[qubes-users] Whonix upgrade fails after interruption

2021-10-08 Thread tetrahedra via qubes-users
I started uprading Whonix using the salt command, but the process was interrupted. On retrying, it fails, unable to create the whonix WS VM due to "permission denied". From journalctl: Oct 08 11:24:35 dom0 qubesd[2098]: permission denied for call b'admin.vm.Create.AppVM'+b'whonix-ws-16'

[qubes-users] Re: Trezor error with qubes

2021-09-25 Thread tetrahedra via qubes-users
Ah, I think I forgot to verify. You need to install the public key so you can verify the trezor-bridge RPM file. Unfortunately I don't remember how to do this. On Fri, Sep 24, 2021 at 01:58:34PM +, taran1s wrote: Dear tetrahedra, I am just resending the email in case it didn't catch your

Re: [qubes-users] Qubes-backup verify only verifies dom0, not appVMs

2021-09-13 Thread tetrahedra via qubes-users
On Thu, Aug 26, 2021 at 07:11:49AM -0700, Andrew David Wong wrote: It's possible to create "backup profiles," but I haven't personally used them, so I'm not familiar with the details of how they work. This option is mentioned in the `--help` text for qvm-backup but not qvm-backup-restore. It

Re: [qubes-users] Trezor in Qubes

2021-09-04 Thread tetrahedra via qubes-users
On Fri, Sep 03, 2021 at 07:54:56AM +, taran1s wrote: Thank you for the guide. I tried to follow the official guide on trezor wiki, abstaining from fedora a bit more, but still erroring. To your guide. The last 4 lines: copy to fedora-3x in fedora-3x sudo rpm -i /path/to/trezor.rpm

Re: [qubes-users] Trezor error with qubes

2021-09-04 Thread tetrahedra via qubes-users
have you seen this? https://github.com/Qubes-Community/Contents/blob/e7443c960228c1abec9b97f2c2027dbc01f45f63/docs/common-tasks/setup-trezor-cryptocurrency-hardware-wallet.md On Tue, Aug 31, 2021 at 02:53:47PM +, 'taran1s' via qubes-users wrote: Hello, In my last message I mentioned my

Re: [qubes-users] Trezor in Qubes

2021-08-27 Thread tetrahedra via qubes-users
On Thu, Aug 26, 2021 at 02:27:35PM +, 'taran1s' via qubes-users wrote: Hello all, I would like to start to use Trezor with my qubes. I would like to follow this guide here https://wiki.trezor.io/Qubes_OS. My intention is to use the Trezor HW wallet in a anon-whonix AppVm with Trezor Suite

Re: [qubes-users] Qubes-backup verify only verifies dom0, not appVMs

2021-08-26 Thread tetrahedra via qubes-users
On Wed, Aug 25, 2021 at 07:31:33AM -0700, Andrew David Wong wrote: And in fact only dom0 gets verified, the others seem to be ignored. I cannot seem to reproduce this. My verify-only attempts also verify domUs. I'm using the same qvm-backup-restore command, just without `--verbose`.

[qubes-users] Qubes-backup verify only verifies dom0, not appVMs

2021-08-25 Thread tetrahedra via qubes-users
When I verify my backups, it happens ~instantaneously. It used to take hours, because it would extract every VM backup and verify it. Judging by the logs, it's only verifying dom0. Unless something has changed with how Qubes verifies its backups, there may be a bug that causes verification to

Re: [qubes-users] Survey from HackerNCoder: Colors in QubesOS

2021-03-16 Thread tetrahedra via qubes-users
On Mon, Mar 15, 2021 at 10:16:04PM +, hackerncoder wrote: I have created a survey about colors in Qubes, to help understand users: Are there too many colors? Too few? What do users associate with the colors? what are they used for? There wasn't any space in the survey for general

[qubes-users] Qubes AEM: write protecting BIOS is not possible

2021-03-09 Thread tetrahedra via qubes-users
The [Qubes AEM docs](https://github.com/QubesOS/qubes-antievilmaid) recommend: Some hints: connect the write protect pin on BIOS flash chip to ground (prevents attacker from booting their own software which would bypass BIOS protections and overwrite it) and make sure physically accessing the

Re: [qubes-users] Opening applications using qvm-run

2021-03-01 Thread tetrahedra via qubes-users
On Sun, Feb 28, 2021 at 08:03:47PM +0100, airelemental via qubes-users wrote: Try: $ qvm-run --service anon qubes.StartApp+janondisttorbrowser $ qvm-run --service untrusted qubes.StartApp+firefox $ qvm-run --service personal qubes.StartApp+thunderbird Thanks, that did the trick! Two

Re: [qubes-users] Opening applications using qvm-run

2021-03-01 Thread tetrahedra via qubes-users
On Sun, Feb 28, 2021 at 11:49:04PM +, unman wrote: It's not Torbrowser specific for me, that was just an example using a Whonix Workstation VM. (it does work as stated -- I did test it) In actuality I want to launch specific applications (that launch fine using applications menu) from a

