[qubes-users] Re: Using USB device with Windows 7 HVM?

2017-08-16 Thread Sven Semmler
On 08/16/2017 02:53 PM, Yethal wrote: > 1. VT-d is not enabled on your machine. In this case go to bios and > enable it. It isn't. I am running Qubes 3.2 on a DELL Latitude E6410 ... which has the issue that he Intel Graphics stop working as soon as VT-d is enabled. At least that was the case

[qubes-users] libre motherboards

2017-08-16 Thread Sven Semmler
On Monday, August 14, 2017 at 8:50:20 PM UTC-4, tai...@gmx.com wrote: > As always I offer free tech support for libre motherboards if you > wish to buy one. For the next several months I am planing to use Qubes 3.2 with a DELL Latitude E6410 basically accepting that it is far from perfect. Also

[qubes-users] Using USB device with Windows 7 HVM?

2017-08-16 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, I am new to Qubes OS and this group. Attached please find a PDF outlining how I organized my setup in general. Getting right to the point, here is what I have done so far: * setup and using all fedora-23 based qubes / qubes-split-gpg ... all

Re: [qubes-users] DELL | LATITUDE E6410 WITH QUBES OS

2017-08-16 Thread Sven Semmler
On 08/16/2017 01:55 PM, QubesOS-ML wrote: > there how i have done it - a bit tricky with the Bios Settings > http://wombat3.kozo.ch/j/gadgets/9720-laptop-dell-latitude-e6410-with-qubes-os I too have installed Qubes 3.2 on a DELL Latitude E6410. For me however it worked with the default BIOS

[qubes-users] Re: Using USB device with Windows 7 HVM?

2017-08-17 Thread Sven Semmler
On 08/17/2017 12:53 PM, Yethal wrote: > Issue might be resolved by adding iommu=no-igfx to GRUB config Thank you very much Yethal! Yes, it resolved my graphics issues. I am now able to run Qubes with VT-d enabled. :-) I am also able to assign the USB controller to the Windows HWM! :-) That

Re: [qubes-users] qvm-usb not functioning

2017-09-20 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/13/2017 08:35 PM, Drew White wrote: > I try to do a qvm-usb attachment to pass a usb device through, but > it doesn't let me, it tells me it fails but provides no description > of error. Hi Drew, are you assigning the USB device to an AppVM

Re: [qubes-users] qvm-usb not functioning

2017-09-20 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/20/2017 09:53 AM, Sven Semmler wrote: > are you assigning the USB device to an AppVM based on a Qubes > Fedora or Debian template? Or is it a HVM (e.g. Windows)? Sorry. Ignore me. I hadn't read the whole thread. -BEGIN PGP SIG

Re: [qubes-users] Re: secure hardware after purchase but before qubes installation

2017-09-08 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/07/2017 10:00 PM, taii...@gmx.com wrote: > > Why do you guys use qubes anyways? (feel free to message me off > list) I can't understand why everyone is so paranoid 1) Qubes is an excellent networking lab / playground to learn about InfoSec.

[qubes-users] diagnose cause for lock up / black screen

2017-09-06 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 In my post "[AMD/ATI] Carrizo (rev c5)" from today I make the assumption that the black screen / lock up is connected to the graphics driver, because that's what I have observed with other Linux distributions on that machine. However, I just

[qubes-users] Installing ssh / capturing dom0 output (was: [AMD/ATI] Carrizo (rev c5))

2017-09-06 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/06/2017 04:59 PM, taii...@gmx.com wrote: > install ssh so you can get access then Ok, that'll keep me busy for a moment. My plan is: * install sshd in a dedicated qube on computer 1 * follow

Re: [qubes-users] Using UNISON between VMs... Is that possible?

2017-09-12 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/12/2017 02:15 AM, segu.sa...@gmail.com wrote: > I have a script that uses UNISON [...] The idea is to sync files > between two virtual machines that have no visibility between them. Can you be more specific? Will those two VMs have network

Re: [qubes-users] unable to start dvm

2017-09-12 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/06/2017 04:53 PM, Sven Semmler wrote: > The computer does have iommu, however dmesg reports error > initializing iommuv2. All other AppVMs start and work. At this point I am giving up assuming that my particular AMD processor lacks a f

