all this noise 
> I have mounted "xvdi5" with success.
> But: unknown filesystem type: LVM2_member
> 
> Something to install on this vm  ?
> 
> Thx
> 
> Le samedi 28 janvier 2017 12:54:07 UTC+2, ThierryIT a écrit :
> > > My mistake.
> > > I  did it  from  "dom0" 
> > > 
> > dom0:sdb WD.698G (attached to vm-test as 'xvdi')
> > dom0:sdb5 WD690G 
> > dom0:sdb1 ...
> > dom0:sdb2
> > etc 
> > 
> > If I try to mount xvdi as LUKS: It is not a valid LUKS
> > I do think that the right partition  to mount should be "sdb5" ... How to  
> > mount  "sdb5" ??
> > 
> > Thx
> > > 
> > > Le samedi 28 janvier 2017 12:43:57 UTC+2, ThierryIT a écrit :
> > > > qvm-block  command not found ... ??
> > > > I am right to do  it  from my vm-test ?
> > > > 
> > > > Thx
> > > > 
> > > > Le samedi 28 janvier 2017 12:10:26 UTC+2, Andrew David Wong a écrit :
> > > > > -BEGIN PGP SIGNED MESSAGE-
> > > > > Hash: SHA512
> > > > > 
> > > > > On 2017-01-28 01:45, ThierryIT wrote:
> > > > > > Hi,
> > > > > > 
> > > > > > I have installed with success  Qubes 3.2  on my Lenovo W520. I ma
> > > > > > bit by bit playing  with it. I would like to have access to my  old
> > > > > > encrypted hard drive, still do remember the passphrase :) I have
> > > > > > build a new vm, let's call it "vm-test" I  have attached the block
> > > > > > device to it, seems to be good  ... But after ? How to mount it ??
> > > > > > 
> > > > > > Thx
> > > > > > 
> > > > > 
> > > > > It's probably mounted as /dev/xvdi (you can check with qvm-block).
> > > > > So, in vm-test, try something like:
> > > > > 
> > > > > $ sudo cryptsetup open /dev/xvdi hdd
> > > > >   
> > > > > $ sudo mount /dev/mapper/hdd /mnt/removable
> > > > > $ cd /mnt/removable
> > > > > $ ls
> > > > > 
> > > > > - -- 
> > > > > Andrew David Wong (Axon)
> > > > > Community Manager, Qubes OS
> > > > > https://www.qubes-os.org
> > > > > -BEGIN PGP SIGNATURE-
> > > > > 
> > > > > iQIcBAEBCgAGBQJYjG4DAAoJENtN07w5UDAwQO0QAMPg3I4YoMMxMRcJSt6ds8/i
> > > > > qdTXOg5YrG9dglctSfK9FWdr066wdar/8k7R9DIyX/ndg8p9sfPXq8Gdlzw0KiEH
> > > > > G6kLAXVZN4qQ4fQYnMhZE6AhUlj6ZjsPA6+BUr4NyzoCyd0z0wfhyvm2ulR8VoUA
> > > > > /FiZOFYWQ2oFnJed4LUV3KgaT9TOo969zbZ306KsFUV6CqZw38My4B8qfqr0/qC4
> > > > > RklCHG/D230AXAq9PtOY1wH/sCbNFR8wqnUoNIIT+qPxWtnXZFtcNZuqmiKiSDAB
> > > > > WdlnJEJ0ktDRT99RhrIcnTDLBXel/e0l9Y6YtV+spVPhPdPMRcppeyQzboAtPTfw
> > > > > UfA4wri5KuDROgJ5RpopkfyXyEJz7yWg8hQXyfqRKf+IDoIHxEyhYA8v0CDBjACT
> > > > > 3zu7SFn21ki9N94SV7wTL0ODQjVTNtrtlHB/jrs2/s0HVacxIxOm9DbuDdCAHNqO
> > > > > OAj+NjSNa2jcXlF1/l24hsEAabBVMUrPhtPeaw7WoTxkADv1KM5lNUS4mcYhwsPg
> > > > > BfLjtsTcaYKRQaxi26WcAzdem2kUhHG31RzSAEAuHXTC0S+aEJv3UgAf++Xhn/F2
> > > > > nBgYV2hz5WlU6u5OdBLQppUXPEuwKhwp7Um5hUKHFN3+eYK9sPWbK2JpYc2i2lSs
> > > > > Qc4E/xMl/TLaJd1IHMfX
> > > > > =xkVz
> > > > > -END PGP SIGNATURE-

how did you encrypt the drive?   I have an external encrypted drive i use.  I 
simply open it with any file manager which prompts me for the encryption 
phrase.  nautilus should work?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62bfb877-1129-478e-8186-b92d074bb380%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Suggestions for RBAC for grsecurity-enabled kernel?

2017-01-25 Thread raahelps
On Wednesday, January 25, 2017 at 12:39:07 PM UTC-5, Reg Tiangha wrote:
> On 2017-01-25 10:24 AM, raahe...@gmail.com
> wrote:
> 
> > 
> > It should tell you what rbac is blocking in dmesg or journal no?  it will 
> > say gradm I believe.   You should also be seeing grsec and pax messages in 
> > there as well.
> > 
> 
> It probably did, although sometimes it'll say what was killed, but not
> specifically why. For example, if a process is denied access to a
> directory (ex. /var/run or something), it may not be specific enough.
> 
> But in my case, during training, there's a lot of crap that goes into
> dmesg, and I didn't discover the actual issues until I restarted the
> machines with the new rulesets and I never saved the syslogs before
> rebooting. In the case of the UpdateVM where no AppVMs were able to
> connect to it and thus wouldn't start, absolutely nothing appeared in
> the UpdateVMs logs, dmesg or otherwise. I assume it's some kind of Qubes
> process on the UpdateVM that failed to start (or it did but kills
> whatever is responsible for allowing an AppVM to connect), but I have no
> idea which one; like I said, the developer documentation is a bit
> lacking in terms of specifying what exact processes are responsible for
> certain tasks, and I think the architecture document is like 10 years
> old now and doesn't even reflect how the system works currently.
> 
> Anyways, I'm sure with some more troubleshooting I'd eventually be able
> to figure it out, but like I've said, I've dumped enough hours into this
> as it is. I'm hoping someone out there with more skill will be able to
> come up with a generic Qubes RBAC policy rule set, since I believe it's
> something the Qubes community could share among ourselves as whatever
> base rules are needed for the Qubes/Xen architecture to work properly
> under RBAC would be consistent across all VMs.
> 
> >
> > yes you can shut down the system in the middle of training.
> >
> 
> Ah, I did not know that. Will it pick up and append where it left off
> training wise on the next reboot? Or will it overwrite the training log?
> It did not occur to me to shut down in the middle because all the
> examples in the documentation say to put the learning log in /etc/grsec,
> so I just did it knowing that it'd get blown away on the next reboot. It
> didn't occur to me until after I finished testing that perhaps I should
> have put those logs in /home instead. But like I said, at that point, I
> had already wasted 3 weeks worth of time, and I didn't feel like trying
> again. Maybe I'll try again later, but I don't have the time right now.

well you got further then I ever did, lol,  if you get it working let us know.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5a5e4ef5-c4d8-42ba-8556-3d96b4332ce8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Suggestions for RBAC for grsecurity-enabled kernel?

