Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread Sec Tester
After further testing, more specifically its a DNS IP leak with the AirVPN GUI with network lock off. I also leak DNS when running OpenVPN in the VPN-Proxy-VM, Havent yet applied Qubes scripts to stop leaks. -- You received this message because you are subscribed to the Google Groups

[qubes-users] .odt files and LibreOffice

2016-11-11 Thread 'IntersolarMN' via qubes-users
> Hello, > > Thank you for your work on Qubes. Note: I haven't used Linux in more than a > decade. I have installed Qubes and there's a couple of things I haven't > learned yet. Despite installing multiple word processors, none of my .odt > files will open via Qubes. I think I need step by

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread Sec Tester
I have successfully applied the setup and scripting in https://www.qubes-os.org/doc/vpn/ No more DNS leaks. This means i can atleast use my vpn, until i find a way to make things work with the AirVPN GUI. -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] .odt files and LibreOffice

2016-11-11 Thread Unman
On Fri, Nov 11, 2016 at 06:09:36AM -0500, 'IntersolarMN' via qubes-users wrote: > > Hello, > > > > > > Thank you for your work on Qubes. Note: I haven't used Linux in more than a > > decade. I have installed Qubes and there's a couple of things I haven't > > learned yet. Despite installing

[qubes-users] some trouble installing qubes on a macbook air. please help

2016-11-11 Thread birdei
basically i've been trying to install qubes on a macbook air (11-inch, early 2014). i've installed rEFInd and have partitioned my disk to allow space. when i boot my usb install stick, the installer comes up with "no drives detected" i've googled about everything (or maybe my search terms suck)

Re: [qubes-users] Re: Android-x86 on Qubes

2016-11-11 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Nov 08, 2016 at 11:09:37PM -0200, Torsten Grote wrote: > On 11/07/2016 08:54 PM, 3n7r0...@gmail.com wrote: > > AFAICT, it's an issue with how QEMU is implemented in Xen. The input > > device in question is passed via `-usbdevice tablet`

Re: [qubes-users] Display Calibration

2016-11-11 Thread Connor Page
the filename of the colour profile .icc-file is stored in the X atom _ICC_PROFILE. perhaps, if that is available then the correct profile can be selected by gnome settings manager which currently says there are no colour managed devices in vms. I think colord service would need to be enabled as

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread Chris Laprise
On 11/11/2016 01:24 PM, David Hobach wrote: On 11/10/2016 10:07 PM, Chris Laprise wrote: > On 11/10/2016 01:28 PM, David Hobach wrote: >> I'd recommend to avoid any tools employing iptables which were not >> written explicitly for Qubes as well. > > This. Or at least don't use them without

Re: [qubes-users] Re: Android-x86 on Qubes

2016-11-11 Thread entr0py
Marek Marczykowski-Górecki: > On Tue, Nov 08, 2016 at 11:09:37PM -0200, Torsten Grote wrote: >> On 11/07/2016 08:54 PM, 3n7r0...@gmail.com wrote: >>> AFAICT, it's an issue with how QEMU is implemented in Xen. The input >>> device in question is passed via `-usbdevice tablet` instead of being >>>

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread David Hobach
On 11/10/2016 10:07 PM, Chris Laprise wrote: > On 11/10/2016 01:28 PM, David Hobach wrote: >> I'd recommend to avoid any tools employing iptables which were not >> written explicitly for Qubes as well. > > This. Or at least don't use them without careful inspection. Might be worth to put some

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread Chris Laprise
On 11/11/2016 07:20 AM, Sec Tester wrote: I have successfully applied the setup and scripting in https://www.qubes-os.org/doc/vpn/ No more DNS leaks. This means i can atleast use my vpn, until i find a way to make things work with the AirVPN GUI. A tip for stopping DNS leaks with the GUI:

Re: [qubes-users] Clean install Windows 7 HVM fails after installing qubes-windows-tools 3.2.2-3

2016-11-11 Thread entr0py
pooosi...@vfemail.net: > 1) Create new HVM with 20Gb disk space and 2Gb RAM, Install Win7. You'll need closer to 40GB if you plan to fully update the OS. > 7) Manually start machine. Machine boots fine, but... nothing happens. > Seamless mode is disabled, but I cant see machine's window

[qubes-users] Please help, can't get into Qubes

2016-11-11 Thread Fred
I made a change to the PCI devices for the sys-net VM and now Qubes hangs on boot when starting this vm. I've tried using the installation image to get to system rescue via the troubleshooting link in the installer. I can get into my system this way but I'm unsure what to change as removing the

[qubes-users] Re: Qubes R3.2 on Thinkpad X250: cannot install Windows 7 (hangs on "Starting Windows" at install)

2016-11-11 Thread Myron Weber
On Wednesday, November 9, 2016 at 5:03:12 AM UTC-8, Pablo Di Noto wrote: > Hello, > > Never had much use for a Windows7 HVM so far. > > Months ago, I installed W7 on Qubes just for the sake of testing. Got to the > point of installing qubes-windows-tools and had some success with it, but >

