[qubes-users] Re: How to find a notebook with VT-d (IOMMU) support

2016-07-28 Thread ab0f1985
On Tuesday, 20 August 2013 21:12:12 UTC+3, Eric Shelton wrote: > VT-d, which provides IOMMU services, is a very important feature for > realizing the security promises of Qubes OS.  Without it, although the CPU > isolates VMs, their memory lies open to relatively easy DMA-based attacks, > with

[qubes-users] Re: Can't seem to get my wireless working. Any help would be appreciated!

2016-07-28 Thread Gorka Alonso
El jueves, 28 de julio de 2016, 10:24:10 (UTC+2), randal...@gmail.com escribió: > I cant get my bcm4360 drivers to install properly and when I paste the code > into sys-net terminal I get this error. please help me out thanks! > > > [user@sys-net ~]$ wget http://git.io/vuLC7 -v -O >

Re: [qubes-users] Re: A problem with update

2016-07-28 Thread donoban
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 28/07/16 11:13, Marek Marczykowski-Górecki wrote: > Should be ok now. > Perfect, thanks Marek. -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXmc/cAAoJEBQTENjj7Qil27EP/j2j0vZdIin0lw1KRQxQz5CO

[qubes-users] Can't seem to get my wireless working. Any help would be appreciated!

2016-07-28 Thread randallrbaker
I've even turned off secure boot, but it still gives me the WL error. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.

[qubes-users] Can't seem to get my wireless working. Any help would be appreciated!

2016-07-28 Thread randallrbaker
I've even turned off secure boot, but it still gives me the WL error. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.

Re: [qubes-users] A problem with update

2016-07-28 Thread admixior
[Solved] Yum crashed because there's no more RAM. Include sys-firewall in memory balancing solved this problem. However "No updates available" is bit confusing. Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this

Re: [qubes-users] A problem with update

2016-07-28 Thread admixior
Okey, I did step by step (I hope every needed line) in quebes-dom0-update and on sys-firewall. Finally I runned yum and... some packages are checked and sys-firewall lagged for a while. After all it looks like that: http://pastebin.com/0SnJZh7M It seems like qubes-download-dom0-updates.sh

Re: [qubes-users] Re: How to find a notebook with VT-d (IOMMU) support

2016-07-28 Thread ab0f1985
On Thursday, 28 July 2016 12:57:43 UTC+3, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-07-28 01:43, ab0f1...@opayq.com wrote: > > On Thursday, 28 July 2016 11:39:24 UTC+3, Andrew David Wong wrote: > >> I don't think that's what he's saying. I think

Re: [qubes-users] A problem with update

2016-07-28 Thread admixior
Ok, maybe, but... I've got xen-4.6.0-13.fc20.x86_64 (rpm -qa | grep xen) instead of the new version mentioned in *-devel forum: http://yum.qubes-os.org/r3.1/current/dom0/fc20/rpm/xen-4.6.1-20.fc20.x86_64.rpm and qubes-dom0-update report always "No new updates available" I've tried run with

Re: [qubes-users] Re: How to find a notebook with VT-d (IOMMU) support

2016-07-28 Thread niels
> On July 28, 2016 at 10:43 AM ab0f1...@opayq.com wrote: > > On Thursday, 28 July 2016 11:39:24 UTC+3, Andrew David Wong wrote: > > > I don't think that's what he's saying. I think he's just pointing out that > > it > > can be very problematic. It's still worth trying if you have an AMD rig, >

[qubes-users] Qubes 3.2 rc2 has been released!