2017-01-25 Thread raahelps
On Wednesday, January 25, 2017 at 12:24:57 PM UTC-5, raah...@gmail.com wrote:
> On Tuesday, January 24, 2017 at 10:32:18 AM UTC-5, Reg Tiangha wrote:
> > On 2017-01-24 7:15 AM, Kopimi Security wrote:
> > > On Monday, January 23, 2017 at 8:38:56 PM UTC+1, Reg Tiangha wrote:
> > >> Yeah, I tried it myself leaving my laptop turned on and on learning mode
> > >> for three weeks straight, but it didn't catch everything and certain
> > >> things still failed so there's definitely some manual massaging that
> > >> needs to be done.
> > > 
> > > Thank you for your input!
> > > 
> > > Would you think a sniffing approach, or a tripwire approach, to be 
> > > better*?
> > > 
> > > * On a RAM-limited system
> > > 
> > 
> > That could help with the networking stuff. When I said stuff failed for
> > me, I meant more along the lines of certain services or processes that
> > were getting killed by the kernel that may or may not be integral to the
> > way Qubes does things.
> > 
> > For example, I have both a FirewallVM and an caching UpdateVM running
> > squid. The only real difference between the two is squid; otherwise, the
> > UpdateVM is just a glorified FirewallVM. Therefore, one would expect
> > that the final RBAC ruleset after training between the two would only
> > differ with the squid bits.
> > 
> > After my training and applying the custom rulesets for each VM, for
> > whatever reason, no AppVM could connect to the UpdateVM once it was
> > active (and therefore, the AppVM wouldn't start), but they had no
> > problems connecting to the FirewallVM. So obviously, something was
> > missed when training the UpdateVM, but I don't know what it was.
> > Furthermore, since I don't know how Qubes is archetectured and what
> > binaries and libraries are responsible for certain functions (or even
> > where they live!), I don't know what to whitelist. And I don't want to
> > whitelist entire directories that have or need access for Qubes or Xen
> > bits like /usr/bin or /var because I'd be whitelisting a bunch of other
> > things I wouldn't want to be doing either.
> > 
> > That's just one example, though. There were some other things I
> > encountered as well, but I also concede that some measure of manual
> > massaging of rules is probably going to be inevitable in the end.
> > 
> > Could I figure out exactly what was failing with enough time by tracing
> > logs and whatnot? Sure, I suppose. But I've sunk in a lot of hours into
> > this project already so I don't have as much time to troubleshoot as I
> > did over the holidays. So I'm hoping someone smarter than me can figure
> > out next steps, at least when it comes to the RBAC stuff. Or at least
> > give some hints on what may need to be white listed.
> > 
> > When it comes to the unexpected behaviors that I encountered, I'm still
> > leaning towards certain things in the Qubes/Xen chain for various use
> > cases that are getting killed without warning that the training didn't
> > catch to add to its whitelist. The Grsecurity documentation says that a
> > process or library needs to be triggered at least four times during the
> > training in order for it to be a bit more lax when it comes time to
> > analyze the training log and whitelist more things related to that
> > binary or library rather than just whitelisting the binary or library on
> > its own, and so maybe certain processes that are needed for Qubes to
> > operate just weren't being called enough even after having three weeks
> > worth of training.
> > 
> > For example, stuff being called during start up and shut down would
> > never trigger that four time threshold, and it'd be hard to record since
> > an AppVM's root file system would be nuked every time (in fact, if
> > you're not careful with your training or how you invoke it, your VM may
> > not start because none of the Qubes startup processes would be captured
> > with the training; I worked around it by adding a line to rc.local to
> > start the training right away, which helped with start up, but I was
> > never able to find a way to capture what Qubes processes were
> > responsible when shutting down so I ended up having to kill all my VMs
> > to turn them off since RBAC would kill whatever processes were
> > responsible for shut down because it never caught them in its training).
> > 
> > Perhaps the training log could be made to be persistent by placing it
> > within /home, but I was under the impression that the system couldn't be
> > shut down in the middle of training. I could be mistaken, though, but I
> > never tried it regardless. I suppose one could write a shutdown script
> > that flushed the training log, the question would be when in the
> > shutdown process would it be called. It would need to be one of the last
> > things in the sequence, otherwise you would risk not catching everything
> > possible.
> 
> It should tell you what rbac is blocking in dmesg or journal no?  it will say 
> gradm I believe.   You should also be seeing 

[qubes-users] Re: Suggestions for RBAC for grsecurity-enabled kernel?

2017-01-25 Thread raahelps
On Tuesday, January 24, 2017 at 9:15:10 AM UTC-5, Kopimi Security wrote:
> On Monday, January 23, 2017 at 8:38:56 PM UTC+1, Reg Tiangha wrote:
> > Yeah, I tried it myself leaving my laptop turned on and on learning mode
> > for three weeks straight, but it didn't catch everything and certain
> > things still failed so there's definitely some manual massaging that
> > needs to be done.
> 
> Thank you for your input!
> 
> Would you think a sniffing approach, or a tripwire approach, to be better*?
> 
> * On a RAM-limited system

what do you mean by sniffing approach?  

 Tripwire is good to have but it will take alot of fine tuning as well so its 
not so noisy.  The open source version default setups are for outdated 
operating systems.  It also takes strict discipline so you don't miss nothing, 
don't forget to keep keys separate.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/99bff6b9-45da-44c3-a770-a77bdd96a94b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Another reason for Linux and QubesOS

2017-01-23 Thread raahelps
On Monday, January 23, 2017 at 2:13:43 PM UTC-5, raah...@gmail.com wrote:
> On Sunday, January 22, 2017 at 3:39:56 PM UTC-5, stevenwi...@gmail.com wrote:
> > Windows Update Prioritizing itself over Chrome
> > 
> > https://www.youtube.com/watch?v=GD3Lxyin8VY
> > 
> > 
> > 
> > I do not know if this applies to other applications than Chrome but this is 
> > ridiculous.
> > 
> > If i want to get something done then i dont want Updates to kill my 
> > connection.
> 
> you can block it with windows on built in firewall even on windows 10 home 
> edition.
> 
> What you can do is have a rule allow only dns service for svchost.exe (host 
> process).
> 
> Then another svchost.exe rule for everything else.  Keep that one always 
> blocked   Make sure to enable logging for windows firewall so you can see if 
> you did something in error.  Then only allow this one while updating.  and 
> block it again when done.

I've tried to have a svchost.exe rule that only allows the update processes,  
but coudln't get it working.  windows still auto creates firewall rules, and if 
you remove them they can come back.  But what you can do is set them to blocked 
when they appear.  Its usually only for the "apps" from store.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f6865b77-8cd6-42ea-9776-dd5388d3b4de%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Which templates update automatically?

2017-01-23 Thread raahelps
On Sunday, January 22, 2017 at 5:59:48 AM UTC-5, FWM wrote:
> From my experience, This auto check for updates doesnt seem to work properly.
> 
> The default templates definitely get checked for updates, but the cloned 
> templates never seem to. If i manually click the "Update VM system" on a 
> cloned template, it will often find updates.
> 
> I ran "qubes-set-update status" in dom0, and both were enabled.
> 
> Running Qubes OS 3.1

I believe its only templates that you have running at the time and connected to 
the internet that will get the update notice.  So I only have sys-net, 
sys-firewall, usually running at boot.  so those two templates will get checked 
first it seems.  so one is fedora and one is debian.   if one of them gets and 
update,  I check the clones of them as well.

On another note,  it would be nice to get popups to desktop or taskbar for 
template updates,  like when there is a dom0 update.  I still resort to just 
keeping the qubes-manager onscreen at all times. (although alsso to look for 
yellow triangles if any).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/80e4f977-c6af-4065-bf03-eb57e9a167ab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Attaching a USB printer scanner to Windows HVM via usbip (a workaround)

2017-01-23 Thread raahelps
On Monday, January 23, 2017 at 3:28:47 AM UTC-5, daltong defourne wrote:
> Hi!
> I've managed to plug a USB printer/scanner into Windows HVM via usbip (as 
> workaround to current USB/PCI passthrough woes)
> 
> Sharing with community:
> https://github.com/QubesOS/qubes-issues/issues/2597#issuecomment-274347172
> 
> NB! This thing requires that you have networking between windows HVM and your 
> usbvm (or whatever the USB controller has been passed through to)

can other appvms bet attacked by the usbvm after this setup?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/780d9374-1494-477b-87e8-bd7291d89731%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Chipping/Crackling noise on HDMI

2017-01-23 Thread raahelps
On Sunday, January 22, 2017 at 6:03:16 AM UTC-5, FWM wrote:
> Im running a HDMI cable from my GPU to my home theater system, and have set 
> the VM to use that Audio output.
> 
> Unfortunately im getting a chipping/crackling noise. I never used to get this 
> noise using the same setup but running windows, so i dont think its the 
> hardware or cable.
> 
> Any suggestions?

There is also a pulseaudio line you can edit in a config file.  I've had 
cracklings in the past,  I'll try to google it for you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87d1a1a9-4d19-4410-b586-3915b7b18664%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: All audio on streaming video out of sync

2017-01-21 Thread raahelps
On Saturday, January 21, 2017 at 2:55:37 PM UTC-5, raah...@gmail.com wrote:
> On Wednesday, January 18, 2017 at 8:02:12 PM UTC-5, Gaijin wrote:
> > On 2017-01-18 16:23, raahe...@gmail.com wrote:
> > > On Wednesday, January 18, 2017 at 12:44:28 AM UTC-5, Gaijin wrote:
> > >> On 2017-01-18 04:35, raahe...@gmail.com wrote:
> > >> > On Friday, January 13, 2017 at 9:03:03 PM UTC-5, Gaijin wrote:
> > >> >> All of the audio for videos played on my AppVMs, regardless of what
> > >> >> template it's based on (Fedora 24/Debian 8), or what browser I try
> > >> >> (Firefox/Chrome/Vivaldi), is completely out of sync. It's not just
> > >> >> YouTube, but Vimeo, self-hosted, etc.
> > >> >>
> > >> >> I tried uncommenting audio_low_latency in /etc/qubes/quid.conf in dom0
> > >> >> That didn't fix things.
> > >> >> I tried playing with the realtime-priority in /etc/pulse/daemon.conf
> > >> >> That didn't seem to make any difference.
> > >> >>
> > >> >> Are there any other places where I could try to fix this latency
> > >> >> issue?
> > >> >> I assume it's dom0 as everything is affected.
> > >> >
> > >> > whats your pc specs/ what soundcard?
> > >> 
> > >> I'm running Qubes R3.2
> > >> Sound is going through an nVidia GeForce GTX 560 Ti card. I don't have
> > >> nVidia drivers installed.
> > >> This machine has an Intel Core i7 2600 @ 3.40GHz CPU and 16.0GB
> > >> Dual-Channel DDR3 @ 665MHz RAM.
> > > 
> > > How are you plugging it in?  HDMI? if so you got further then I did.
> > > I dont' get sound from hdmi only video.   Why not just use the onboard
> > > sound card?
> > 
> > Oops I was going off an old hardware report from when this machine ran 
> > Windows. Got under the desk to check, and sound is going through the 
> > motherboard: ASRock H67DE
> > 
> > It operates fine usually, and never showed this sort of issue from Qubes 
> > 1.x-3.1. When I upgraded to Qubes 3.2 I started noticing this lag. I 
> > don't watch a lot of video so it took me a while to notice.
> 
> lag only with video? dunno,  maybe you can downgrade the dom0 kernel?