Re: [qubes-users] Opening applications using qvm-run

2021-02-28 Thread tetrahedra via qubes-users
On Sat, Feb 27, 2021 at 11:57:32PM +, unman wrote: Is this Torbrowser specific? Because it doesn't block with other programs (or at least doesn't seem to do so for me). On what is the "anon" qube based? How is it configured to run torbrowser with no path? It's not Torbrowser specific for

[qubes-users] Opening applications using qvm-run

2021-02-27 Thread tetrahedra via qubes-users
I'm trying to figure out how to open applications in VMs from dom0 using qvm-run, and how to do so without blocking the terminal in dom0. For example: ``` $ qvm-run anon "torbrowser qubes-os.org" Running 'torbrowser qubes-os.org' on anon ``` The above command sucessfully launches Tor Browser

[qubes-users] Opening applications using qvm-run

2021-02-27 Thread tetrahedra via qubes-users
I'm trying to figure out how to open applications in VMs from dom0 using qvm-run, and how to do so without blocking the terminal in dom0. For example: ``` $ qvm-run anon "torbrowser qubes-os.org" Running 'torbrowser qubes-os.org' on anon ``` The above command sucessfully launches Tor Browser

Re: [qubes-users] [unofficial] Qubes security advisory

2020-11-05 Thread tetrahedra via qubes-users
On Mon, Oct 26, 2020 at 04:04:30PM -0400, Chris Laprise wrote: On 10/25/20 10:24 PM, 'J.M. Porup' via qubes-users wrote: One morning last week, I launched a disposable Debian 10 template with my preset defaults of no netvm and a blank page preset--but instead a default page of

Re: [qubes-users] Calling all humans! (from Nina)

2020-10-12 Thread tetrahedra via qubes-users
On Sun, Oct 11, 2020 at 11:42:27PM +0500, Stumpy wrote: Thanks for this, I have filled it out and volunteered but really really really wanted to iterate one big (for me) point, and that is include at least some of the things listed in the documentation as an option in the setup. Side idea:

[qubes-users] Google requiring login to access qubes-users

2020-08-15 Thread tetrahedra via qubes-users
WHen I try to access the Google Groups qubes-users site, sometimes (circa 50%) I'm presented with a Google login prompt and can't access the qubes-users group unless I have a Google account. Since Qubes is privacy-focused it seems like maybe the Qubes mailing lists should migrate to a less

Re: [qubes-users] Some questions about Electrum split wallet

2020-06-21 Thread tetrahedra via qubes-users
On Sun, Jun 21, 2020 at 03:33:57PM +, 'Totally Zoid' via qubes-users wrote: The instructions for using Electrum split wallet on the Qubes website recommend installing electrum with dnf. However this gives electrum 3.3.4, which is not the most recent version, that is 3.3.8, available from

Re: [qubes-users] Re: A lot of dom0 updates recently

2020-06-21 Thread tetrahedra via qubes-users
On Fri, Jun 19, 2020 at 07:28:52AM -0700, Lorenzo Lamas wrote: Security issues are always published in Qubes Security Bulletins, which are also in the News section of Qubes website. The only recent Security Bulletin is about the new Intel CPU vulnerabilities, but that isn't in the stable

Re: [qubes-users] A lot of dom0 updates recently

2020-06-21 Thread tetrahedra via qubes-users
On Fri, Jun 19, 2020 at 04:41:03AM +, Logan wrote: I've been noticing this, too. Something interesting has been occurring in about half of my Dom0 updates lately: In the "details" section of the Qubes Updater it shows no detail, only: Fairly ambiguous. Did it even update?

[qubes-users] A lot of dom0 updates recently

2020-06-17 Thread tetrahedra via qubes-users
dom0 seems to be getting a lot of updates at the moment (3x in the last 1-2 weeks?) ... are there any security holes we should know about? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails

Re: [qubes-users] Hallo, es kann langsam losgehen mit Qubes Deutschland Forum, sowie mit der Software Übersetzung in deutsche Sprache

2020-05-15 Thread tetrahedra via qubes-users
On Fri, May 15, 2020 at 10:27:06AM -0700, wirsindei...@gmail.com wrote: Hallo liebe Mädels und Jungs, das ist jetzt mein Qubes Forum in deutsche Sprache. https://qubes-deutschland-forum.gegenseitige-hilfe.org/index.php Bitte schaut mal rein und sagt mir, was man noch verbessern bzw. umsetzen

Re: [qubes-users] Salt worm

2020-05-15 Thread tetrahedra via qubes-users
On Fri, May 08, 2020 at 02:29:02PM +0100, unman wrote: If there is a basic writeup out there with examples how to automate tempalte setup for Qubes ... that would be really great. I ran some training a few years back, and the notes are here: https://github.com/unman/notes/tree/master/salt

Re: [qubes-users] Salt worm

2020-05-07 Thread tetrahedra via qubes-users
On Wed, May 06, 2020 at 02:17:15PM +0100, unman wrote: Salt is used to provision the qubes at initial install - I'd also argue that you *should* use salt to set up and control your templates and qubes, since it allows you to rebuild your system automatically. No more trying to remember what