2016-07-28 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Details here: https://www.qubes-os.org/news/2016/07/28/qubes-OS-3-2-rc2-has-been-released/ As usual, you can download new image from: https://www.qubes-os.org/downloads/ Users of R3.2 rc1 can just install updates, no need for full reinstall. For

Re: [qubes-users] A problem with update

2016-07-28 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Jul 27, 2016 at 10:31:10PM -0700, admix...@gmail.com wrote: > Hi, > I'm trying to update qubes but there still show that there is no updates (for > few moths). > I thought that was true until I tried to download update for xen. > > Some

Re: [qubes-users] Re: A problem with update

2016-07-28 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jul 28, 2016 at 09:44:46AM +0200, donoban wrote: > > On 28/07/16 09:42, admix...@gmail.com wrote: > > Apart from the dom0 update, there is a something nasty in quebes-os > > debian jessie repository (debian-8, whonix-ws and gw): > > > > W:

Re: [qubes-users] Re: How to find a notebook with VT-d (IOMMU) support

2016-07-28 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-28 01:43, ab0f1...@opayq.com wrote: > On Thursday, 28 July 2016 11:39:24 UTC+3, Andrew David Wong wrote: >> I don't think that's what he's saying. I think he's just pointing out >> that it can be very problematic. It's still worth trying

[qubes-users] Re: Qubes 3.2 rc2 has been released!

2016-07-28 Thread neilhardley
Does this come with the newest Xen patch after the exploit yesterday? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.

Re: [qubes-users] Re: A problem with update

2016-07-28 Thread donoban
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 28/07/16 09:42, admix...@gmail.com wrote: > Apart from the dom0 update, there is a something nasty in quebes-os > debian jessie repository (debian-8, whonix-ws and gw): > > W: Failed to fetch >

[qubes-users] Question on creating USB qube

2016-07-28 Thread neilhardley
I am installing QUBES 3.2 to a new laptop. With the 1st option: [X] "Create a USB qube holding all USB controllers (sys-usb) [experimental]" There is then a 2nd option underneath: [ ] "Use sys-net qube for both networking and USB devices" Is it recommended to check the box for the 2nd option

[qubes-users] Re: Qubes 3.2 rc2 has been released!

2016-07-28 Thread Iestyn Best
Thank you guys, great work. Just a little side note, yesterday when I updated it seemed to break my window borders in KDE. I am now using XFCE and all seems fine. I have not tried KDE again today, just trying to get use to XFCE now as that is your focus now. -- You received this message

Re: [qubes-users] Question on creating USB qube

2016-07-28 Thread R.B.
On 07/28/2016 08:43 PM, neilhard...@gmail.com wrote: OK thanks for the explanation. Let me follow up with another question. Do I need to create a USB qube in order to take advantage of the VT-D/IOMMU protection for my internal WiFi chip... or is sys-net OK in that regard..? Hi Neil, In my

Re: [qubes-users] How to log all the websites accessed by a VM

2016-07-28 Thread Steve Coleman
On 07/26/2016 06:25 PM, Franz wrote: On Tue, Jul 26, 2016 at 11:38 AM, Steve Coleman > wrote: Another hack to avoid having to manually type in the addresses is done with the attached script. Its like Mareks solution, but does

[qubes-users] Re: networking on Dom0 - can I have it please?

2016-07-28 Thread facu . curti
El jueves, 25 de febrero de 2016, 23:26:21 (UTC-3), Nom escribió: > Is there anyway to get networking on Dom0 to work? > > Before everyone screams "UNACCEPTABLE!", (Don't pretend you weren't going > to). I know it doesn't fit the security model of the OS. But my threat model > - quite

[qubes-users] Wireless PCI card that is compatible with cubes os

2016-07-28 Thread randallrbaker
I'm having the worst time trying to get my wireless drivers working and am wondering if there is a wireless card that works out of the box? With out the need to download any drivers as I'm using my phone as a hotspot to access the net. -- You received this message because you are subscribed

Re: [qubes-users] Will SLAT / EPT truly make QUBES 4.0 more secure..?

2016-07-28 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jul 28, 2016 at 03:05:59PM -0700, neilhard...@gmail.com wrote: > Based on 2 Xen exploits in just the last 1 year, QUBES 4.0 is moving over to > using SLAT / EPT for memory isolation, and to using HVM/PVH rather than PV. > > Certainly, in

Re: [qubes-users] Question on creating USB qube

2016-07-28 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jul 28, 2016 at 03:31:12PM -0300, Desobediente wrote: > What that option means is to not actually create a new "sys-usb" qube to > handle the USB controllers, but rather use the already existing "sys-net" > qube to handle the USB

[qubes-users] Will SLAT / EPT truly make QUBES 4.0 more secure..?