to throw some other ideas out there,  check bios settings, maybe disable the 
other card.   have u turned off hardware accel in the browsers? html, flash.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2b823467-218b-4597-9e76-fa12b0b3eea7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Detection - Best Way

2017-01-18 Thread raahelps
On Wednesday, January 18, 2017 at 12:27:54 AM UTC-5, Asterysk wrote:
> It struck me that Qubes could be very useful for Detection of "malware" by 
> placing a monitoring capability . My question is in two parts:
> 
> (1) Is Wireshark the best tool to use for this within Qubes
> (2) Should it be placed in Dom 0 (if indeed thats possible) or in the sys-net 
> or sys-firewall

would be safer in sys-net,  although sys-firewall would tell you which vm 
making the connection.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/526e10af-725a-4e45-a54c-4d2d2bac7c5c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: All audio on streaming video out of sync

2017-01-17 Thread raahelps
On Friday, January 13, 2017 at 9:03:03 PM UTC-5, Gaijin wrote:
> All of the audio for videos played on my AppVMs, regardless of what 
> template it's based on (Fedora 24/Debian 8), or what browser I try 
> (Firefox/Chrome/Vivaldi), is completely out of sync. It's not just 
> YouTube, but Vimeo, self-hosted, etc.
> 
> I tried uncommenting audio_low_latency in /etc/qubes/quid.conf in dom0
> That didn't fix things.
> I tried playing with the realtime-priority in /etc/pulse/daemon.conf
> That didn't seem to make any difference.
> 
> Are there any other places where I could try to fix this latency issue? 
> I assume it's dom0 as everything is affected.

whats your pc specs/ what soundcard?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1c5619e2-90e5-4ab4-a682-36f18100b11b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fw: Re: Problem: Convert to Trusted PDF Hangs

2017-01-17 Thread raahelps
On Saturday, January 14, 2017 at 9:03:15 AM UTC-5, Pushpins4u wrote:
> Forwarding to list.
> 
> 
> 
> 
> 
> copy the file to some other untrusted or disposablevm and see if it works 
> there.
> 
> 
> 
> That gave a clue.  Copying the untrusted PDF to my untrusted domain and 
> attempting the conversion there resulted in the same behavior.  However, 
> instead of receiving a "script hanging" error I received this message:
> 
> "Merging pages failed: convert: unable to extent pixel cache `No such file or 
> directory' @ fatal/cache.c/CacheSignalHandler/3394."
> 
> 
> 
> Each time after I received the OS pop-up message:
> 
> "Warning: insufficient memory to start disp"
> 
> 
> 
> And this error window:
> 
> "The remote party return invalid no of pages, aborting!"
> 
> 
> 
> -pp4u
> 
> 
> 
> 
> Sent with ProtonMail Secure Email.
> 
> 
> 
>  Original Message 
> 
> Subject: Re: Problem: Convert to Trusted PDF Hangs
> 
> Local Time: January 13, 2017 9:26 PM
> 
> UTC Time: January 13, 2017 9:26 PM
> 
> From: raah...@gmail.com
> 
> To: qubes-users 
> 
> pushp...@protonmail.com
> 
> 
> 
> On Friday, January 13, 2017 at 8:19:38 AM UTC-5, Pushpins4u wrote:
> 
> > Greetings,
> 
> > 
> 
> > 
> 
> > 
> 
> > I recently began downloading PDFs in an anon-whonix VM and wanted to 
> > sanitize them to move over to an offline VM attached to a storage USB.  
> > Weeks ago I was able to navigate to my downloaded PDFs in the anon-whonix 
> > Tor Browser folder, right-click, and convert the PDFs successfully.  
> > Copying them to my offline VM and attached USB drive worked fine.
> 
> > 
> 
> > 
> 
> > 
> 
> > When I try this process now, the PDF conversion progress window gets to 
> > like 95% full and then hangs.  I'm notified that a script appears to have 
> > hung and asked if it should be terminated.  This is happening consistently 
> > with the same PDF.
> 
> > 
> 
> > 
> 
> > 
> 
> > I'm up-to-date on my dom0.  Running on an HP EliteBook with i5 processor.
> 
> > 
> 
> > 
> 
> > 
> 
> > Ideas?
> 
> > 
> 
> > 
> 
> > 
> 
> > Thanks,
> 
> > 
> 
> > PP
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > Sent with ProtonMail Secure Email.
> 
> 
> 
> copy the file to some other untrusted or disposablevm and see if it works 
> there.

well maybe someone who knows what those errors mean can chime in.   so only 
with the same pdf?  is it a very large file?  u sure you not running out of ram 
or space?  Are you using fedora or debian?  whats your pc specs?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8bb4d7e6-f3c8-4ab1-8357-802b8f360d5d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Prob installing VLC in Fedora24 Template

2017-01-17 Thread raahelps
On Saturday, January 14, 2017 at 12:15:17 PM UTC-5, Arnulf Maria Bultmann wrote:
> > > did you try this?  You can remove cached packages by executing 'dnf clean 
> > > packages'
> > 
> > Yes I tried it several times with the same result
> 
> I solved my problem by downloading the rpm in a appvm and then copying it to 
> the template vm. But it should work in the template vm without work around. 
> Or?

ya weird.  not sure why,  did you make any changes to the template?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c8997baf-88e6-44b9-977a-cf8ec2705121%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: AppVM unexpectedly changes kernel

2017-01-17 Thread raahelps
On Monday, January 16, 2017 at 11:57:30 AM UTC-5, Doug Hill wrote:
> Recently two appvms refused to start, reporting that:
> 
> VM: VM kernel does not exist: /var/lib/qubes/vm-kernels/4.4.12-9/vmlinuz
> 
> Qubes Manager shows the kernel is set to 4.4.38-11.
> 
> Using 'qvm-prefs myappvm -s kernel 4.4.38.11' fixed the issue.
> 
> The appvm templates are debian-8 and whonix-ws based. Anything I should
> be concerned about here?
> 
> Thanks!

you can always just wipe the whole vm and recreate it to be on the safe side 
lol.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/960e87e9-a30d-4c79-b6ea-e136a9f2646c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Accidental malware protection effect

2017-01-17 Thread raahelps
On Monday, January 16, 2017 at 2:38:40 PM UTC-5, Alex wrote:
> Has it ever been considered a feature the fact that all of the activity
> of a user in Qubes OS happens in a VM, from the point of view that a lot
> of malware has anti-debugging features that usually alter their
> behaviour when they detect they are run in a VM?
> 
> I don't have any statistic data for malware having such protections, and
> I believe that some anti-debugging features just compare hardware cpu
> timers to better discern an actual debugging session from a running VM
> (otherwise, this could prevent the malware from running on vps
> platforms). But it could be a nice side effect...
> 
> -- 
> Alex

probably,  I know some malware will do this if detects user running monitoring 
programs.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cb50900c-1ad1-4c16-9b2b-a03ee324bdec%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: qubes-windows-tools installation failure

2017-01-17 Thread raahelps
On Tuesday, January 17, 2017 at 5:30:38 PM UTC-5, Hariharan Gopalan wrote:
> Hello Group
> 
> I am getting the following error while trying to install qubes-windows-tools:
> 
> [1848:184C][2017-01-17T22:22:27]i299: Plan complete, result: 0x0
> [1848:184C][2017-01-17T22:22:27]i300: Apply begin
> [1848:184C][2017-01-17T22:23:02]e000: Error 0x800700e8: Failed to wait for 
> child to connect to pipe.
> [1848:184C][2017-01-17T22:23:02]e000: Error 0x800700e8: Failed to connect to 
> elevated child process.
> [1848:184C][2017-01-17T22:23:02]e000: Error 0x800700e8: Failed to actually 
> elevate.
> [1848:184C][2017-01-17T22:23:02]e000: Error 0x800700e8: Failed to elevate.
> [1848:184C][2017-01-17T22:23:03]i399: Apply complete, result: 0x800700e8, 
> restart: None, ba requested restart:  No
> 
> I followed the instructions on the page:  
> https://www.qubes-os.org/doc/windows-appvms.
> 
> Thanks
> Hari

What windows version?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/73effc12-413b-4b2c-bff1-33591e3b3a32%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Have Windows VM open and play video in Linux VM?