Re: [qubes-users] Improvement: check disk space before copy to VM

2016-11-11 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-11 14:58, Marek Marczykowski-Górecki wrote: > On Fri, Nov 11, 2016 at 11:57:07PM +0100, Marek Marczykowski-Górecki wrote: >> On Fri, Nov 11, 2016 at 02:34:16PM -0800, Andrew David Wong wrote: >>> On 2016-11-10 08:16, Robert Mittendorf

Re: [qubes-users] Re: Android-x86 on Qubes

2016-11-11 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Nov 11, 2016 at 07:20:55PM -0200, Torsten Grote wrote: > On 11/11/2016 06:01 PM, entr0py wrote: > > Thanks! With that, some progress... Deleting ` > bus='xen'/>` from the config file results in usbtablet being replaced > > with ps/2 mouse

Re: [qubes-users] input proxy: incompatible remote protocol version

2016-11-11 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Nov 11, 2016 at 05:01:47PM +0100, to...@vmail.me wrote: > user@dom0]$ qvm-run -u root --pass-io --localcmd="input-proxy-receiver > --mouse" sys-usb "input-proxy-sender /dev/input/by-id/*event*" > Incompatible remote protocol version:

[qubes-users] Improvement: check disk space before copy to VM

2016-11-11 Thread Robert Mittendorf
I just copied a file from dom0 to a AppVM via qvm-copy-to-vm. The file transfer started until the private storage was full. It would be better to check the free disk space size before executing the copy command. regards, Robert -- You received this message because you are subscribed to the

[qubes-users] input proxy: incompatible remote protocol version

2016-11-11 Thread tom . b
user@dom0]$ qvm-run -u root --pass-io --localcmd="input-proxy-receiver --mouse" sys-usb "input-proxy-sender /dev/input/by-id/*event*" Incompatible remote protocol version: 1600085855 qubes-input-proxy-1.0.7-1.fc23.x86_64 qubes-input-proxy-sender-1.0.7-1.fc23.x86_64 -- You received this message

Re: [qubes-users] Improvement: check disk space before copy to VM

2016-11-11 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-10 08:16, Robert Mittendorf wrote: > I just copied a file from dom0 to a AppVM via qvm-copy-to-vm. > The file transfer started until the private storage was full. > It would be better to check the free disk space size before executing >

Re: [qubes-users] Improvement: check disk space before copy to VM

2016-11-11 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Nov 11, 2016 at 11:57:07PM +0100, Marek Marczykowski-Górecki wrote: > On Fri, Nov 11, 2016 at 02:34:16PM -0800, Andrew David Wong wrote: > > On 2016-11-10 08:16, Robert Mittendorf wrote: > > > I just copied a file from dom0 to a AppVM via

Re: [qubes-users] Display Calibration

2016-11-11 Thread Chris Laprise
On 11/10/2016 06:51 AM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Nov 09, 2016 at 02:08:46PM +0100, Zrubi wrote: Applying the color profile is half of the job, next part is to provide the same profile for AppVMs. Here I'm stuck a bit because I

Re: [qubes-users] Improvement: check disk space before copy to VM

2016-11-11 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Nov 11, 2016 at 02:34:16PM -0800, Andrew David Wong wrote: > On 2016-11-10 08:16, Robert Mittendorf wrote: > > I just copied a file from dom0 to a AppVM via qvm-copy-to-vm. > > The file transfer started until the private storage was full. >

Re: [qubes-users] .odt files and LibreOffice

2016-11-11 Thread Unman
On Fri, Nov 11, 2016 at 12:36:39PM +, Unman wrote: > On Fri, Nov 11, 2016 at 06:09:36AM -0500, 'IntersolarMN' via qubes-users > wrote: > > > Hello, > > > > > > > > > > Thank you for your work on Qubes. Note: I haven't used Linux in more than > > > a decade. I have installed Qubes and

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread entr0py
Sec Tester: > On Saturday, 12 November 2016 04:22:37 UTC+10, Chris Laprise wrote: >>> >> >> A tip for stopping DNS leaks with the GUI: You have to run a script like >> 'qubes-setup-dnat-to-ns' (in Qubes) or 'qubes-vpn-handler.sh' (in the >> VPN doc) after the client connects or else DNS packets

[qubes-users] Thoughts on Qubes OS Security... Could be improved.

2016-11-11 Thread Sec Tester
So Im still new to Qubes, but after going through a bit of a learning curve, building & customizing VM's to suit my security needs, I have a few thoughts on its security. Firstly I really love the direction Qubes has taken the future of operating systems, and its has definitely become my OS of

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread Sec Tester
> You might get more interest if you explained which features of the AirVPN GUI > are worth having. The Github README is blank. > > I think most openvpn users are content to use the official client since it's > simpler and better audited. The current fail-close solution has also been >

Re: [qubes-users] Re: Are Qubes/Xen vulnerable to new DRAMA attack?

2016-11-11 Thread Chris Laprise
On 11/11/2016 10:37 PM, Sec Tester wrote: Perhaps another reason why VM's shouldn't have default root access? "taskset 0x2 sudo ./measure -p 0.7 -s 16." This really needs root to work?! This could be important... these rowhammer vulns have become BAD. Chris -- You received this message