2016-07-28 Thread neilhardley
Based on 2 Xen exploits in just the last 1 year, QUBES 4.0 is moving over to using SLAT / EPT for memory isolation, and to using HVM/PVH rather than PV. Certainly, in the last 2 Xen exploits, it has only affected PV and not HVM. However, is it possible that using Intel's EPT is even riskier..?

Re: [qubes-users] How to log all the websites accessed by a VM

2016-07-28 Thread Franz
On Thu, Jul 28, 2016 at 8:00 PM, Steve Coleman wrote: > On 07/26/2016 06:25 PM, Franz wrote: > >> >> >> On Tue, Jul 26, 2016 at 11:38 AM, Steve Coleman >> > wrote: >> >> Another hack to avoid having to

[qubes-users] HCL Acer Chomebook C710

2016-07-28 Thread Paul Harper
This Chromebook has been modified by install Coreboot from John Lewis. https://johnlewis.ie/custom-chromebook-firmware/rom-download/ I also added 16GB of RAM and an SSD 480 GB Hard Drive. All seems to be working well. -- Regards, Paul about.me/pauljamesharper GnuPG Fingerprint: B3C2 6A80

[qubes-users] What do you think about the idea of a FileVM?

2016-07-28 Thread epicdonk
A fileVM would be a mountable filesystem that 2 or more AppVMs can share. A fileVM could be a normal partition like MSDOS/FAT32, an encrypted filesystem, or even a distributed or cloud filesystem. There are numerous uses for this, for example, installing Dropbox on a Linux AppVM and sharing

[qubes-users] networking on Dom0

2016-07-28 Thread facu . curti
Hi there. I want to get networking on Dom0... I know everything you are going to say... I use qubes for investigate, I dont have ANY sensitive data, and I want to use Qubes, not another OS. I need to get a program that uses internet and 3D. As I have only one video card (passtrougth is

Re: [qubes-users] Qubes Security Bulletin #24 (Critical bug)

2016-07-28 Thread Chris Laprise
On 07/27/2016 04:27 PM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-26 20:01, Chris Laprise wrote: On 07/26/2016 08:45 PM, el...@tutanota.com wrote: What is best way to verify our system supports these things? I think you can also check out the

Re: [qubes-users] Qubes Security Bulletin #24 (Critical bug)

2016-07-28 Thread Niels Kobschaetzki
On 16/07/28 20:25, Chris Laprise wrote: On 07/27/2016 04:27 PM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-26 20:01, Chris Laprise wrote: On 07/26/2016 08:45 PM, el...@tutanota.com wrote: What is best way to verify our system supports these things? I

Re: [qubes-users] How to log all the websites accessed by a VM

2016-07-28 Thread Franz
On Wed, Jul 27, 2016 at 5:35 PM, R.B. wrote: > On 07/27/2016 12:25 AM, Franz wrote: > >> >> >> On Tue, Jul 26, 2016 at 11:38 AM, Steve Coleman >> > wrote: >> >> Another hack to avoid having to manually type in

Re: [qubes-users] How to log all the websites accessed by a VM

2016-07-28 Thread Desobediente
I'd like to add that I also use CIDR notation for the firewall rules, in addition to the name rules, and it works in most cases. Sometimes some services change their addresses, but the time consumed to add new entries is not relevant. I use the 'dig' tool to find out in which block they are.

Re: [qubes-users] Question on creating USB qube

2016-07-28 Thread Desobediente
What that option means is to not actually create a new "sys-usb" qube to handle the USB controllers, but rather use the already existing "sys-net" qube to handle the USB controllers. Since the "sys-net" qube already handles networking, the option states "both networking and USB devices". Having

Re: [qubes-users] Question on creating USB qube

2016-07-28 Thread neilhardley
OK thanks for the explanation. Let me follow up with another question. Do I need to create a USB qube in order to take advantage of the VT-D/IOMMU protection for my internal WiFi chip... or is sys-net OK in that regard..? -- You received this message because you are subscribed to the Google