Re: [qubes-users] Trying my luck
Qubes wrote: Qubes wrote: I am just trying my luck here with an issue that i have been unable to resolve on my Qubes system for a long time now. I have been looking into this problem quite a bit but i cannot seem to find a solution anywhere. Perhaps someone on this list has experienced the same and has found a solution. When i open a text file that is located on a network share with gedit, gedit is unable to save the file. When I click the save button, or `Ctrl + s`, i can see gedit creates a temporary file named ".goutputstream-AO9U51" on the network share and in gedit i get a message "Could not create a backup file while saving "/home/user/data/test/file-name.txt"". If i launch gedit from cli i see a message on cli when saving the file "Hit unhandled case 27 (Error renaming temporary file: Resource temporarily unavailable) in parse_error." I definitely have permissions on the network share as i can copy files to it, delete, create directories, etc. I can also open a LibreOffice document and save it. The problem appears to be specific to gedit. Also, it happens with both a Fedora and Debian based VM. In addition that i forgot to mention is, i can open edit and save the same txt files with vi and it works. I have read reports [1][2][3][4][6] dating as far back as 12 years with the sshfs protocol (an abandoned project) being implicated as well. On issue 438 [3] that was reported on Gitlab it is reported that "As far as I can tell, the problem is in the way glib saves a file by writing to a temporary file and renaming to the final name." and "I'll take a more serious look later but I'd start with gio/glocalfileoutputstream.c and particularly the function _g_local_file_output_stream_really_close which contains the error string "Error renaming temporary file".". A duplicate issue 565 [5] to issue 438 [3] was opened and there a patch is provided that is said to fix this issue although i have not tried it because i don't know how to. **Question:** Would anybody perhaps know how and where to do the patch, attached for reference, on Fedora/Debian. As far as I can tell the patch needs to be done on the client since the problem originates from the client. [1]: https://askubuntu.com/questions/13843/gedit-sshfs-wont-save-vi-saves-fine [2]: https://unix.stackexchange.com/questions/52951/gedit-wont-save-a-file-on-a-virtualbox-share-text-file-busy [3]: https://gitlab.gnome.org/GNOME/glib/-/issues/438 [4]: https://github.com/rclone/rclone/issues/2130 [5]: https://gitlab.gnome.org/GNOME/glib/-/issues/565 [6]: https://illumos.topicbox.com/groups/omnios-discuss/Tc4c6b72d6386f9fb/resource-temporarily-unavailable-when-saving-to-cifs-share-on-r151038 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/41c6de8b-c200-0178-9cd9-c06809f94bfa%40ak47.co.za. From 179812d0847af191e709539041a57d5779d847ed Mon Sep 17 00:00:00 2001 From: TW Date: Wed, 27 Jun 2012 19:35:33 +0200 Subject: [PATCH] gio: workaround for renaming files on filesystems not supporting it This is a workaround for samba and "Virtual Box shared" filesystem which does not support renaming opened files and react on such attempt with ETXTBSY. It is also a solution proposal for: Bug 678994 - Unable to overwrite files on vbox shared mounted filesystems --- gio/glocalfileoutputstream.c | 90 +++- 1 file changed, 63 insertions(+), 27 deletions(-) diff --git a/gio/glocalfileoutputstream.c b/gio/glocalfileoutputstream.c index a310fcd..60e5f43 100644 --- a/gio/glocalfileoutputstream.c +++ b/gio/glocalfileoutputstream.c @@ -223,6 +223,7 @@ _g_local_file_output_stream_really_close (GLocalFileOutputStream *file, { GLocalFileStat final_stat; int res; + int smb_cifs_rename_workaround = 0; #ifdef HAVE_FSYNC if (file->priv->sync_on_close && @@ -318,17 +319,44 @@ _g_local_file_output_stream_really_close (GLocalFileOutputStream *file, if (g_cancellable_set_error_if_cancelled (cancellable, error)) goto err_out; - /* tmp -> original */ - if (g_rename (file->priv->tmp_filename, file->priv->original_filename) != 0) - { - int errsv = errno; - g_set_error (error, G_IO_ERROR, - g_io_error_from_errno (errsv), - _("Error renaming temporary file: %s"), - g_strerror (errsv)); - goto err_out; - } + res = g_rename (file->priv->tmp_filename, file->priv->original_filename); + + /* tmp -> original */ + if (res != 0 && errno == ETXTBSY) + { + // try to close the fd first and retry renaming + if (fs
Re: [qubes-users] Trying my luck
Qubes wrote: I am just trying my luck here with an issue that i have been unable to resolve on my Qubes system for a long time now. I have been looking into this problem quite a bit but i cannot seem to find a solution anywhere. Perhaps someone on this list has experienced the same and has found a solution. When i open a text file that is located on a network share with gedit, gedit is unable to save the file. When I click the save button, or `Ctrl + s`, i can see gedit creates a temporary file named ".goutputstream-AO9U51" on the network share and in gedit i get a message "Could not create a backup file while saving "/home/user/data/test/file-name.txt"". If i launch gedit from cli i see a message on cli when saving the file "Hit unhandled case 27 (Error renaming temporary file: Resource temporarily unavailable) in parse_error." I definitely have permissions on the network share as i can copy files to it, delete, create directories, etc. I can also open a LibreOffice document and save it. The problem appears to be specific to gedit. Also, it happens with both a Fedora and Debian based VM. In addition that i forgot to mention is, i can open edit and save the same txt files with vi and it works. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/55f71abc-061c-b3a5-c94a-f909aeaa3416%40ak47.co.za.