2017-01-13 Thread raahelps
On Monday, January 2, 2017 at 10:49:01 AM UTC-5, john.david.r.smith wrote:
> On 02/01/17 15:34, Jarle Thorsen wrote:
> > As there is currently no audio support for Windows in Qubes OS:
> >
> > Can I use any of the Qubes windows tools to copy a video file to a Linux vm 
> > and have it start playing there?
> >
> > The file should only be copied to a temp directory, and not put in 
> > QubesIncomming.
> >
> > Which tool/syntax will let me do this?
> >
> there are two ways:
> 1) (the better way if you can get a working setup)
> for sound/video you can use streaming software (i did this some time ago).
> you have a windows vm W and some linux vm N.
> you set N as netvm for W.
> then you use some virtual soundcard (i think i used hifi cable) and some 
> streaming software to stream the sound to the linux vm (i can't remember 
> what i used.)
> on N you receive the stream.
> since you can hear all audio output of a linux vm, you will hear sound 
> from W.
> 
> my setup was fiddly and had about 2 sec audio delay. (but i did not 
> really bother to fix it, so you probably can do better)
> 
> 2)
> again have some linux vm N as netvm of a windows vm W.
> then you can use public folders on W and mount the public folder on N.
> now you can play the video from N.
> 
> i used both methods for a while (until i  completely switched to linux 
> for all my work-flows).
> in both cases i did not use the windows tools.
> 
> if you have working windows tools, you should have a qvm-open-in-dispvm 
> command .
> you could also try this command.
> (i am not really sure whether the windows tools contain this command)

sounds like this would be great for a big music playlist.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e876e69a-0e37-479f-99dc-7c67aba8a52e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Have Windows VM open and play video in Linux VM?

2017-01-13 Thread raahelps
On Monday, January 2, 2017 at 9:34:41 AM UTC-5, Jarle Thorsen wrote:
> As there is currently no audio support for Windows in Qubes OS:
> 
> Can I use any of the Qubes windows tools to copy a video file to a Linux vm 
> and have it start playing there?
> 
> The file should only be copied to a temp directory, and not put in 
> QubesIncomming.
> 
> Which tool/syntax will let me do this?

just copy it to a dispvm.  open vlc in a dispvm.  copy the file there.  very 
easy.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39d5a108-6d36-42b9-8889-98cbef56a287%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Domains Have Internet But Templates No

2017-01-13 Thread raahelps
if its because you want to install something you can use a dispvm to download 
it and transfer it over to the template, if worried webpage malicious.  But 
then you'd have to worry about the file you transferred over, depends if you 
trust it or not.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5aa5777a-9eee-40ae-8706-8b785722e46a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to get bluetooth keyboard working in dom0?

2017-01-13 Thread raahelps
On Thursday, January 12, 2017 at 2:32:09 AM UTC-5, John Smith wrote:
> Anyone know how to get a bluetooth keyboard working in dom0 (so I can use it 
> with all AppVMs). I'm aware of the security risks but I have an ergonomic 
> split keyboard which I would really like to use with Qubes. The keyboard I'm 
> trying to connect is called the Kinesis Freestyle2 Blue. It uses a 
> non-proprietary bluetooth dongle. Regular logitech proprietary bluetooth 
> keyboards seem to work out of the box with their own dongles but I couldn't 
> get Qubes to detect my non-proprietary usb bluetooth dongle. Can someone 
> please provide me the step by step info to get this working? I'm running a 
> fresh default install of the latest version of Qubes 3.2. Thanks in advance.


maybe this will help  http://forums.fedoraforum.org/showthread.php?t=303654

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/175938fe-0f70-4ce3-9b84-df0c6cf255ec%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: VM chaining visualisation tool

2017-01-13 Thread raahelps
On Friday, January 13, 2017 at 5:02:02 PM UTC-5, raah...@gmail.com wrote:
> On Thursday, January 12, 2017 at 1:11:48 AM UTC-5, Steve wrote:
> > Is there a way I can get a real time visualisation of the VM chaining , for 
> > example a Domain chaining through a firewall through a VPN and sys Network ?
> 
> for seeing network connections i use etherape. But i don't run it in 
> sys-firewall, which would show which vm making the connection,  cause I feel 
> it unsafe.   but nice thing about qubes safe to use in sys-net, not as 
> detrimental.

I mean anything listening is not safe.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ab7ee4f-3e72-4e37-a0cc-a6ef6b4b4d64%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Prob installing VLC in Fedora24 Template

2017-01-13 Thread raahelps
On Thursday, January 12, 2017 at 1:11:02 PM UTC-5, Arnulf Maria Bultmann wrote:
> When I try to install vlc als described in the faq and elsewhere I get this 
> error:
> 
> Downloading Packages:
> (1/60): aalib-libs-1.4.0-0.29.rc5.fc24.x86_64.r 126 kB/s |  70 kB 00:00   
>  
> [MIRROR] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: Interrupted by 
> header callback: Server reports Content-Length: 15400 but expected size is: 
> 1605926
> [FAILED] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: No more mirrors to 
> try - All mirrors were already tried without success
> (3-4/60): libcaca-0.  5% [=   ] 708 kB/s | 1.6 MB 00:37 
> ETA
> The downloaded packages were saved in cache until the next successful 
> transaction.
> You can remove cached packages by executing 'dnf clean packages'.
> Error: Error downloading packages:
>   Cannot download vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: All 
> mirrors were tried
> 
> I tried it several times and got always the same error.
> 
> Procedure:
> sudo dnf upgrade --refresh
> sudo dnf install vlc
> 
> Any advice?

did you try this?  You can remove cached packages by executing 'dnf clean 
packages'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6b51104d-f1b5-4426-ad97-0bbe8793f2ee%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: DispVM does not work anymore

2017-01-13 Thread raahelps
On Thursday, January 12, 2017 at 9:01:03 AM UTC-5, mitte...@digitrace.de wrote:
> Hey there,
> 
> today I noticed that my dispVM is no longer working (not in Dom0 and not
> in AppVMs). There is the notification that the DispVM starts, but
> nothing shows up.
> If I start the internal fedora-23-dvm I boots up without any problems
> and also allows me to start tools (e.g. Firefox)
> 
> any idea what is wrong?
> 
> Thanks

open qubes-manager window.  click view and show internal vms.  Then remove the 
dvm qube.

then in a dom0 terminal make a new one.  qvm-create-default-dvm fedora-24.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/46875d53-e37f-4097-84c3-72ffcd5b204a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Problem: Convert to Trusted PDF Hangs

2017-01-13 Thread raahelps
On Friday, January 13, 2017 at 8:19:38 AM UTC-5, Pushpins4u wrote:
> Greetings,
> 
> 
> 
> I recently began downloading PDFs in an anon-whonix VM and wanted to sanitize 
> them to move over to an offline VM attached to a storage USB.  Weeks ago I 
> was able to navigate to my downloaded PDFs in the anon-whonix Tor Browser 
> folder, right-click, and convert the PDFs successfully.  Copying them to my 
> offline VM and attached USB drive worked fine.
> 
> 
> 
> When I try this process now, the PDF conversion progress window gets to like 
> 95% full and then hangs.  I'm notified that a script appears to have hung and 
> asked if it should be terminated.  This is happening consistently with the 
> same PDF.
> 
> 
> 
> I'm up-to-date on my dom0.  Running on an HP EliteBook with i5 processor.
> 
> 
> 
> Ideas?
> 
> 
> 
> Thanks,
> 
> PP
> 
> 
> 
> 
> 
> 
> Sent with ProtonMail Secure Email.

copy the file to some other untrusted or disposablevm and see if it works 
there.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a4437306-c2da-46e5-95d4-703ff6f3e71c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: FYI: Experimental Qubes coldkernel support now available