Re: [qubes-users] Installing ssh / capturing dom0 output

2017-09-12 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/06/2017 11:44 PM, taii...@gmx.com wrote: > Just use another distro to do it, don't go to all that effort. Yeah, after 5+ hours of trying to get this to work, I'll have to cut my loses. While it might theoretically be possible to diagnose and

Re: [qubes-users] Re: Privacy in Qubes

2017-09-26 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/25/2017 09:10 PM, Drew White wrote: > Debian, Slackware, CentOS, Windows 3.11,95,98,2000,xp,7,8,10 (32 > and 64 bit versions of available). I run OSX, ESXi, PFSense, > Android 4, 5, 6, 7, Qubes 1,2,3, XEN, PASOS, COFFEE, OS/2, why? (just

Re: [qubes-users] libre motherboards

2017-08-24 Thread Sven Semmler
Thank you Taiidan, on 08/18/17 19:34, you wrote: > Lenovo G505S "AMD A10-Series A10-5750M (2.50 GHz) 6 GB Memory 1 TB HDD AMD Radeon HD 8650G" -> I do have an AMD based laptop and while Qubes installed, there are issues (DispVM doesn't work, after a while it won't even boot anymore). >From the

Re: [qubes-users] libre motherboards

2017-09-01 Thread Sven Semmler
On 08/24/17 17:34, taii...@gmx.com wrote: > That is a software error (which I of course would be pleased to help > with) not a hardware error. I will definitely try again. It has been my practice for over a decade to have a second computer fully installed and with the latest backups restored on

[qubes-users] set mimetypes in dispvm

2017-09-01 Thread Sven Semmler
Hi, I have a customized disposable vm template. It is based on fedora-25-minimal and instead of firefox I have icecat installed along with libreoffice and okular. When I now try qvm-open-in-dvm example.pdf I get a dialog with the following error message: Unable to handle mimetype of the

[qubes-users] how to cleanup the application menu?

2017-09-01 Thread Sven Semmler
Hi, this is probably documented somewhere but I seem to not find the right keywords to get to the answer. Issue: I have uninstalled the debian-8, fedora-23, fedora-25, whonix-* templates. All my VMs are based on fedora-25-minimal clones, a windows-7 or kali template. However the application menu

Re: [qubes-users] how to cleanup the application menu?

2017-09-01 Thread Sven Semmler
My apologies, as so often I found the answer right after I asked for help. Sorry! I missed https://www.qubes-os.org/doc/remove-vm-manually/ The missing step was rm ~/.local/share/applications/* /Sven -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] set mimetypes in dispvm

2017-09-02 Thread Sven Semmler
On 09/02/17 08:06, Unman wrote: > There's been discussion of this with okular before, [...] Hi Unman, thank you for the hint. I found the discussion between Francesco and cooloutac on 2/7/16. In summary: > But it worked to use in template mimeopen -d So I installed perl-File-MimeInfo and then

Re: [qubes-users] Send Files to Windows 7 Qube

2017-10-11 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 10/01/2017 07:38 AM, inval...@gmail.com wrote: > I can't send files to my Windows 7 Qube. Can someone tell me the > steps I should go through to set up my VM and Qubes so I can > transfer files to the Win7 Qube? Have you installed the Qubes

[qubes-users] cannot trim whonix-ws template anymore

2017-10-18 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, I regularly trim my templates after updating them. I don't recall this process ever being interrupted, but it appears that something got corrupted once when trimming whonix-ws. What I have already done: * deleted

Re: [qubes-users] Re: XEN)QUBES END POINT SECYRITY

2017-10-23 Thread Sven Semmler
On 10/19/2017 03:52 PM, yuraei...@gmail.com wrote: > If so, you can simply make good use of your AppVM firewall. For > example create a AppVM strictly and only for payments, then limit > all internet connections in the firewall to only talk with your > bank, and whichever additional services your

Re: [qubes-users] Re: cannot trim whonix-ws template anymore

2017-10-23 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 10/20/2017 10:25 AM, Noor Christensen wrote: > $ virsh undefine 34bfb7d4-b96d-4d8d-9042-53e212761316 Thank you Noor! The above command did the trick. /Sven -BEGIN PGP SIGNATURE- Version: GnuPG v2

Re: [qubes-users] Ethernet-to-USB Adapter

2017-12-14 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/12/2017 05:27 AM, taii...@gmx.com wrote: > You can simply assign disable sys-usb then assign the USB > controllers to sys-net via the VM manager. Please note that any non > PCI-e network interface is going to be have terrible performance > and

[qubes-users] [HCL] Qubes OS R3.2 on a ThinkPad P51 (model 20HJS0BX00)

2017-12-18 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 With significant help from members of this mailing list, I was able to install R3.2 on my new ThinkPad P51 (model 20HJS0BX00). The starting point was the HCL linking to swami's post , which describes or links all the steps

[qubes-users] update dom0 offline?