[qubes-users] Salt worm

2020-05-05 Thread tetrahedra via qubes-users
Qubes uses Salt, and there's something nasty going around: https://saltexploit.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

[qubes-users] Making boot-from-CD permanent for an appVM

2020-04-19 Thread tetrahedra via qubes-users
Is it possible to make the `--drive` option for `qvm-start` permanent? For example, to configure a Tails AppVM with no persistency but also without creating a separate TemplateVM, DispVM template, and then DispVM. -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Cloning a DVM: some apps don't start disposably

2020-03-31 Thread tetrahedra via qubes-users
On Fri, Mar 27, 2020 at 09:09:12AM +, tetrahedra via qubes-users wrote: I have a dispVM `my-dvm` where everything works as it should: if I open Firefox, that Firefox instance starts in a new disp VM. I want to clone that dispVM and create a new dispVM connected to a different network

[qubes-users] Cloning a DVM: some apps don't start disposably

2020-03-27 Thread tetrahedra via qubes-users
I have a dispVM `my-dvm` where everything works as it should: if I open Firefox, that Firefox instance starts in a new disp VM. I want to clone that dispVM and create a new dispVM connected to a different network-providing VM, so I do exactly that: clone `my-dvm` and set the netVM for

Re: [qubes-users] Why not make it possible to use a custom key combination for changing the keyboard layout when installing Qubes OS ?

2020-03-13 Thread tetrahedra via qubes-users
On Tue, Mar 10, 2020 at 11:58:21AM -0700, 'M' via qubes-users wrote: torsdag den 5. marts 2020 kl. 14.19.59 UTC+1 skrev tetra...@danwin1210.me: On Thu, Mar 05, 2020 at 03:33:54AM -0800, A wrote: >When installing Qubes OS, it’s possible to choose between some predetermined key combinations for

Re: [qubes-users] Obtaining genuine Qubos installer

2020-03-07 Thread tetrahedra via qubes-users
On Thu, Mar 05, 2020 at 06:33:38PM +, Mark Fernandes wrote: By the way, I consider that I am being completely reasonable with my threat model, whilst also employing critical thinking. How hard is it to go to a large PC store, and pick at random one Linux distribution, to take home, to

Re: [qubes-users] Why not make it possible to use a custom key combination for changing the keyboard layout when installing Qubes OS ?

2020-03-05 Thread tetrahedra via qubes-users
On Thu, Mar 05, 2020 at 03:33:54AM -0800, A wrote: When installing Qubes OS, it’s possible to choose between some predetermined key combinations for changing the keyboard layout. Why not also make it possible for the user to make his or her own key combination for changing the keyboard layout

Re: [qubes-users] Building an X-230 into a Qubes machine.

2020-03-05 Thread tetrahedra via qubes-users
On Wed, Mar 04, 2020 at 04:51:38AM -0800, ggg...@gmail.com wrote: As I could not afford a Privacy Beast, I bought a refurbished X-230 Core I5, 4 GB RAM to convert on my own. Soon I will get the 16 GB of RAM to put into it. I am looking to buy a ch-431a to program it from Amazon. I know the

Re: [qubes-users] Manual VPN installation issues

2020-03-05 Thread tetrahedra via qubes-users
On Tue, Mar 03, 2020 at 09:18:54AM -0500, Chris Laprise wrote: Assuming nothing's terribly wrong, it may be worth posting your public key fingerprint used for code signing somewhere! The B281C952 key is a subkey of F07F1886; Import both and the former will be listed under the latter. Ok,

Re: [qubes-users] Anyone gotten bitcoind to install via snapcraft on an AppVM?

2020-03-05 Thread tetrahedra via qubes-users
On Tue, Mar 03, 2020 at 11:17:53AM +, qubenix wrote: That's true, but using a pruned bitcoind will limit its usefulness as a backend for other software (eg. electrum servers, block explorers). You may be able to use it for a specific purpose (eg. joinmarket), but the point of my guides is

Re: [qubes-users] Manual VPN installation issues

2020-03-03 Thread tetrahedra via qubes-users
On Sun, Feb 16, 2020 at 10:50:55AM -0500, Chris Laprise wrote: If the process seems too complicated, you can try my VPN support tool, which automates most of the steps (you would download the config files from the second link to use with this): https://github.com/tasket/Qubes-vpn-support --

Re: [qubes-users] Anyone gotten bitcoind to install via snapcraft on an AppVM?

2020-03-03 Thread tetrahedra via qubes-users
On Thu, Feb 27, 2020 at 03:18:30PM +, tetrahedra via qubes-users wrote: Current best solution for running bitcoind on an AppVM: Download the binaries, run bitcoind as `user` For future reference, the current Bitcoin-on-Qubes howtos appear to be here: https://github.com/qubenix/qubes

[qubes-users] Anyone gotten bitcoind to install via snapcraft on an AppVM?