2017-01-13 Thread raahelps
On Friday, January 13, 2017 at 12:21:50 PM UTC-5, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Thu, Dec 15, 2016 at 03:11:29PM -0600, Colin Childs wrote:
> > Hi everyone,
> > 
> > Sorry for not getting on this list sooner, however it looks like testing
> > of coldkernel on Debian is largely going well! I see the most recent
> > issue from foppe, and will be attempting to reproduce later this evening.
> > 
> > If you run into issues that require coldhak attention, please do not
> > hesitate to open tickets at
> > https://github.com/coldhakca/coldkernel/issues, or email us directly at
> > cont...@coldhak.ca.
> > 
> > Thanks, and happy testing!
> 
> What are the plans for next stages here? I guess fixing Fedora support,
> right?
> 
> What about binary packages in general: I've heard there are some
> benefits from compiling the grsec-enabled kernel yourself, as some parts
> are randomized compile-time. Is that true? How much benefit it gives?
> 
> Anyway, I think in the end we need some packages in the repository for
> this. 
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJYeQymAAoJENuP0xzK19csj0cH/jh4eCtY4XoZgTd06EE+n3j6
> jBi6SmvafBAewpJkTjpRM4l8OrybuBJ/7l32LkyEtquZCaZWWxZo+sRCMm5N2stc
> bjYUrROaOYmXbh7T0cwH4L9uRjgZda0IUGlGcA0324TYtLR9VUds4fncH8c/h7lE
> kmNB3xX8x8KyTWH1v19dtoPyay20626eJP32qzeoDptcc0cyfpOKDZR5YNmf3b/K
> SZXNz2O10rbpBK+odtfY/VAHQqD3P6TKGeTKAF7WBeXHLqOjB6CBXjN/Aj9p9X94
> l/xeXIW+/EWwZtCBmgcRjVcUVYXVbHdGYTrS1OArRa9KSchBY/ENBedYRCs8GBs=
> =Rk3u
> -END PGP SIGNATURE-

you have to update it alot thats the thing. I think that is too much time for 
most repos so most people prolly always end up compiling it themselves to have 
the latest version.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/979d888d-9a26-48f5-977f-357a259945e8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: install-run

2017-01-13 Thread raahelps
On Friday, January 13, 2017 at 3:03:59 PM UTC-5, tito...@gmail.com wrote:
> I am probably the most software ignorant person attempting to use this 
> os---nowhere near getting it to work. I am used to: "download", "install", 
> "run". 
> 
> I am using a 5 or 6 year old Dell xps 15 running windows 10 operating system. 
>  
> The qubes install instructions for version 3.2 end after usb install advice. 
> I followed it but, if something was supposed to happen automatically---it 
> didn't. After double clicking on some of the downloaded files, I have no idea 
> how to get this thing to work. Any files that offer to open are requesting 
> that I describe what method to use. I have no idea. And, after reading the 
> first 50 "install" posts I don't think I will find answers that I can 
> understand.  
> 
> If my message doesn't find a generous and patient helper then I am bound for 
> the computer shop---let the technician figure it out. Maybe my very a limited 
> digital vocabulary precludes any chance of getting qubes to work without 
> hours and hours of remedial education.

play with the bios options.  like boot mode, , hdd mode, usb options, is there 
options for vt-d or iommu?  Qubes can be picky with the bios settings.  make 
sure you using a new usb stick at least 8gb.  check the key sigs.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bf49bc3f-debe-4e9f-86f8-32d7953f20d9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to autorun startup script on login/reboot in dom0 with i3wm?

2017-01-13 Thread raahelps
On Friday, January 13, 2017 at 1:41:20 AM UTC-5, John Smith wrote:
> I just installed i3wm and it switches my 2 displays from extended to 
> mirrored. In effort to fix this, I wrote a simple script called rc.local 
> containing the following commands:
> 
> xrandr --output DP-1 --auto
> xrandr --output VGA-1 --right-of DP-1
> xrandr --output VGA-1 --mode 1920x1080
> 
> The script works fine when I execute it manually from the terminal (I've 
> already done chmod+x). However, at the end of my /etc/i3/config file i added 
> the line:
> 
> exec /etc/rc.local
> 
> I added this line to automatically run the script when i reboot my computer 
> but for some reason it doesn't work. I've tried it with single and double 
> quotes as well as exec_always and --no-startup-id but nothing seems to work. 
> Any ideas how I can get this working? I've also tried putting the commands 
> directly into the config without calling the script but that didn't work 
> either. Even echo test >> /tmp/testfile didn't output anything. Any ideas 
> would be much appreciated, thanks.

wouldn't it just work like a normal baremetal linux system? I been using 
windows so much lately right now I'm drawing a blank lol.  I think you got a 
choice of whole whost of diff directories to try, google fedora.

last time I had to do this I made a .desktop file.  Does that work in xfce? I'm 
not sure.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ccba0ee-3471-44f9-80a8-09238e266f9b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] bluetooth support in dom0

2017-01-12 Thread raahelps
On Thursday, January 12, 2017 at 3:08:59 AM UTC-5, raah...@gmail.com wrote:
> On Thursday, January 12, 2017 at 2:36:43 AM UTC-5, John Smith wrote:
> > On Thursday, January 12, 2017 at 12:26:21 AM UTC-7, raah...@gmail.com wrote:
> > > On Thursday, January 12, 2017 at 2:23:16 AM UTC-5, John Smith wrote:
> > > > On Wednesday, March 12, 2014 at 4:40:16 PM UTC-6, danf...@gmail.com 
> > > > wrote:
> > > > > > 
> > > > > > > I don't know much about the security side of things, but I'm 
> > > > > > > happy to
> > > > > > 
> > > > > > > blindly ignore any "in my local neighbourhood" kind of attacks if
> > > > > > 
> > > > > > > that was the only issue.
> > > > > > 
> > > > > > > 
> > > > > > 
> > > > > > 
> > > > > > 
> > > > > > Why not use Windows then? Or Mac? :)
> > > > > 
> > > > > Because they don't offer the other nice features such as the app 
> > > > > domains and disposable VMs. Which I assume would still help against 
> > > > > remote threats such as web browser exploits.
> > > > > 
> > > > > > 
> > > > > > > Or should I be avoiding Qubes if I can't figure this stuff out
> > > > > > 
> > > > > > > myself? ;)
> > > > > > 
> > > > > > > 
> > > > > > 
> > > > > > > I'm just an amateur Linux user mildly interested in increased
> > > > > > 
> > > > > > > security/privacy.
> > > > > > 
> > > > > > > 
> > > > > > 
> > > > > > > Side musing: Have the developers considered allowing *optional*
> > > > > > 
> > > > > > > support for things that have security issues, in the spirit of
> > > > > > 
> > > > > > > compromise...?
> > > > > > 
> > > > > > 
> > > > > > 
> > > > > > Qubes OS is an open platform, you can configure it however you like,
> > > > > > 
> > > > > > disabling potentially all security feature, if you really want. The 
> > > > > > user
> > > > > > 
> > > > > > is the ultimate boss.
> > > > > > 
> > > > > 
> > > > > I should rephrase that as "easy to use", even GUI based, 
> > > > > configurability. Perhaps you aren't targeting such "novice" users.
> > > > > 
> > > > > 
> > > > > > 
> > > > > > > For instance, I absolutely do choose convenience and
> > > > > > 
> > > > > > > even necessity over security (to the tune of bluetooth, full 
> > > > > > > graphics
> > > > > > 
> > > > > > > card support for game dev work), yet wouldn't there still be
> > > > > > 
> > > > > > > something to be gained by using Qubes even with those security 
> > > > > > > holes?
> > > > > > 
> > > > > > > When the choice is Qubes with these holes vs just any regular 
> > > > > > > Linux
> > > > > > 
> > > > > > > distro.
> > > > > > 
> > > > > > > 
> > > > > > 
> > > > > > 
> > > > > > 
> > > > > > Modern Windows and OSX offer a "reasonable compromise" of security, 
> > > > > > I heard.
> > > > > 
> > > > > Haha!
> > > > 
> > > > Any update regarding this?
> > > 
> > > hahaha
> > 
> > You manage to figure it out lol?
> 
> I'm sorry i was laughing at Joanna's comments.  Do you mean how to enable it 
> manually,  or if Qubes is going to support it?  I personally wouldn't want 
> bluetooth either man.
> Maybe you hold your phone too close to it one day haha.  Or someone uses some 
> booster outside your house to reach it who knows.   i mean anything can 
> happen and taking over dom0 is game over.  defeats the purpose of using Qubes 
> which tries to isolate hardware from dom0.
> 
> It is recommended to use usb with a computer that has the Qubes hardware 
> requirements to be able to isolate the usb controllers from dom0.

or at least isolate a controller to dom0 dedicated to only your mouse and 
keyboard.  Just don't use wireless.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2af9a2e-e791-4eb4-a206-576a0328d222%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] bluetooth support in dom0