2017-12-07 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 My problem: new computer (ThinkPad P51) comes with Intel networking hardware which requires kernel 4.9 to be detected. When installing Qubes 3.2 one starts of with kernel 4.4. I can see on my other computer that is already running Qubes 3.2 that

Re: [qubes-users] update dom0 offline?

2017-12-11 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/07/2017 06:57 PM, r...@tuta.io wrote: > Im not sure how easy it is for your hardware. I looked into it. My old computer runs SATA and legacy BIOS, the new one M.2 PCIe SSD and UEFI ... I tried imaging the one and using it on the other with

Re: [qubes-users] update dom0 offline?

2017-12-11 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/10/2017 07:06 PM, Unman wrote: > sudo qubes-dom0-update --action=download I *think* that > dnf will do the right thing and resolve dependencies for you. This > should download the packages to the current directory, then you > can transfer

Re: [qubes-users] update dom0 offline?

2017-12-10 Thread Sven Semmler
On Dec 7, 2017, at 6:37 PM, Unman wrote: > > You can always grab the files from yum.qubes-os.org on the old computer. You mean https://yum.qubes-os.org/r3.2/current/dom0/fc23/rpm/ ? All of them? There seem to be different versions. If I copy all of them, is there a

[qubes-users] Ethernet-to-USB Adapter

2017-12-11 Thread Sven Semmler
When installing R3.2 one is presented with the option to create sys-usb as sys-net. Is there a guide somewhere on how to achieve this after the fact? Is there an guide to bringing up an Ethernet-to-USB adapter? Context to my previous posts: I’m struggling too much with R4RC3. Really do need

[qubes-users] Constant pop-up from dom0 for qubes.gpg action

2017-12-11 Thread Sven Semmler
I just get started with R4 and restored my email vm. Everything works great, except that now everytime I am in the To: of Subject: line I get a pop-up from dom0 asking: [dom0] Operation execution Do you want to allow the following operation? Select the target domain and confirm with 'OK'

Re: [qubes-users] Trying to download new Whonix templates and fedora 23 gets updated?

2017-12-23 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/09/2017 08:38 PM, vel...@tutamail.com wrote: > Dependencies resolved. Nothing to do. Did you include the --enablerepo parameter as shown below? sudo qubes-dom0-update --enablerepo=qubes-community-templates qubes-template-whonix-ws

Re: [qubes-users] New HCL Entry: Lenovo ThinkPad T470 (20HDCTO1WW)

2018-01-06 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/15/2017 03:20 AM, kotot...@gmail.com wrote: > It does boot but the X server cannot start. Text installation did > not work. Based on swami's post from 9/15/17 I suspect you need kernel 4.9 in dom0 ...

Re: [qubes-users] Recommended wireless or Ethernet card / chipset

2018-01-06 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/18/2017 11:07 PM, 'EW' via qubes-users wrote: > I tried a lot of things from various posts but to no avail, I'm > going to just assume for now that the HW is not compatible (they > are USB 3 adapters, some posts are at least opening the

Re: [qubes-users] rc04

2018-01-08 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/09/2018 12:07 AM, Roy Bernat wrote: > What about release rc04? it should be release at 8/1 that was > yesterday . Delayed until the devs have a good workaround for SP1/SP2/Spectre. /Sven -BEGIN PGP SIGNATURE-

Re: [qubes-users] A question for the Qubes community: multiboot documentation

2018-01-16 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/12/2018 12:41 AM, Sven Semmler wrote: > I will try this next week ... I'll wait for "R3.3" and R4rc4 to be released. -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlpesRQACgkQ2m

Re: [qubes-users] Change default usb qube

2018-01-11 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/10/2018 04:10 AM, 'Blacklight447' via qubes-users wrote: > I recently installed qubes on my new laptop, but i think i > accidently ticked the box which configure qubes to use sysnet as > usb qube, does someone know i can revert this and usb a

Re: [qubes-users] A question for the Qubes community: multiboot documentation

2018-01-11 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/11/2018 07:15 AM, 'Blacklight447' via qubes-users wrote: > This issue described the lack of documentation how to multiboot > qubes. I have decided that i will be writing it, but as described > in the issue above, I need some user feedback.