2020-02-27 Thread tetrahedra via qubes-users
Current best solution for running bitcoind on an AppVM: Download the binaries, run bitcoind as `user` Disadvantages: - bitcoind runs as the main VM user, no isolation - no automatic updates of bitcoind - no systemd service file, have to hack something together with `rc.local` to get bitcoind

Re: [qubes-users] Running sshd on an AppVM

2020-02-24 Thread tetrahedra via qubes-users
On Mon, Feb 17, 2020 at 09:28:37AM +0100, dhorf-hfref.4a288...@hashmail.org wrote: How do I set up an SSH server on my AppVM? i deviate from the regular "how to do portforwards with qubes" for this and have a qubes-rpc service that basicly just does "exec sudo sshd -i" in the target vms, then

Re: [qubes-users] Running sshd on an AppVM

2020-02-24 Thread tetrahedra via qubes-users
On Mon, Feb 17, 2020 at 10:03:26AM +0100, dhorf-hfref.4a288...@hashmail.org wrote: On Mon, Feb 17, 2020 at 08:59:18AM +, tetrahedra via qubes-users wrote: like only debian's `apt-search` will search the binary names, fedora's `dnf search` appears not to. dnf whatprovides sshd Did

Re: [qubes-users] Running sshd on an AppVM

2020-02-17 Thread tetrahedra via qubes-users
On Mon, Feb 17, 2020 at 08:16:32AM +, tetrahedra via qubes-users wrote: I need to set up a reverse SSH tunnel -- where a remote machine, behind a firewall, connects to my local machine, running sshd. The documentation for exposing a VM port to the outside world is clear enough. But sshd

[qubes-users] Running sshd on an AppVM

2020-02-17 Thread tetrahedra via qubes-users
I need to set up a reverse SSH tunnel -- where a remote machine, behind a firewall, connects to my local machine, running sshd. The documentation for exposing a VM port to the outside world is clear enough. But sshd doesn't appear to be installed on any template, nor does it appear to be

Re: split-mail setups (was: Re: [qubes-users] Will Thunderbird 78 kill Qubes Split gpg?)

2020-02-11 Thread tetrahedra via qubes-users
On Tue, Feb 11, 2020 at 06:53:58PM -0600, Sven Semmler wrote: mutt in a no-netvm mua-vault? with fetchmail-vms feeding it through qubesrpc-procmail? and separate vms for qubesrpc-msmtp for sending? or msmtp-vms mixed with the fetchmail-vms based on credentials-overlap? but, yes. not really a

Re: [qubes-users] Re: Upgrade to 16 GB RAM for an X230

2020-02-09 Thread tetrahedra via qubes-users
On Sun, Feb 09, 2020 at 03:37:45PM +, unman wrote: Any other suggestions of fixes, upgrades, or tests to make? Replace Intel wifi with Atheros. What's the benefit of the Atheros chip over Intel? -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] dom0 refusing to update

2020-02-01 Thread tetrahedra via qubes-users
On Sat, Feb 01, 2020 at 11:07:20AM +0100, David Hobach wrote: find: '/var/lib/qubes/dom0-updates/var/cache': No such file or directory Qubes OS Repository for Dom0 18 MB/s | 32 kB 00:00 This has been happening for a while, it seems like

[qubes-users] dom0 refusing to update

2020-01-31 Thread tetrahedra via qubes-users
I could just create the cache directory, but there's probably something more fundamentally wrong: $ sudo qubes-dom0-update --> Running transaction check ---> Package anaconda-core.x86_64 1000:25.20.9-17.fc25 will be installed ---> Package anaconda-gui.x86_64 1000:25.20.9-17.fc25 will be

Re: [qubes-users] Disposable sys-usb creation fails with "unable to recet PCI device"

2020-01-28 Thread tetrahedra via qubes-users
On Tue, Jan 28, 2020 at 11:52:56PM +, 'Andrey Arapov' via qubes-users wrote: Hum, I have just realized that you have also noticed one more error: libxl_pci.c: libxl__device_pci_reset: The kernel doesn't support reset from sysfs for PCI device :00:14.0 It looks like this error is

Re: [qubes-users] Disposable sys-usb creation fails with "unable to recet PCI device"

2020-01-28 Thread tetrahedra via qubes-users
On Tue, Jan 28, 2020 at 10:59:00PM +, 'Andrey Arapov' via qubes-users wrote: Hi tetrahedra, The original error ("unable to reset PCI device...") still occurs when trying to start disp-sys-usb. Despite have the "no-strict-reset" set to True, you will continue to see the "Unable to reset

Re: [qubes-users] Disposable sys-usb creation fails with "unable to recet PCI device"

2020-01-28 Thread tetrahedra via qubes-users
On Tue, Jan 28, 2020 at 12:22:00PM +, unman wrote: Now *that* confusion is cleared up, I assume your problem has gone away? Yes (so far). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving

Re: [qubes-users] Disposable sys-usb creation fails with "unable to recet PCI device"

2020-01-27 Thread tetrahedra via qubes-users
On Mon, Jan 27, 2020 at 11:37:01AM +, unman wrote: I run named disposable sys-usbs, from a usb template. In my experience it is *not* necessary to pass the reset option on each boot. The option is set once and applies on every boot. (On one x230 I have a separate print usb, and just switch