[qubes-users] Trying my luck
I am just trying my luck here with an issue that i have been unable to resolve on my Qubes system for a long time now. I have been looking into this problem quite a bit but i cannot seem to find a solution anywhere. Perhaps someone on this list has experienced the same and has found a solution. When i open a text file that is located on a network share with gedit, gedit is unable to save the file. When I click the save button, or `Ctrl + s`, i can see gedit creates a temporary file named ".goutputstream-AO9U51" on the network share and in gedit i get a message "Could not create a backup file while saving "/home/user/data/test/file-name.txt"". If i launch gedit from cli i see a message on cli when saving the file "Hit unhandled case 27 (Error renaming temporary file: Resource temporarily unavailable) in parse_error." I definitely have permissions on the network share as i can copy files to it, delete, create directories, etc. I can also open a LibreOffice document and save it. The problem appears to be specific to gedit. Also, it happens with both a Fedora and Debian based VM. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/768240c6-a0f9-387c-3d4d-67847e4dec4e%40ak47.co.za.
Re: [qubes-users] Re: Beginner questions
--- Original Message --- On Friday, May 26th, 2023 at 4:24 AM, 'Stuart Perkins' via qubes-users wrote: > Bottom post is the standard on this list. See my response at the bottom... :) > > On Thu, 25 May 2023 19:02:23 + > "'sonnenfinsternis' via qubes-users" qubes-users@googlegroups.com wrote: > > > Sounds helpful, I'll try it when I get a chance, thanks :) After reading > > this [1], I can now even use my USB mouse directly after booting, without > > having to assign it to dom0 first. So slowly but surely I'm warming up to > > QubesOS. A wonderful system :) Now if I can just find a way to see how much > > processor load and memory is currently being used globally, I'll have all > > the pressing open construction sites taken care of for the time being. Over > > the weekend I will switch to a QubesOS installation as my new device for > > daily use. I am excited and glad that this project exists with this great > > community :) > > > > 1: https://www.qubes-os.org/doc/usb-qubes/#usb-mice > > > > --- Original Message --- > > On Thursday, May 25th, 2023 at 8:39 AM, haaber haa...@web.de wrote: > > > > > Hi > > > > > > > 5) The question about autocomplete in the terminal has been resolved. > > > > This was indeed not due to QubesOS but to the fact that > > > > > > the bash-completion package is not pre-installed by default in Debian. > > > But this can be easily fixed: > > > https://unix.stackexchange.com/questions/312456/debian-apt-not-apt-get-autocompletion-not-working > > > > > > I have a nice working auto-complete for dom0. It allows usual > > > qvm-commands (qvm-start, qvm-stop, etc) in dom0 terminal and > > > distinguishes between running and non-running VM's according to what the > > > command expects. Like: qvm-shutdown [TAB] proposes only running VM's to > > > be shut down. etc. > > > > > > Works like charm since qubes 3.2. You find the code attached. > > > > > > Bernhard > > > > > > -- > > > You received this message because you are subscribed to the Google Groups > > > "qubes-users" group. > > > To unsubscribe from this group and stop receiving emails from it, send an > > > email to qubes-users+unsubscr...@googlegroups.com. > > > To view this discussion on the web visit > > > https://groups.google.com/d/msgid/qubes-users/023ce574-96ab-7f94-21d6-4726c1801ce1%40web.de. > > > Welcome to Qubes OS. Personally, I love it. Even with the occasional awkward > way of doing something which is "point and click" on other OS's. The added > security of separation of programs and data plus template based VM's is > great. I've been a Qubes OS fan since 3.2. Add in a coreboot'd platform and > it is about the most secure PC available on the planet. A friend of mine who > built me such a laptop...2 actually (Lenovo T520 and a T420) was asked by the > country of Spain to build them 40. He has since dropped off the radar for > some reason. My current platform is marginally Qubes