[qubes-users] Installation freezes before displaying installer - UEFI-Troublshooting impossible

2020-01-21 Thread anbe2015
Hello Everybody,   I want to install QubesOS R4.0.2 on a Tuxedo Book XC1510 (Intel i7-9750H, Nvidia GeForce GTX 1660Ti, 32 GB RAM, Samsung 970 EVO Plus M.2 SSD, insydeH2O BIOS 1.07.14RTR1)   I downloaded the *.iso, multiple verified key-fingerprints, signatures and checksums and "dd" the

Re: [qubes-users] Upgrading/creating "special" VMs (sys-net, vault, etc)

2020-01-21 Thread Claudia
January 21, 2020 7:04 PM, "Dan Krol" wrote: > So to clarify: > >> Sys-net and sys-firewall (and sys-vpn if you use it) will need it enabled. > > When you say "need it enabled", you're just referring again to "provides > network", is that correct? > > And secondly: Do I understand correctly

Re: [qubes-users] Installation freezes before displaying installer - UEFI-Troublshooting impossible

2020-01-21 Thread Claudia
January 22, 2020 2:48 AM, anbe2...@joker.ms wrote: > Hello Everybody, > > I want to install QubesOS R4.0.2 on a Tuxedo Book XC1510 (Intel i7-9750H, > Nvidia GeForce GTX > 1660Ti, 32 GB RAM, Samsung 970 EVO Plus M.2 SSD, insydeH2O BIOS 1.07.14RTR1) > > I downloaded the *.iso, multiple verified

Re: [qubes-users] Installation freezes before displaying installer - UEFI-Troublshooting impossible

2020-01-21 Thread Claudia
January 22, 2020 2:48 AM, anbe2...@joker.ms wrote: > Hello Everybody, > > I want to install QubesOS R4.0.2 on a Tuxedo Book XC1510 (Intel i7-9750H, > Nvidia GeForce GTX > 1660Ti, 32 GB RAM, Samsung 970 EVO Plus M.2 SSD, insydeH2O BIOS 1.07.14RTR1) > > I downloaded the *.iso, multiple verified

Re: [qubes-users] Should I chose a TemplateVM or a StandaloneVM for a Windows 10 VM ?

2020-01-21 Thread Claudia
January 16, 2020 5:55 PM, "M" wrote: > I read about a TemplateVM and a StandaloneVM in the “Glossary of Qubes > Terminology”. But I’m still > not sure about which kind of VM to choose for a Windows 10 VM. > > Can someone please tell me more clearly when to chose these kinds of VM’s, > and

Re: [qubes-users] Upgrading/creating "special" VMs (sys-net, vault, etc)

2020-01-21 Thread shroobi
> So to clarify: > > > Sys-net and sys-firewall (and sys-vpn if you use it) will need it enabled. > > When you say "need it enabled", you're just referring again to "provides > network", is that correct? > Yes. > And secondly: Do I understand correctly so long as any qube sits in between >

[qubes-users] "Qubes Domains": Add tools/commands to the tray icon (for DVM)

2020-01-21 Thread Major Lazor
Is it possible to add tools or commands to the tray icon "Qubes Domains" ? One example: When using a DVM I often want to move downloaded files to a persistent VM. In such cases I "run terminal" and start nautilus. It would be nice if nautilus was available directly. Is there a way for such a

[qubes-users] Qubes, Fedora, and package signing

2020-01-21 Thread tetrahedra via qubes-users
A few times people have observed that Fedora's package signing leaves a few things to be desired. While Qubes' security model doesn't depend on Fedora entirely, a compromised template compromises the machine -- and package repos are a good way to compromise a template. Why does Qubes still seem

Re: [qubes-users] Open several files in THE SAME dispVM

2020-01-21 Thread Major Lazor
Thank you for your ideas. From my understanding all your ideas that would mean to open a Terminal and run ./script.sh a.ext b.ext c.ext d.ext typing this is not much simpler than 1. start dispvm with nautilus 2. send files from source-vm nautilus 3. open files in destination-vm nautilus in my

Re: [qubes-users] Upgrading/creating "special" VMs (sys-net, vault, etc)

2020-01-21 Thread shroobi
> Hello, > > I was wondering if there are guides in the docs that I missed which > describe proper creation/upgrades of "special" VMs (sys-net, sys-firewall, > and possibly vault). I preferred Debian for my vault. I created a new VM with > a > black lock icon and no network connectivity. Other

Re: [qubes-users] Choosing a TemplateOS for security

2020-01-21 Thread shroobi
> On 1/20/20 3:09 PM, tortuga verde wrote: > > > Also, since it was not listed in systemctl status, how would I be able > > to easily enumerate all such services, so that if I want to see if any > > service is running because I failed to disable it at install time, I can > > find and disable

[qubes-users] Configuration in /etc/qubes-rpc/qubes.OpenInVM not applied

2020-01-21 Thread Major Lazor
Trying to configure dom0s /etc/qubes-rpc/qubes.OpenInVM I get an unexpected result. The current config is cat /etc/qubes-rpc/qubes.OpenInVM: office @dispvm ask,default_target=internet @anyvm @anyvm ask Using Nautilus command "View in DisposibleVM" in VM office I get a separate dispvm for every

Re: Re: [qubes-users] Open several files in THE SAME dispVM

2020-01-21 Thread Steve Coleman
On 2020-01-21 05:38, Major Lazor wrote: APL external email warning: Verify sender r.wiesb...@web.de before clicking links or attachments Thank you for your ideas. From my understanding all your ideas that would mean to open a Terminal and run ./script.sh a.ext b.ext c.ext d.ext typing this

Re: [qubes-users] Open several files in THE SAME dispVM

2020-01-21 Thread Major Lazor
Interesting to see and thank you for sharing. In the mean time I tried to find out how to get the number of the dispvm that you have started and I still think there is no way to do so by design. However there can be policies which VM to use in OpenInVM using the file /etc/qubes-rpc/qubes.OpenInVM

Re: [qubes-users] Upgrading/creating "special" VMs (sys-net, vault, etc)

2020-01-21 Thread Dan Krol
So to clarify: > Sys-net and sys-firewall (and sys-vpn if you use it) will need it enabled. When you say "need it enabled", you're just referring again to "provides network", is that correct? And secondly: Do I understand correctly so long as any qube sits in between two other qubes in the