Re: [qubes-users] Disposable sys-usb creation fails with "unable to recet PCI device"

2020-01-26 Thread tetrahedra via qubes-users
On Mon, Jan 27, 2020 at 02:18:42AM +0100, tetrahedra via qubes-users wrote: On Sun, Jan 26, 2020 at 08:11:45AM +0100, tetrahedra via qubes-users wrote: The original error ("unable to reset PCI device...") still occurs when trying to start disp-sys-usb. The error is now also happen

Re: [qubes-users] Disposable sys-usb creation fails with "unable to recet PCI device"

2020-01-26 Thread tetrahedra via qubes-users
On Sun, Jan 26, 2020 at 08:11:45AM +0100, tetrahedra via qubes-users wrote: The original error ("unable to reset PCI device...") still occurs when trying to start disp-sys-usb. The error is now also happening when I try to start sys-usb! I was able to get disp-sys-usb start (w

Re: [qubes-users] Disposable sys-usb creation fails with "unable to recet PCI device"

2020-01-25 Thread tetrahedra via qubes-users
On Sat, Jan 25, 2020 at 05:35:20AM +0100, tetrahedra via qubes-users wrote: On Thu, Jan 23, 2020 at 02:22:20PM +, 'awokd' via qubes-users wrote: tetrahedra via qubes-users: Following the directions here: https://www.qubes-os.org/doc/disposablevm-customization/#create-the-sys-usb

Re: [qubes-users] Qubes, Fedora, and package signing

2020-01-24 Thread tetrahedra via qubes-users
On Thu, Jan 23, 2020 at 02:30:52PM +, 'awokd' via qubes-users wrote: tetrahedra via qubes-users: A few times people have observed that Fedora's package signing leaves a few things to be desired. While Qubes' security model doesn't depend on Fedora entirely, a compromised template

Re: [qubes-users] Disposable sys-usb creation fails with "unable to recet PCI device"

2020-01-24 Thread tetrahedra via qubes-users
On Thu, Jan 23, 2020 at 02:22:20PM +, 'awokd' via qubes-users wrote: tetrahedra via qubes-users: Following the directions here: https://www.qubes-os.org/doc/disposablevm-customization/#create-the-sys-usb-disposablevm In step 5, did you include the option? I used the Qube Manager GUI

[qubes-users] Qubes, Fedora, and package signing

2020-01-21 Thread tetrahedra via qubes-users
A few times people have observed that Fedora's package signing leaves a few things to be desired. While Qubes' security model doesn't depend on Fedora entirely, a compromised template compromises the machine -- and package repos are a good way to compromise a template. Why does Qubes still seem

[qubes-users] Disposable sys-usb creation fails with "unable to recet PCI device"

2020-01-20 Thread tetrahedra via qubes-users
Following the directions here: https://www.qubes-os.org/doc/disposablevm-customization/#create-the-sys-usb-disposablevm I already had a sys-usb VM so did not need to hide USB controllers from dom0. After finishing with the given steps, I run `qvm-start disp-sys-usb` and get the error: ``` $

Re: [qubes-users] Open several files in THE SAME dispVM

2020-01-17 Thread tetrahedra via qubes-users
On Fri, Jan 17, 2020 at 05:40:50PM +0100, r.wiesb...@web.de wrote: Hey, Is there a way to open a bunch of files in the same dispVM ? Yes, I can copy/move those files and open them in the dispVM, that is what I do right now - but it would be nice if there was a simpler way to do so. I agree,

Re: [qubes-users] Xen doesn't recognize that a VM has finished starting

2020-01-15 Thread tetrahedra via qubes-users
On Wed, Jan 15, 2020 at 11:22:12PM +, Claudia wrote: When I try to start another VM which has been set to use the new-sys-net VM as its NetVM, the startup times out and I get the error "libxenlight has failed to create new domain NEWVM"... /var/log/xen/console/guest-NEWSYSNET-dm.log

Re: [qubes-users] How do vif-route-qubes and DNS forwarding work?

2020-01-14 Thread tetrahedra via qubes-users
On Tue, Jan 14, 2020 at 04:46:16PM +0100, David Hobach wrote: You'll find the explanations in the respective iptables and/or nftables rules of the next hop networking VM. What do you mean by "next hop networking VM"? -- You received this message because you are subscribed to the Google Groups

[qubes-users] How do vif-route-qubes and DNS forwarding work?