Re: [qubes-users] A question for the Qubes community: multiboot documentation

2018-01-11 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/11/2018 06:48 PM, Unman wrote: > It's really easy to do this Sven. I will try this next week ... not sure though if grub is even used. I am booting via EFI. But I got the basic idea and will do some google-ing. And of course make backups of

Re: [qubes-users] Change default usb qube

2018-01-11 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/11/2018 06:25 PM, Unman wrote: > If you are connected through sys-firewall or similar, then it is > sufficient to set the netvm of sys-firewall to none. Oh wow! Thank you! You just gave me back so much future time... /Sven -BEGIN PGP

[qubes-users] QWT has effect in Dom0

2018-08-03 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Let me describe my issue once more, maybe a bit easier: - -> I have a Windows 7 HVM and when I install QWT 4.0.1.3 I get the shared clipboard and the ability to send/receive files from other VMs - -> but something in Dom0 seems stuck...

Re: [qubes-users] Unable to reset PCI device....

2018-09-05 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/02/18 09:14, Patrick Bouldin wrote: > PCI device :02:00.0 is in use by driver xenlight > qvm-pci attach --persistent --option permissive=true --option > no-strict-reset=true sys-net dom0:00_XXX > "error : backend vm "dom0" doesn't

Re: [qubes-users] Unable to reset PCI device....

2018-09-05 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/05/18 18:05, Sven Semmler wrote: > Please run qvm-pci and post the output. Ignore. I see your problem was discussed and solved in another thread. /Sven -BEGIN PGP SIGNAT

Re: [qubes-users] Must create HVM if I want to use a unsupported distro as a VM?

2018-09-10 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/10/2018 07:47 AM, unman wrote: > Yes you can create win7 appVMs from a template. Unless you use QWT > to set home directory to /dev/xvdb you will have effectively a > disposableVM, which may throw you to start with. I am using a Win7 HVM as

[qubes-users] Update: HCL - LENOVO Thinkpad P51 (20hjs0bx00) for R4.0

2018-09-10 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Update to https://www.qubes-os.org/hcl/#lenovo_thinkpad-p51-20hjs0bx00_i7-7820hq_k aby-lake_nvidia Now running R4.0 (for several months actually) - -> still needs EFI boot fix - -> networking hardware now detected out of the box /Sven -BEGIN

Re: [qubes-users] Must create HVM if I want to use a unsupported distro as a VM?

2018-09-10 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 9/10/18 8:07 PM, Stumpy wrote: > Am i understanding this right? Can't answer for unman, but in general this is possible and in my opinion advisable: - -> https://www.qubes-os.org/doc/dispvm-customization/ If you go this route, it comes with

Re: [qubes-users] How to add Davmail (Launch Script) to the qubes menu

2018-10-23 Thread Sven Semmler
On Oct 23, 2018, at 10:52 PM, 799 wrote: > > qvm-run -q -a --service -- my-bizmail > qubes.StartApp+/home/user/davmail/davmail.sh qvm-run -a my-bizmail davmail/davmail.sh & ... will do the trick. I run a setup with DavMail and Thunderbird on a fedora-28-minimal based template. For some

[qubes-users] Re: Re: Qubes User Forum

2018-11-09 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Testing to post from the forum. First impressions: - - Pretty sure I want to post from my mail client, since I like my stuff to be signed. Faking an email address is way to easy. - - Following a discussion might be faster in the mail client too,

Re: [qubes-users] Costum qubes order in QVM

2018-11-09 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/2/18 8:20 AM, pieter lems wrote: > How does one costumize the order in wich the qubes are displayed. If you want a solution without programming: use a naming convention. I use simple prefix: app-... for AppVMs dvm-... for DispVM templates

[qubes-users] Re: [qubes-devel] My farewell to Qubes OS!

2018-11-08 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Joanna, thank you for the vision and the hard work! You actually changed the world in a significant way for lots of people and to the better! /Sven -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlvk+sgACgkQ2m4We49U

[qubes-users] qubes-open fails

2018-11-15 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Since a day or two, I get the following error messages when attempting to open a file in a DVM... "Unable to handle mimetype of the requested file (exit status: 768)!" So I started the VM that is the template for the DVM qvm-run -a dvm-offline

Re: [qubes-users] Re: Open in Qube 3.0 beta released!