2017-01-12 Thread raahelps
On Thursday, January 12, 2017 at 2:36:43 AM UTC-5, John Smith wrote:
> On Thursday, January 12, 2017 at 12:26:21 AM UTC-7, raah...@gmail.com wrote:
> > On Thursday, January 12, 2017 at 2:23:16 AM UTC-5, John Smith wrote:
> > > On Wednesday, March 12, 2014 at 4:40:16 PM UTC-6, danf...@gmail.com wrote:
> > > > > 
> > > > > > I don't know much about the security side of things, but I'm happy 
> > > > > > to
> > > > > 
> > > > > > blindly ignore any "in my local neighbourhood" kind of attacks if
> > > > > 
> > > > > > that was the only issue.
> > > > > 
> > > > > > 
> > > > > 
> > > > > 
> > > > > 
> > > > > Why not use Windows then? Or Mac? :)
> > > > 
> > > > Because they don't offer the other nice features such as the app 
> > > > domains and disposable VMs. Which I assume would still help against 
> > > > remote threats such as web browser exploits.
> > > > 
> > > > > 
> > > > > > Or should I be avoiding Qubes if I can't figure this stuff out
> > > > > 
> > > > > > myself? ;)
> > > > > 
> > > > > > 
> > > > > 
> > > > > > I'm just an amateur Linux user mildly interested in increased
> > > > > 
> > > > > > security/privacy.
> > > > > 
> > > > > > 
> > > > > 
> > > > > > Side musing: Have the developers considered allowing *optional*
> > > > > 
> > > > > > support for things that have security issues, in the spirit of
> > > > > 
> > > > > > compromise...?
> > > > > 
> > > > > 
> > > > > 
> > > > > Qubes OS is an open platform, you can configure it however you like,
> > > > > 
> > > > > disabling potentially all security feature, if you really want. The 
> > > > > user
> > > > > 
> > > > > is the ultimate boss.
> > > > > 
> > > > 
> > > > I should rephrase that as "easy to use", even GUI based, 
> > > > configurability. Perhaps you aren't targeting such "novice" users.
> > > > 
> > > > 
> > > > > 
> > > > > > For instance, I absolutely do choose convenience and
> > > > > 
> > > > > > even necessity over security (to the tune of bluetooth, full 
> > > > > > graphics
> > > > > 
> > > > > > card support for game dev work), yet wouldn't there still be
> > > > > 
> > > > > > something to be gained by using Qubes even with those security 
> > > > > > holes?
> > > > > 
> > > > > > When the choice is Qubes with these holes vs just any regular Linux
> > > > > 
> > > > > > distro.
> > > > > 
> > > > > > 
> > > > > 
> > > > > 
> > > > > 
> > > > > Modern Windows and OSX offer a "reasonable compromise" of security, I 
> > > > > heard.
> > > > 
> > > > Haha!
> > > 
> > > Any update regarding this?
> > 
> > hahaha
> 
> You manage to figure it out lol?

I'm sorry i was laughing at Joanna's comments.  Do you mean how to enable it 
manually,  or if Qubes is going to support it?  I personally wouldn't want 
bluetooth either man.
Maybe you hold your phone too close to it one day haha.  Or someone uses some 
booster outside your house to reach it who knows.   i mean anything can happen 
and taking over dom0 is game over.  defeats the purpose of using Qubes which 
tries to isolate hardware from dom0.

It is recommended to use usb with a computer that has the Qubes hardware 
requirements to be able to isolate the usb controllers from dom0.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fbc29b17-6576-4228-a29e-c5cb0a60eee9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Bad USB with USB devices in VM

2017-01-11 Thread raahelps
I thought you meant infecting your pc out the box.  But ya your wireless card 
is not considered safe either.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0ee2f6d-6c71-45be-aa14-76c1261b1916%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Bad USB with USB devices in VM

2017-01-11 Thread raahelps
On Thursday, January 12, 2017 at 2:45:23 AM UTC-5, Steve wrote:
> On Thursday, January 12, 2017 at 11:37:06 AM UTC+4, raah...@gmail.com wrote:
>  
> > Qubes installs a usbvm called sys-usb by default.
> 
> If the USB controller is installed in this sys-usb and a bad usb memory stick 
> tried to write to the firmware, am I correct in assuming it is effectively 
> writing to virtual firmware and therefore the actual firmware stays intact ?

I don't believe so but hopefully your machines bios supports enabling 
iommu/vt-d, so at least the controller will be isolated from the other vms.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc1ec7e0-d9c0-4f0a-9966-9d1c6b78c7f3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How i can play video?

2017-01-11 Thread raahelps
it also might be the type of vids I'm watching haha

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b33e27c9-2934-43f9-a620-7ec87140f7fa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How i can play video?

2017-01-11 Thread raahelps
On Thursday, January 12, 2017 at 2:50:49 AM UTC-5, raah...@gmail.com wrote:
> On Thursday, January 12, 2017 at 12:35:14 AM UTC-5, Andrew David Wong wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> > 
> > On 2017-01-11 20:21, raahe...@gmail.com wrote:
> > > On Wednesday, January 11, 2017 at 4:14:07 PM UTC-5, Andrew David Wong 
> > > wrote:
> > > On 01/11/17 07:14, Unman wrote:
> > >>>> On Wed, Jan 11, 2017 at 09:07:17AM -0500, 'Repairing' via qubes-users 
> > >>>> wrote:
> > >>>>> Still trying to figure out Qubes,
> > >>>>>
> > >>>>> When i open movies with "videos application", i get:
> > >>>>>
> > >>>>> AC-3 (ATSC A/52) decoder, MPEG-4 Video (advanced simple profile) 
> > >>>>> decoder are required to play the file, but are not installed.
> > >>>>>
> > >>>>>
> > >>>>> I also tried:
> > >>>>>
> > >>>>> Banshee
> > >>>>> Parole
> > >>>>> Snappy
> > >>>>>
> > >>>>> But there's just black background with them.
> > >>>>>
> > >>>>> Your time is much appreciated.
> > >>>>>
> > >>>>
> > >>>> This  comes up so often it should be a FAQ.
> > > 
> > > Added: https://www.qubes-os.org/doc/user-faq/#how-do-i-play-video-files
> > > 
> > > 
> > > ah nice i was looking everywhere for the easy way to enable rpmfusion 
> > > without having to download it. I remember you had mentioned it before on 
> > > here but couldn't find the thread. 
> > > 
> > > You might want to add to set the output mode in vlc to x11, otherwise it 
> > > use too much cpu%.
> > > 
> > 
> > Are you sure that's required? I've never had a problem with it on the 
> > default settings.
> > 
> > > Hey Andrew I seen you on an episode of the new screensavers,  nice job 
> > > promoting Qubes!
> > > 
> > 
> > Thanks, raahelps!
> > 
> > - -- 
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIcBAEBCgAGBQJYdxWFAAoJENtN07w5UDAwJHEP/3RIfke/ML8/gqplrAdSadtt
> > B0AyHT74FDQflOM0Uk36AqSbqY2GPrWbI/gLemLjfKGPUiS6ys9tl1XXrsEWM1mQ
> > JVUIyJGklJArlbFscmy/RgN7i2UZ30SM0zEnKgoyoyPC7A6To/762vg6hfPTyv35
> > hET/Hy7G3FR8V5c89BzUjDUecdJogWp3gY2JiCFMozOQjd+xumP8YaZQmOCgcZIc
> > xH5Zxqtw62CUp1YzfyEI7Qhx0Z4ccZ8YPdAbwXa7puGYGwGpOvrkfEZQ0InTgd7c
> > hDsTuCrPAQLO2JHKyBF4armVIOH0+L+LGSl3mWCLd7LxUyLkrJpextvz1te9BlIG
> > Wi6TwRSDBS9wF+NEX5btTqNWvbHLWgnL6ALc2N/uxX1fyMvL5RhPZ/EpTU1QzLKP
> > BdJGuebnNM7FfLagvV7JsKzd7HNxSzwiIeyAwydSCM3n2p2ktdDRbCw3VkRafCiY
> > h/cOlBE1CsQmkPFwVmVFMwpBgz9FYx8tFRgrtwwxpTle9kh/WhpDFn5DxiGcGDsS
> > 1PKOPX8FwwiOU8HBgm5OlrkawHI5yDxn+y8yz2lOlvklC7uDQTWluPCUgktIb+Ym
> > XW7Evmb2vTgg+3cJM6IJkFW9wKwgFbsdhadgJE5KShv27CuaWpMmS8O9eD865wOT
> > lYQmvkO+bWcfWdvcmeV/
> > =R5f7
> > -END PGP SIGNATURE-
> 
> ya my cpu% goes way down. somethign like 60% to in the 20s. Its a Qubes thing 
> but setting that gives me the cpu% I would get on baremetal.  I get worried 
> about heat sometimes.  I thought others have had slowdown issues too on the 
> mailing list too but maybe its just me. I do have an older amd cpu on this 
> machine.  Not sure if I actually tested the diff on the i5.

Videocard might make a diff too.  I have nvidia on this one.  intel on the 
other.  I'll test it tomorrow if I can.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5b5a92e3-6c53-4065-8631-589d01844c0b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How i can play video?