2020-01-14 Thread tetrahedra via qubes-users
(originally sent to qubes-devel, but I guess failed moderation) I can't quite tell from the source code -- when / where / how does it run? Is it used to change routing on sys-net, or is it used to set routing in other VMs so they work with sys-net? How does DNS forwarding work? (the Qubes

[qubes-users] Xen doesn't recognize that a VM has finished starting

2020-01-14 Thread tetrahedra via qubes-users
I have a HVM VM that I'm trying to set up as a new sys-net. However, when I boot it, Xen / Qubes doesn't seem to recognize that the domain has finished starting. The Qubes menu at the top right shows the red circling progress logo, even though the domain has booted already. When I try to

Re: [qubes-users] Re: Making a HVM VM start in headless mode

2020-01-12 Thread tetrahedra via qubes-users
On Sun, Jan 12, 2020 at 12:31:15AM -0800, alex.bari...@gmail.com wrote: The following settings work for me: 1. Set "debug" to "False" in qvm-prefs 2. Set "gui" to "False" and "gui-emulated" to "False" The only problem is qubes (or xen) keeps cashed info on whether to show emulated console.

[qubes-users] Making a HVM VM start in headless mode

2020-01-11 Thread tetrahedra via qubes-users
When I create a HVM VM, by default I have the console window of the VM open all the time when it is running. Sys-net is HVM by default but there is no console window. How do I set this up for other HVM VMs? -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Troubleshooting Qubes graphical slowness

2020-01-04 Thread tetrahedra via qubes-users
On Sun, Dec 29, 2019 at 01:44:28PM +, 'awokd' via qubes-users wrote: tetrahedra via qubes-users: On Fri, Dec 27, 2019 at 09:57:16AM +0100, tetrahedra via qubes-users wrote: Unfortunately I need to get work done so have to reboot to "just make it go away" but I am still

Re: [qubes-users] Troubleshooting Qubes graphical slowness

2020-01-04 Thread tetrahedra via qubes-users
On Mon, Dec 30, 2019 at 05:31:58PM -0500, Steve Coleman wrote: I have had graphics slowdown issues in the past on two occasions that acted like this, so here are some things to try: 1) Add the 'nopat' argument to the 'kernel opts:' boot command line. > qvm-prefs -s kernelopts nopat I just

Re: [qubes-users] Mounting a VM's storage on a different machine

2020-01-02 Thread tetrahedra via qubes-users
On Fri, Jan 03, 2020 at 02:48:15AM +0100, tetrahedra via qubes-users wrote: (subject line is incorrect, should be "mounting on a different VM") On Fri, Jan 03, 2020 at 02:47:00AM +0100, tetrahedra via qubes-users wrote: I have a VM that's having serious problems. Is there any wa

[qubes-users] What happened to "paranoid mode"?

2020-01-02 Thread tetrahedra via qubes-users
From back in the 3.2 era: https://www.qubes-os.org/news/2017/04/26/qubes-compromise-recovery/ $ qvm-backup-restore --paranoid-mode On my 4.0 install this option does not appear. Is it no longer considered necessary? -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Mounting a VM's storage on a different machine

2020-01-02 Thread tetrahedra via qubes-users
(subject line is incorrect, should be "mounting on a different VM") On Fri, Jan 03, 2020 at 02:47:00AM +0100, tetrahedra via qubes-users wrote: I have a VM that's having serious problems. Is there any way to mount the VM's private storage (/rw/*) on a different VM, in order to recove

[qubes-users] Mounting a VM's storage on a different machine

2020-01-02 Thread tetrahedra via qubes-users
I have a VM that's having serious problems. Is there any way to mount the VM's private storage (/rw/*) on a different VM, in order to recover the data? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop

Re: [qubes-users] Booting VM to single user mode

2020-01-02 Thread tetrahedra via qubes-users
On Fri, Jan 03, 2020 at 01:25:36AM +, 'awokd' via qubes-users wrote: Unfortunately there is still the problem that the VM is killed after 60 seconds because Qubes can't connect to the qrexec agent... anyone know how to disable this? Try qvm-prefs with qrexec_timeout. 0 might disable, or

Re: [qubes-users] Booting VM to single user mode

2020-01-02 Thread tetrahedra via qubes-users
On Fri, Jan 03, 2020 at 01:58:06AM +0100, tetrahedra via qubes-users wrote: is it possible? I tried using `sudo virsh edit MYVM` to add `single` / `init=/bin/bash` (for fedora & debian, respectively) to the kernel but the settings would not validate, and after I selected "ignore&

[qubes-users] Booting VM to single user mode

2020-01-02 Thread tetrahedra via qubes-users
is it possible? I tried using `sudo virsh edit MYVM` to add `single` / `init=/bin/bash` (for fedora & debian, respectively) to the kernel but the settings would not validate, and after I selected "ignore" to force it, the machine still did not boot into single-user mode. -- You received this

Re: [qubes-users] Troubleshooting Qubes graphical slowness

2019-12-29 Thread tetrahedra via qubes-users
On Sun, Dec 29, 2019 at 01:44:28PM +, 'awokd' via qubes-users wrote: tetrahedra via qubes-users: On Fri, Dec 27, 2019 at 09:57:16AM +0100, tetrahedra via qubes-users wrote: Unfortunately I need to get work done so have to reboot to "just make it go away" but I am still

Re: [qubes-users] Qubes Structure

2019-12-29 Thread tetrahedra via qubes-users
On Sun, Dec 29, 2019 at 10:56:31AM +0100, xao wrote: Hi!  Sorry for the bad question structure, don't know how to write it properly. I've seen some examples of how people setup their system and the most paranoid ones create separate standalone vm for each application and firewall that allows