2018-09-24 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 9/16/18 9:28 AM, Ivan Mitev wrote: > Just curious - isn't it possible to open a link with > `qvm-open-in-dvm` in your ThunderbirdVM and tweak the > corresponding rpc service (qubes.OpenInVM) to open a whonix-dvm ? Yes it is, following the way

Re: [qubes-users] Re: Open in Qube 3.0 beta released!

2018-09-25 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 9/25/18 7:54 AM, Ivan Mitev wrote: > Is it working with whonix too ? (that was the part of the post > from John S.Recdep I was replying too - I was wondering if there > was a problem specific to whonix dispVMs) Works like a charm. Nothing

[qubes-users] signal-desktop?

2019-01-04 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, I just installed signal-desktop (in the template) and now try to run it in the appVM. The app starts and I can see the window border, but nothing inside the window. Haven't done much diagnosis yet. Just wondering if someone here recently

[qubes-users] Qubes issue #3980 exists in Debian 9 template but not in Whonix 14

2019-01-17 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Patrick & qubes-users, the issue described in... - -> https://github.com/QubesOS/qubes-issues/issues/3980 ... exists with debian-9 templates but not with fedora or whonix-based templates (which to my knowledge are debian based). Any idea why?

Re: [qubes-users] Win7 HVM causes Qubes to hang

2018-12-17 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/15/18 5:37 AM, 'Bjoern Christoph' via qubes-users wrote: > Once I shut down Win7 the Qubes I wanted to launch are started, the > Qube Manager also reacts as it should. > Ideas? Hi Bjoern, I reported this 4 months ago here:

Re: [qubes-users] i3 Tap to Click

2018-12-13 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/13/18 10:35 AM, Todd Lasman wrote: > Just can't get it to work. Any thoughts? I'm on Qubes 4.0, using a > ThinkPad T430. I'm using Qubes R4 with I3 on a ThinkPad P51 and got it to work. Attached is my

Re: [qubes-users] Paste not working from one appvm to another appvm's bash (4.0)

2018-12-04 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/4/18 6:06 PM, s.w.i.m.on.qu...@gmail.com wrote: > I also do not have a middle mouse key, again, somewhere online > said that could be used as well. Yep, that's how I do it > Is there some way I can do this? Sure. 1) pipe the output of the

Re: [qubes-users] Possible to use WindowsVM as a NetVM?

2018-11-23 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/23/18 11:52 AM, Zrubi wrote: > I just wonder why would you do this? I suppose a Windows-only proprietary VPN client ... am I right? /Sven -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlv4RJgACgkQ2m4We49U

Re: [qubes-users] qubes-open fails

2018-11-19 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/15/18 4:03 PM, Sven Semmler wrote: > What could cause this? I haven't actually changed anything other > than running regular updates on the template. As far as I can see > qubes-open is a wrapper script around xdg-open set

Re: [qubes-users] old version of xscreensaver

2019-01-08 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/4/19 9:08 AM, Stuart Perkins wrote: > GUI of choice is a very personal thing. I am more pragmatic and > don't like "dancing" icons and starting all of my application > names with K...or G for that matter...but to each his own. I am >

Re: [qubes-users] signal-desktop?

2019-01-08 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/7/19 9:24 AM, haaber wrote: > The "--disable-gpu" parameter works perfectly for the > debian-install and the signed package form the signal website. Yup. Thank you! /Sven -BEGIN PGP SIGNATURE-

[qubes-users] restoring dom0/Fedora baseline

2019-01-09 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 This is probably more a Fedora question then a Qubes question, but it's in the context of Qubes. I have installed i3, gnome-tweak-tools, qt5cl and redshift in dom0. Meanwhile I removed both gnome-tweak-tools and qt5cl but a lot of the dependencies

Re: [qubes-users] Re: [qubes-devel] [proposing new feature] Edit in VM: an idea that can improve security when managing documents

2018-09-14 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 9/14/18 10:41 PM, airelemen...@tutanota.com wrote: > a) Documents that "link" other documents. [...] Yes, that's a corner case that needs manual steps (e.g. start dispvm, copy all files in, copy them back out before closing vm) > b) Can't save

Re: [qubes-users] syncing config across qubes

2018-09-14 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 9/14/18 4:31 PM, Daniel Allcock wrote: > But I feel like maybe they are all wrong and I am overlooking > something obvious. You could have one "work qube" with your vim/emacs environment and use qvm-open-in-vm in all other qubes to open

Re: [qubes-users] backup with debian-10-minimal based sys-usb fails

2019-04-04 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 3/31/19 9:36 AM, unman wrote: > 1. The minimal template is minimal - it doenst have any GUI file > manager. When you click on the ... button it spawns a file manager > in the backup qube. Since you dont have one installed it cant be > opened.