2017-01-11 Thread raahelps
On Thursday, January 12, 2017 at 12:35:14 AM UTC-5, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-01-11 20:21, raahe...@gmail.com wrote:
> > On Wednesday, January 11, 2017 at 4:14:07 PM UTC-5, Andrew David Wong wrote:
> > On 01/11/17 07:14, Unman wrote:
> >>>> On Wed, Jan 11, 2017 at 09:07:17AM -0500, 'Repairing' via qubes-users 
> >>>> wrote:
> >>>>> Still trying to figure out Qubes,
> >>>>>
> >>>>> When i open movies with "videos application", i get:
> >>>>>
> >>>>> AC-3 (ATSC A/52) decoder, MPEG-4 Video (advanced simple profile) 
> >>>>> decoder are required to play the file, but are not installed.
> >>>>>
> >>>>>
> >>>>> I also tried:
> >>>>>
> >>>>> Banshee
> >>>>> Parole
> >>>>> Snappy
> >>>>>
> >>>>> But there's just black background with them.
> >>>>>
> >>>>> Your time is much appreciated.
> >>>>>
> >>>>
> >>>> This  comes up so often it should be a FAQ.
> > 
> > Added: https://www.qubes-os.org/doc/user-faq/#how-do-i-play-video-files
> > 
> > 
> > ah nice i was looking everywhere for the easy way to enable rpmfusion 
> > without having to download it. I remember you had mentioned it before on 
> > here but couldn't find the thread. 
> > 
> > You might want to add to set the output mode in vlc to x11, otherwise it 
> > use too much cpu%.
> > 
> 
> Are you sure that's required? I've never had a problem with it on the default 
> settings.
> 
> > Hey Andrew I seen you on an episode of the new screensavers,  nice job 
> > promoting Qubes!
> > 
> 
> Thanks, raahelps!
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYdxWFAAoJENtN07w5UDAwJHEP/3RIfke/ML8/gqplrAdSadtt
> B0AyHT74FDQflOM0Uk36AqSbqY2GPrWbI/gLemLjfKGPUiS6ys9tl1XXrsEWM1mQ
> JVUIyJGklJArlbFscmy/RgN7i2UZ30SM0zEnKgoyoyPC7A6To/762vg6hfPTyv35
> hET/Hy7G3FR8V5c89BzUjDUecdJogWp3gY2JiCFMozOQjd+xumP8YaZQmOCgcZIc
> xH5Zxqtw62CUp1YzfyEI7Qhx0Z4ccZ8YPdAbwXa7puGYGwGpOvrkfEZQ0InTgd7c
> hDsTuCrPAQLO2JHKyBF4armVIOH0+L+LGSl3mWCLd7LxUyLkrJpextvz1te9BlIG
> Wi6TwRSDBS9wF+NEX5btTqNWvbHLWgnL6ALc2N/uxX1fyMvL5RhPZ/EpTU1QzLKP
> BdJGuebnNM7FfLagvV7JsKzd7HNxSzwiIeyAwydSCM3n2p2ktdDRbCw3VkRafCiY
> h/cOlBE1CsQmkPFwVmVFMwpBgz9FYx8tFRgrtwwxpTle9kh/WhpDFn5DxiGcGDsS
> 1PKOPX8FwwiOU8HBgm5OlrkawHI5yDxn+y8yz2lOlvklC7uDQTWluPCUgktIb+Ym
> XW7Evmb2vTgg+3cJM6IJkFW9wKwgFbsdhadgJE5KShv27CuaWpMmS8O9eD865wOT
> lYQmvkO+bWcfWdvcmeV/
> =R5f7
> -END PGP SIGNATURE-

ya my cpu% goes way down. somethign like 60% to in the 20s. Its a Qubes thing 
but setting that gives me the cpu% I would get on baremetal.  I get worried 
about heat sometimes.  I thought others have had slowdown issues too on the 
mailing list too but maybe its just me. I do have an older amd cpu on this 
machine.  Not sure if I actually tested the diff on the i5.   

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ca2cc095-5038-4449-85a5-4b2d25ba4e12%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Bad USB with USB devices in VM

2017-01-11 Thread raahelps
On Thursday, January 12, 2017 at 2:26:02 AM UTC-5, Steve wrote:
> On Thursday, January 12, 2017 at 10:09:56 AM UTC+4, Steve wrote:
> > If a memory stick infected with Bad USB is inserted into a laptop running 
> > Qubes with the USB devices running in a VM, does the laptop USB firmware 
> > get rewritten by the Bad USB ?
> 
> What can I do on a fresh installation on a brand new laptop to ensure that 
> once installed with Qubes the laptop firmware cannot be over written written 
> (assuming I am using an optical drive for installation,) thx

Qubes installs a usbvm called sys-usb by default.

so where you get the iso I guess is the real question.  And what usb stick you 
use to write it on.  Maybe someone has some comments on a good usb brand to 
buy.  I buy microcenter.

Where you get the iso is another story.  so use your brand new computer to 
download it. hopefully its coming with an os pre-installed?   maybe harden 
windows first follow these instructions before you boot the os.   
www.hardenwindows10forsecurity.com,  (read the instructions on an older 
computer not your new one)  make sure to follow the qubes install instructions 
how to verify the key signatures.  and then hope for the best.  use good 
security practices.  keep stuff as compartmentalized as your mind can handle.

I been in my amazon videos qube mostly since the holidays.  ANd so all i do in 
that vm is watch videos nothing else.  I use about a dozen diff vms for 
different tasks I do on the pc.  I log into this yellow colored qube, the 
default personal,  to log into my webmail, google, stuff where i'm not 
devastated if the password gets stolen.  more sensitive stuff in another. 

Actually its not true about my amazon qube.  I'm actually always in a 
disposable vm the most out of anything.  I use it for all random tasks that 
don't need credentials.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/63af3ddb-ee07-459d-b463-0c502da4b75c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How i can play video?

2017-01-11 Thread raahelps
On Wednesday, January 11, 2017 at 4:14:07 PM UTC-5, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 01/11/17 07:14, Unman wrote:
> > On Wed, Jan 11, 2017 at 09:07:17AM -0500, 'Repairing' via qubes-users wrote:
> >> Still trying to figure out Qubes,
> >>
> >> When i open movies with "videos application", i get:
> >>
> >> AC-3 (ATSC A/52) decoder, MPEG-4 Video (advanced simple profile) decoder 
> >> are required to play the file, but are not installed.
> >>
> >>
> >> I also tried:
> >>
> >> Banshee
> >> Parole
> >> Snappy
> >>
> >> But there's just black background with them.
> >>
> >> Your time is much appreciated.
> >>
> > 
> > This  comes up so often it should be a FAQ.
> 
> Added: https://www.qubes-os.org/doc/user-faq/#how-do-i-play-video-files
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYdp//AAoJENtN07w5UDAwGGwQALIFTo6zJ4s/uyAb4NZyhwTO
> eLqQtyylHJF73t0F7NW7Rw+Y/dFDqX5tV/7T+I/is2ok9sEhxf0yTyeqSzfuUA0P
> SNKqh0yD4MSfKQ6N7JFQpA55UBrKUp3uC6/2kpq3WK8xoerXC4zNPSwHC/nIMGzN
> 6mqlVromWRlWd7x+9kpDdlgEnNQxD+BzNL/a9xKdJy1FTx2oYGZBfs1cMaUlzRz3
> /AemPcTrmp0cYCGxY9p5LMsubtA2OGDsRbiWm70RunpYbWDHC+KuvtbJ+HHOT8FI
> l6HcUNrGehTrcNfD2pxq8SFcpbXorS3qlUQWQ3Xypy9dKLUg2Du0mSROP3q5GEgf
> s8RpprIhk49txImZLM+FsnijXoDesQnd1QX3qbJ2WvWRLwzeWp6YuegSSvF5djM+
> YMsRQJBd50JhfMrQKUspAbQGAhw/9DyDyrP5zCRTRD4pxEiWH/5Qtv6tIspea5i7
> ORQR69ASC8aqzuvvm9xTWoxctqPo2w/Rso78+PUsu/t8IuuGEZA2gAN8Zg4zRRYQ
> 5Q4XxHeRh4jgEEhkvDLg13cqvtOE7lBr9Cgw3YdbpBcCEJEjf7qboApfoXr8NZcw
> pSOHzqNOxCUUNnyIrHVI3g3hJZD1vPcaJB5VexIS6tmdhcUgKa2qnKc1KCJVvRNS
> W7mO8rQkjRpAfyO2Qxif
> =f8Yo
> -END PGP SIGNATURE-

ah nice i was looking everywhere for the easy way to enable rpmfusion without 
having to download it. I remember you had mentioned it before on here but 
couldn't find the thread. 

You might want to add to set the output mode in vlc to x11, otherwise it use 
too much cpu%.