Re: [qubes-users] sys-net interfaces

2019-12-27 Thread tetrahedra via qubes-users
On Fri, Dec 27, 2019 at 08:46:35AM +, 'awokd' via qubes-users wrote: What responsibilties does sys-net have in terms of forwarding DNS? The documentation specifies how things work for AppVMs, and it says there is no DNS server in the "network driver domain" (sys-net), but it does not say

Re: [qubes-users] Troubleshooting Qubes graphical slowness

2019-12-27 Thread tetrahedra via qubes-users
On Fri, Dec 27, 2019 at 09:57:16AM +0100, tetrahedra via qubes-users wrote: Unfortunately I need to get work done so have to reboot to "just make it go away" but I am still interested in troubleshooting ideas (for when it happens next). One thing I noticed on reboot -- the ini

Re: [qubes-users] Troubleshooting Qubes graphical slowness

2019-12-27 Thread tetrahedra via qubes-users
On Fri, Dec 27, 2019 at 08:49:02AM +, 'awokd' via qubes-users wrote: Further inspection shows there's a LOT of disk I/O going on. after installing iotop in dom0, this appears to be coming from command [NN.xvda-0], presumably one of the VMs. How do I map the NN (number) to a given running

Re: [qubes-users] Troubleshooting Qubes graphical slowness

2019-12-27 Thread tetrahedra via qubes-users
On Fri, Dec 27, 2019 at 09:05:52AM +0100, tetrahedra via qubes-users wrote: On Fri, Dec 27, 2019 at 08:33:10AM +0100, tetrahedra via qubes-users wrote: Periodically all graphics-heavy apps (Firefox, ...) in all VMs seem to slow down simultaneously. Rebooting fixes the situation. Running `sudo

Re: [qubes-users] Troubleshooting Qubes graphical slowness

2019-12-27 Thread tetrahedra via qubes-users
On Fri, Dec 27, 2019 at 08:33:10AM +0100, tetrahedra via qubes-users wrote: Periodically all graphics-heavy apps (Firefox, ...) in all VMs seem to slow down simultaneously. Rebooting fixes the situation. Running `sudo journalctl -f` in dom0 doesn't show anything unusual. What would you suggest

[qubes-users] Troubleshooting Qubes graphical slowness

2019-12-26 Thread tetrahedra via qubes-users
Periodically all graphics-heavy apps (Firefox, ...) in all VMs seem to slow down simultaneously. Rebooting fixes the situation. Running `sudo journalctl -f` in dom0 doesn't show anything unusual. What would you suggest as a next step towards locating the problem? -- You received this message

Re: [qubes-users] sys-net interfaces

2019-12-26 Thread tetrahedra via qubes-users
On Thu, Dec 26, 2019 at 11:47:37AM +, 'awokd' via qubes-users wrote: There's a brief discussion at https://www.qubes-os.org/doc/networking/, but there may be more detailed notes in the source code for Qubes' VM networking components. Qubes uses Xen's networking, so that might be the best

Re: [qubes-users] sys-net interfaces

2019-12-26 Thread tetrahedra via qubes-users
On Thu, Dec 26, 2019 at 11:47:37AM +, 'awokd' via qubes-users wrote: tetrahedra via qubes-users: I haven't been able to find any documentation for what network interfaces sys-net is expected to expose internally. If I want to create my own sys-net from scratch, how does Xen/Qubes send

[qubes-users] sys-net interfaces

2019-12-21 Thread tetrahedra via qubes-users
I haven't been able to find any documentation for what network interfaces sys-net is expected to expose internally. If I want to create my own sys-net from scratch, how does Xen/Qubes send network traffic to sys-net, to be sent onwards to my NIC? -- You received this message because you are

Re: [qubes-users] Mike's emails

2019-12-13 Thread tetrahedra via qubes-users
On Fri, Dec 13, 2019 at 08:59:16AM +0100, David Hobach wrote: I am getting very many duplicate copies of Mike's emails, but only of emails from Mike. Is this happening to anyone else? Probably because he clicked "reply all" on one of your questions like I just did. No, when that happens (as

[qubes-users] Mike's emails

2019-12-12 Thread tetrahedra via qubes-users
On Thu, Dec 12, 2019 at 05:23:47PM +, Mike Keehan wrote: Qubes won't help in this situation - see https://www.qubes-os.org/doc/disposablevm/#disposablevms-and-local-forensics They recommend using Tails for this type of situation. Mike. I am getting very many duplicate copies of Mike's

Re: [qubes-users] sys-net keeps dying

2019-12-12 Thread tetrahedra via qubes-users
On Wed, Dec 11, 2019 at 11:46:04AM +, 'awokd' via qubes-users wrote: This should work, but make sure sys-firewall is shutdown before attempting to change. If it still isn't, try changing with qvm-prefs sys-firewall. Ok, I didn't realize sys-firewall had to be shutdown. Most of the time you