[qubes-users] debian 10 minimal ... issue with update proxy

2019-03-29 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 My template tpl-deb-10-min was created by installing the debian-9-minimal from itl-testing then cloning and updating it and finally upgrading to it to buster. The template is the basis of an AppVM dvm-min, which in turn is a template for dispvms:

Re: [qubes-users] debian 10 minimal ... issue with update proxy

2019-03-29 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 3/29/19 2:34 PM, Sven Semmler wrote: > What did I mess up? user@tpl-deb-10:~$ sudo service qubes-updates-proxy status ● qubes-updates-proxy.service - Qubes updates proxy (tinyproxy) Loaded: loaded (/lib/systemd/system/qubes-upda

Re: [qubes-users] debian 10 minimal ... issue with update proxy

2019-03-29 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 3/29/19 8:58 PM, unman wrote: > There's another issue in that the service file refers to > /usr/sbin/tinyproxy but the exec is in /usr/bin Fix this by > editing /lib/systemd/system/qubes-updates-proxy.service to refer to > the correct path.

[qubes-users] backup with debian-10-minimal based sys-usb fails

2019-03-31 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Very recently I migrated all my AppVMs to a debian-10 (buster) template, which itself was created by upgrading the debian-9 template. Equally my sys-net, sys-usb and sys-firewall dispvms are based on a debian-10-minimal, which was upgraded from the

Re: [qubes-users] coreboot on modern hardware?

2019-03-28 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 3/25/19 4:49 PM, jrsmi...@gmail.com wrote: > What does this say about the direction Joanna and Golem are > taking? I am severely confused about that. I'd have thought the direction to go is open hardware, more local, more decentralized, more

Re: [qubes-users] i3 support?

2019-03-27 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 3/23/19 3:11 PM, Stumpy wrote: > w/ v3 i was using kde then, as support seemed to wan, i switched > over to xfce which is admittedly lighter but doest seem to be as > feature rich. I too use i3 and couldn't be happier with it, however it is

Re: [qubes-users] Re: screen brightness

2019-02-17 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/13/19 3:32 AM, haaber wrote: >> On Friday, December 21, 2018 at 2:44:36 PM UTC-8, haaber wrote: >>> [..] Especially in evening hours this is really a pain in the >>> eye >> >> [...] >> >> xrandr --output eDP1 --brightness .75 >> >> Use

[qubes-users] Re: [qubes-devel] Qubes 4.x Backup setting should not be set to save (replace) default settings by default

2019-02-13 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 This thread might be better located in qubes-users. On 2/13/19 9:49 AM, Teqleez Motley wrote: > a) Where exactly does qubes save this password/backup settings > (file+folder, please) /etc/qubes/backup/qubes-manager-backup.conf > b) It seems to

Re: [qubes-users] backup with debian-10-minimal based sys-usb fails

2019-04-15 Thread Sven Semmler
On 4/5/19 12:52 AM, Sven Semmler wrote: >> You could install a file manager but then you're getting closer to >> the normal Debian template which is pretty minimal. If you are >> committed to minimal service qubes, CLI backup . > You convinced me. My intermediate solution w

Re: [qubes-users] backup with debian-10-minimal based sys-usb fails

2019-04-17 Thread Sven Semmler
On 4/15/19 6:25 PM, unman wrote: > Why do you say this? Backup works fine with a buster qube. What is the > exact problem that you have? I apologize. The issue was between chair and keyboard. In Fedora external drives are mounted under /run/media/user and in Debian under /media/user ... sorry for

Re: [qubes-users] Kernel 4.14.103-1 dmenu is not working

2019-05-02 Thread Sven Semmler
On 5/2/19 1:16 PM, eduzw...@gmail.com wrote: > Hey guys I migrated from arch to qubes. But I am having some difficulties > with I3 windows manager I am fairly new to qubes. I like how I can still use > my favorite arch distro. and benefit from qubes' secured architecture. Great to see you join