Hey Andrew I seen you on an episode of the new screensavers,  nice job 
promoting Qubes!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b94224bc-3734-4bf5-93d7-d4cf7a791aac%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Bad GPG sig on R3.2 release

2017-01-11 Thread raahelps
worked for me 

gpg -v --verify Qubes-R3.2-x86_64.iso.DIGESTS 
gpg: armor header: Hash: SHA256
gpg: armor header: Version: GnuPG v2
gpg: original file name=''
gpg: Signature made Tue 20 Sep 2016 01:37:03 PM EDT using RSA key ID 03FA5082
gpg: using PGP trust model
gpg: Good signature from "Qubes OS Release 3 Signing Key"
gpg: textmode signature, digest algorithm SHA256

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d39bdfb3-c605-4876-9fa5-32a46f666987%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Domains Have Internet But Templates No

2017-01-11 Thread raahelps
On Wednesday, January 11, 2017 at 12:38:00 PM UTC-5, Repairing wrote:
> There's no problem to connect to the internet with domains:
> 
> anon-whonix
> 
> personal
> 
> untrusted
> 
> 
> 
> But i need to connect through templates:
> 
> fedora
> 
> debian
> 
> 
> 
> There's no connection, white blank screen when i use firefox, how i can 
> connect to the firefox with templates?

why do you need to use firefox in the template?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aa5578ef-6f63-4ea2-9262-048fd286afd8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes

2017-01-11 Thread raahelps
On Tuesday, January 10, 2017 at 6:42:51 PM UTC-5, tai...@gmx.com wrote:
> On 01/10/2017 06:28 PM, solved1 wrote:
> 
> > I had the same problem the easiest thing is to replace the broadcom wifi 
> > card.
> > its really simple to do that.
> >
> > order yourself an Intel Wifi card like me. costs around 45 USD
> > it will work without doing anything once you replaced the broadcom card no 
> > need
> > to type in any commands.
> >
> Intel wi-fi requires binary blobs which are a black box and will stop 
> working eventually.
> 
> Get yourself one with a realtek or atheros chipset that doesn't require 
> blobs such as A5K or A9K series, they will cost less than an intel 
> chipset as well.

You can check this list if you want to make sure it  libre. 
https://h-node.org/wifi/catalogue/en/1/1/undef/undef/yes?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2d5baff8-43e1-44be-9047-45fd9e8f6225%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fedora "/tmp"

2017-01-11 Thread raahelps
I've had to increase this on past fedora qubes vms so long videos wouldn't time 
out.  Never had an issue with debian though.  And I haven't had the issue on 
fresh system with the latest fedora.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/be8763fa-4836-411a-9c91-802260b97cd8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How i can play video?

2017-01-11 Thread raahelps
On Wednesday, January 11, 2017 at 9:07:30 AM UTC-5, Repairing wrote:
> Still trying to figure out Qubes,
> 
> 
> 
> When i open movies with "videos application", i get:
> 
> 
> 
> AC-3 (ATSC A/52) decoder, MPEG-4 Video (advanced simple profile) decoder are 
> required to play the file, but are not installed.
> 
> 
> 
> 
> I also tried:
> 
> 
> 
> Banshee
> 
> Parole 
> 
> Snappy
> 
> 
> 
> But there's just black background with them.
> 
> 
> 
> Your time is much appreciated.

Use VLC media player.  and just make sure to change video output settings to 
x11.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c22989a6-effc-46ea-843a-12d41167ff3e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Bug - Qubes fails to boot if a USB Audio device is connected to the PC

2017-01-09 Thread raahelps
On Sunday, January 8, 2017 at 12:14:17 PM UTC-5, Grzesiek Chodzicki wrote:
> W dniu niedziela, 8 stycznia 2017 18:03:47 UTC+1 użytkownik Andrew David Wong 
> napisał:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> > 
> > On 2017-01-08 08:30, Grzesiek Chodzicki wrote:
> > > I know that this sounds rather bizarre, but my Qubes instance
> > > consistently gets stuck after GRUB menu if a USB Audio device is
> > > connected to the computer. So far I have a 3/3 repro rate on that.
> > > What type of logs/information should I gather from my machine in
> > > order to troubleshoot that? XL dmesg does print a RMRR warning
> > > about USB controllers
> > > 
> > > Qubes 3.2 Kernel 4.8.12-12 I use a sys-usb AppVM with all
> > > controllers hidden from Dom0.
> > > 
> > 
> > Is your sys-usb set to autostart? If so, try disabling that to see
> > whether the system can boot.
> > 
> > - -- 
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIcBAEBCgAGBQJYcnDpAAoJENtN07w5UDAw8NcP/iQTveiRfsgdJbeweJC84k6V
> > d3UdLc8i7OrFuh4Cya0opcH341OKvCid4Rv3jIVAhRhE+TSVgobKQkXXEEE9UO8u
> > 8l2ugFuUg3gYUv//WIJUmCNZXRXTTT7Tk7JFjXXhyKUjrkD1B9oAhlVPcK3UaUiQ
> > 2lkAgMWVPDpo9mJMoc4GaQlWZX9sDwJ14M75lMa0lPtbN93nmFOOiye6FNIQ20bH
> > pmbuu6bfyI1w53bVMA84HZIXs1msvXfLLO2CaVksntEk8TaiO/MBM8wmXYA9IQrF
> > I3yxsAVm6pjqlkAIABTkGzM6wOrUeHQjgqTewvmQYO+ch5K00r/Jy2/zZwmNYOOx
> > p/qHn0q82GcITe73xDTD2vp6QILkqV3VCeFBPc9JzqrFYYRONtPr3vDyD48EJ2Nb
> > ButtRJXAxqe6QIkfWs614tfZYWzHMgOVSHokiGnoHMIG5OfU8jDD+ywwzLGyt+2Y
> > QZsAL7dKVxxfEybAFIacumC0HyAIJWtbZDcfl6mnP3qmrGbIo8PebzwpOGCkDMFu
> > NS4aC+dmqJQSqfl2yufNYbr+2eZGoPmhE206qfIL0KBM3Cch8M2RytEXHjyBCH4s
> > u5SGaOALrvlM5zWADoTWyhd6PEg9EWEHkl9vo2MkFYq90o7/VIzWQBX15H5uCsYJ
> > wIyI9Itq6I/JD32gR2i0
> > =lqgz
> > -END PGP SIGNATURE-
> 
> Hello Andrew,
> 
> The issue still occurs after disabling autostart of the sys-usb AppVM.

Did you make sure you followed these directions?  
https://www.qubes-os.org/doc/external-audio/

what type of bios boot are you using?  Try legacy boot.How much ram does 
your system have?  

What if you just remove the sys-usb and try booting qubes without it while 
device is attached?

Did you create it manually?  After removing the sys-usb vm then rebooting and 
seeing if qubes boots with the usb attached. Then recreate sys-usb using qubes 
commands
qubesctl top.enable qvm.sys-usb  
qubesctl state.highstate
and repeat audio device instructions.

Try disabling vt-d to identify the bios iommu as possibly the problem.  
Doublecheck bios options.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f8d244fe-8900-4b55-a379-b5e083dd043b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: After installing Libre apps can't get them on a shortcut

2017-01-07 Thread raahelps
On Friday, January 6, 2017 at 7:57:49 PM UTC-5, Patrick Bouldin wrote:
> On Friday, January 6, 2017 at 7:40:51 PM UTC-5, Patrick Bouldin wrote:
> > Hello,
> > 
> > I've added apps to the template before, and then on the app vm I could then 
> > create a shortcut. I installed all the Libre apps on the template. I then 
> > go to the app vm and they are there, but they don't show up on the "add 
> > shortcut" menu.
> > 
> > Any clue?
> > 
> > Thanks,
> > Patrick
> 
> PS - I see the following to add shortcuts to app that didn't make them 
> available: https://www.qubes-os.org/doc/signal/
> 
> But I still confused with step 1. Am I even on the right track? What shortcut 
> has been created in step 1 of the Signal example? How did he "get" the 
> shortcut?
> Patrick

yes if you mean that the programs are not showing as available to add to the vm 
shortcust list,  then yes qvm-sync-appmenus templatename  should work.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8c2d59ce-301a-4b67-88d7-afc03e8d5729%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] notify about updates of cloned template

2017-01-07 Thread raahelps
On Saturday, January 7, 2017 at 9:34:48 AM UTC-5, Eva Star wrote:
> On 12/29/2016 07:17 AM, Andrew David Wong wrote:
> 
> >
> > Update checks are typically run in VMs based on the template, so if
> > you haven't had any VMs running based on that template that can reach
> > update repos, that's probably why.
> >
> After you message I run AppVm made from this clone template, and 
> nothing. Updates still does not check automatically..
> 
> 
> 
> -- 
> Regards

does it have network access and using the sys-firewall?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ae017169-3f6d-4f1f-a730-89d6bc8d8b5b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


  1   2   3   4   5   >