Re: [qubes-users] sys-net keeps dying

2019-12-10 Thread tetrahedra via qubes-users
On Thu, Dec 05, 2019 at 03:05:42PM +, Claudia wrote: I am wondering if it would make sense to re-create sys-net from scratch. Could it be that this is something from fedora-29 that is not working well with fedora-30? Did you keep the fedora 29 template installed? If so, I think you could

Re: [qubes-users] Days since last backup

2019-12-09 Thread tetrahedra via qubes-users
On Tue, Nov 26, 2019 at 05:26:54AM +0100, tetrahedra via qubes-users wrote: I've created a script and user-mode anacrontab to automatically remind the user if it's been more than N days since the last backup. Are the qubes-community-docs the best place to document this, or is there a better

Re: [qubes-users] Dom0 screencapture with cron

2019-12-09 Thread tetrahedra via qubes-users
On Thu, Nov 28, 2019 at 09:13:22AM -0800, hoff8h...@gmail.com wrote: I'm just running through some ideas. Something every hour is a little much, but I would like to take a screenshot of the whole window after a script is run. Still the same question. It's not quite capturing screenshots, but

[qubes-users] sys-net keeps dying

2019-12-08 Thread tetrahedra via qubes-users
see the corresponding issue: https://github.com/QubesOS/qubes-issues/issues/5508 The tldr is that ever since I upgraded to fedora-30, sys-net has started dying intermittently (or less intermittently, nearly every time) I put my laptop to sleep. This is really problematic. I am wondering if it

Re: [qubes-users] Activating FDE on lid close

2019-12-07 Thread tetrahedra via qubes-users
On Fri, Nov 01, 2019 at 07:38:53AM +0100, tetrahedra via qubes-users wrote: The original scenario is that the user shuts the laptop lid knowing that an adversary is about to take control of the machine. In this case, an evil maid attack is not really an issue... by the time the user gets

Re: [qubes-users] AppVM stuck as disposable in menu

2019-12-02 Thread tetrahedra via qubes-users
On Mon, Nov 25, 2019 at 03:20:16AM +0100, tetrahedra via qubes-users wrote: After creating an AppVM, I experimented with making it (the basis of) a disposable VM, but then un-did the settings and went back to using it as a regular AppVM. Unfortunately it's still showing up in the applications

[qubes-users] What's the logic behind many similar templates?

2019-11-29 Thread tetrahedra via qubes-users
By default Qubes comes with two templates for AppVMs: a Debian template and a Fedora one. But many people seem to clone templates, so they also have an e.g "fedora-minimal" template or a "-multimedia" one or any number of other variations. Why not just have "one template to rule them all" for

Re: [qubes-users] Fedora 29 has reached EOL

2019-11-29 Thread tetrahedra via qubes-users
On Fri, Nov 29, 2019 at 04:17:39AM -0600, Andrew David Wong wrote: Please note that no user action is required regarding the OS version in dom0. For details, please see our Note on dom0 and EOL. [6] There have been a lot of dom0 updates recently. Is this related to EOL? -- You received this

Re: [qubes-users] Re: Shutting down a VM when applications close

2019-11-29 Thread tetrahedra via qubes-users
On Fri, Nov 29, 2019 at 11:03:49AM +, lik...@gmx.de wrote: On 2019-11-27 12:52, tetrahedra via qubes-users wrote: DispVMs shut down automatically when the launched application closes. Is it possible to enable this for certain applications in certain AppVMs as well? For example I may

[qubes-users] Making NetVMs follow their AppVMs

2019-11-27 Thread tetrahedra via qubes-users
If I have a NetVM, called my-vpn-vm, that provides network to my-app-vm, my-vpn-vm will automatically start when I launch an application from my-app-vm. However, when my-app-vm shuts down, my-vpn-vm will stay running. Is there any way to: a) automatically shut down a NetVM when there are no

Re: [qubes-users] Shutting down a VM when applications close

2019-11-27 Thread tetrahedra via qubes-users
On Wed, Nov 27, 2019 at 08:16:28AM -0500, Steve Coleman wrote: You can try this trick when starting your app/vm: dom0> qvm-run -a AppVM "resource-heavy-app;shutdown -h now" When the application closes the next command in line is the shutdown command, and the VM will simply exit. As long as

[qubes-users] Shutting down a VM when applications close

2019-11-27 Thread tetrahedra via qubes-users
DispVMs shut down automatically when the launched application closes. Is it possible to enable this for certain applications in certain AppVMs as well? For example I may not want my "resource-heavy-apps-vm" to keep running after MemoryHungryApp closes, because that ties up half my system RAM.

[qubes-users] Modern laptops, Intel ME, and AEM

2019-11-27 Thread tetrahedra via qubes-users
On Tue, Nov 26, 2019 at 01:05:08PM -0800, Lambda wrote: Lenovo's 2019 laptop is currently on sale and their CPU selection[1] includes: - i7-9750H: no vPro, No Out-of-Band Systems Management - i7-9850H: vPro, Intel ME Disabled [--] I'm aware that for AEM support I would need to have ME and

  1   2   >