Re: [qubes-users] Kernel 4.14.103-1 dmenu is not working

2019-05-03 Thread Sven Semmler
On 5/2/19 11:13 PM, eduzw...@gmail.com wrote: > But the problem with dmenu persists. Are you using the default i3 config that came with the -settings package or have you merged your preferences into it? Have you simply copied an old i3 config from another system? I am not an expert, but

Re: [qubes-users] Kernel 4.14.103-1 dmenu is not working

2019-05-04 Thread Sven Semmler
On 5/4/19 12:58 PM, eduzw...@gmail.com wrote: > Sorry for the late response. I am using the default config so far. What > version is your i3? I noticed that my version is 4.12 from 2016. The latest > release is i3-4.16 > > "sudo qubes-dom0-update i3 i3-settings-qubes" will install i3-4.12 4.16

Re: [qubes-users] Kernel 4.14.103-1 dmenu is not working

2019-05-04 Thread Sven Semmler
On 5/4/19 1:03 PM, eduzw...@gmail.com wrote: > Also I am running Qubes R3.2. > Kernel 4.14.103-1.pvops.qubes.x86_64 Ah, I am running R4 ... but when I used to run R3.2 I also used i3. Don't know which version though. R3.2 is no longer supported, so unless the hardware requirements forbid R4 I'd

Re: [qubes-users] Re: using static dispVM for sys-net

2019-09-09 Thread Sven Semmler
On 8/17/19 3:55 PM, rec wins wrote: > how to store the wifi credentials in custom-dvm-template ? assuming you created sys-net using the a dvm template named dvm-fed-30-min and know the PCI identifier of your wireless interface (the one you assigned to sys-net) 1) qvm-shutdown --all --wait 2)

Re: [qubes-users] How to change date and time format in Thunderbird

2019-09-09 Thread Sven Semmler
On 8/15/19 11:25 AM, galt...@gmail.com wrote: > I googled and found that thunderbird gets its setting from the OS. You want to google for the command line commands: locale and localectl as well as /etc/locale.conf /Sven -- You received this message because you are subscribed to the Google

[qubes-users] Re: Behaviour of qvm-open-in-(d)vm

2019-09-09 Thread Sven Semmler
On 8/16/19 8:37 AM, Phil Knüfer wrote: > qvm-open-in-vm still works like the older tools, that is, it takes two > parameters (VM name + file name or URL to be opened), but then still > shows the GUI prompt where the user needs to pick the destination VM. This depends on the contents of your

[qubes-users] Re: [QubesOS/qubes-issues] Support for HiDPI (#1951)

2019-08-06 Thread Sven Semmler
On 8/6/19 9:46 AM, Abdullah Alansari wrote: > 2. I will try to figure out how to use `xrandr` to add a 3840x2160 with 200% > zoom. I did some research before but I couldn't find any fast solutions and > will need to understand `xrandr` more to do what I need. xrandr knows nothing about "200%

Re: [qubes-users] Re: Confuse Update QUbes OS

2019-07-25 Thread Sven Semmler
On 7/25/19 10:48 AM, unman wrote: > Debian-10 is stuck in testing at the moment because it needs packages > from the *testing* repositories for updating. This could be confusing if > users install from current and don't want to use the testing > repositories. I'm sorry that confused me. My main

Re: [qubes-users] using two whonix-gw instances

2019-09-26 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 My understanding is that TOR actually runs in the gateway and the the workstation(s) enable typical Qubes style compartmentalization. Meaning that if app-anon-1 is compromised, the sys-whonix and a potential app-anon-2 are not. When I create a

Re: [qubes-users] using two whonix-gw instances

2019-09-30 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 9/25/19 8:31 PM, Claudia wrote: > One way to find out for sure. Open /etc/torrc (or ~/.config/tor/torrc, or > other torrc location), and look for stream isolation flags. Make sure you > understand exactly what each one means. Thank you! /Sven

Re: [qubes-users] using two whonix-gw instances

2019-09-25 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 9/25/19 5:26 PM, 'Jackie' via qubes-users wrote: > Whonix vms have stream isolation so different whonix appvms, or even > different applications within the same vm, will use different tor circuits. Oh wow... that sounds great. I just discovered

Re: [qubes-users] using two whonix-gw instances

2019-10-01 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 10/1/19 2:59 AM, tetrahe...@danwin1210.me wrote: > > A 2nd sys-whonix gateway for this situation would seem to reduce the > vulnerability. Or maybe I am just being paranoid? I agree and decided to go with two gateways for the following reason:

[qubes-users] I just lost several days worth of email ... /var/spool/mail/user not mapped to /rw?

2019-11-06 Thread Sven Semmler
I followed the instructions to setup postfix [1], fetchmail [2] and mutt [3] and everything seemed great. I didn't move / save the emails (~200) yet as I wanted to fully read the mutt manual before doing so. Then I did an update off all my templates this morning and restarted the VM that runs

[qubes-users] Re: I just lost several days worth of email ... /var/spool/mail/user not mapped to /rw?

2019-11-06 Thread Sven Semmler
On Wed, Nov 6, 2019, at 10:32 AM, Sven Semmler wrote: > I assume this is because /var/spool/mail/user is not part of the VM but > the template? ... and I have to bind it to /rw like I did with the > postmail directory: mount --bind /usr/local/etc/postfix /etc/postfix ? > > If t

Re: [qubes-users] Turning a NetVM into an AppVM

2019-11-22 Thread Sven Semmler
On Fri, Nov 22, 2019 at 08:44:00AM +, 'awokd' via qubes-users wrote: > nanop...@tuta.io: > > Hello there, I realized that everytime I made a new Qubes VM, I have been > > checking the "provides network" option turning it into a NetVM. > > I mistakenly believed that the option of "provides

Re: [qubes-users] Re: redshift or brightness control?

2019-12-13 Thread Sven Semmler
On Wed, Dec 11, 2019 at 08:20:27PM -1000, rec wins wrote: > so $sudo dnf install redshift-gtk ? sudo qubes-dom0-update redshift /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this

[qubes-users] need Qubes to forget a "--persistent" attached USB device

2019-12-05 Thread Sven Semmler
So I got myself into a corner: * Usually I attach the entire USB controller to my app-dev (debian 9) qube. But in that case this qube can only have 2048 MB of memory (for some reason that's the limit when the USB controller is attached; any more and things crash ... same with Windows qube and

Re: [qubes-users] need Qubes to forget a "--persistent" attached USB device

2019-12-05 Thread Sven Semmler
On Thu, Dec 05, 2019 at 04:35:57PM -0600, Sven Semmler wrote: > So ... now what? Where does Qubes keep a record of this. What can I do to > 'detach' this and the other USB devices from app-dev? qvm-clone app-dev app-dev2 qvm-remove app-dev qvm-clone app-dev2 app-dev qvm-remove app-dev2 .

Re: [qubes-users] Standalone VM (debian-9) doesn't boot anymore due to file system corruption

2019-11-27 Thread Sven Semmler
On Wed, Nov 27, 2019 at 05:59:07PM +, 'awokd' via qubes-users wrote: > Sven Semmler: > > > Since I have two full days of work in that VM that I haven't pushed to the > > git server yet, my first impulse is to get my source code out of there to a > > safe plac

[qubes-users] Standalone VM (debian-9) doesn't boot anymore due to file system corruption

2019-11-27 Thread Sven Semmler
Hi! This morning I shutdown my Debian 9 Standalone VM "app-dev" to change the amount of RAM allocated to it. When I tried to restart it, I get the following error: app-dev: Cannot connect to qrexec agent for 60 seconds, see /var/log/xen/console/guest-app-dev.log for details So I did and

Re: [qubes-users] Standalone VM (debian-9) doesn't boot anymore due to file system corruption

2019-11-27 Thread Sven Semmler
On Wed, Nov 27, 2019 at 12:40:26PM -0600, Sven Semmler wrote: > Once in the "emergency mode" I realized I got no skills here and wouldn't > know what to do. So I'll go an rebuild. *facepalm* ... I'll just restore my backup from Sunday. That'll be even faster. ;-) /Sven

[qubes-users] using two whonix-gw instances

2019-09-25 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 In addition to my fairly standard dvm based on whonix-ws connected to sys-whonix based on whonix-ws I have now done the following: 1) cloned sys-whonix to sys-whonix-id 2) created app-signal based on whonix-ws 3) installed signal in whonix-ws 4)

  1   2   3   >