compatible...a Lenovo > W540...with no SSD it is very slow to come up, but works well once running. I > don't believe it can be coreboot'd though, so I will be creating another T420 > for daily use. I am limited to pre "blob" architectures if I want coreboot > with no "blobs"...encrypted microcode "black box" portions of the BIOS, but > that is really separate from Qubes OS. I actually wore out the T520 and > previous T420 I had...but mine is "on" 16 hours a day or more...sometimes I > just leave it on when I go to bed...that is not really a surprise. > > I found myself synthesizing the basic concept of template VM's manually with > VirtualBox before I discovered Qubes. > > In a Dom0 terminal, the command "xentop" will list running qubes and the > resources they are consuming. It is a faster refresh than the GUI Qube > Manager. > > Stuart > 42 years in IT. > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/20230525222440.694ef12c%40yahoo.com. Oh, I overlooked that. I will from now on also always answer below 0:-) I did not know "xentop" yet, thanks. I had given up looking in the dom0 terminal, since "top" does not display globally, but only from the vie
Re: [qubes-users] Re: Beginner questions
Bottom post is the standard on this list. See my response at the bottom... :) On Thu, 25 May 2023 19:02:23 + "'sonnenfinsternis' via qubes-users" wrote: >Sounds helpful, I'll try it when I get a chance, thanks :) After reading this >[1], I can now even use my USB mouse directly after booting, without having to >assign it to dom0 first. So slowly but surely I'm warming up to QubesOS. A >wonderful system :) Now if I can just find a way to see how much processor >load and memory is currently being used globally, I'll have all the pressing >open construction sites taken care of for the time being. Over the weekend I >will switch to a QubesOS installation as my new device for daily use. I am >excited and glad that this project exists with this great community :) > >1: https://www.qubes-os.org/doc/usb-qubes/#usb-mice > >--- Original Message --- >On Thursday, May 25th, 2023 at 8:39 AM, haaber wrote: > > >> Hi >> >> > 5) The question about autocomplete in the terminal has been resolved. This >> > was indeed not due to QubesOS but to the fact that >> >> the bash-completion package is not pre-installed by default in Debian. >> But this can be easily fixed: >> https://unix.stackexchange.com/questions/312456/debian-apt-not-apt-get-autocompletion-not-working >> >> I have a nice working auto-complete for dom0. It allows usual >> qvm-commands (qvm-start, qvm-stop, etc) in dom0 terminal and >> distinguishes between running and non-running VM's according to what the >> command expects. Like: qvm-shutdown [TAB] proposes only running VM's to >> be shut down. etc. >> >> Works like charm since qubes 3.2. You find the code attached. >> >> Bernhard >> >> -- >> You received this message because you are subscribed to the Google Groups >> "qubes-users" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to qubes-users+unsubscr...@googlegroups.com. >> To view this discussion on the web visit >> https://groups.google.com/d/msgid/qubes-users/023ce574-96ab-7f94-21d6-4726c1801ce1%40web.de. >> > Welcome to Qubes OS. Personally, I love it. Even with the occasional awkward way of doing something which is "point and click" on other OS's. The added security of separation of programs and data plus template based VM's is great. I've been a Qubes OS fan since 3.2. Add in a coreboot'd platform and it is about the most secure PC available on the planet. A friend of mine who built me such a laptop...2 actually (Lenovo T520 and a T420) was asked by the country of Spain to build them 40. He has since dropped off the radar for some reason. My current platform is marginally Qubes compatible...a Lenovo W540...with no SSD it is very slow to come up, but works well once running. I don't believe it can be coreboot'd though, so I will be creating another T420 for daily use. I am limited to pre "blob" architectures if I want coreboot with no "blobs"...encrypted microcode "black box" portions of the BIOS, but that is really separate from Qubes OS. I actually wore out the T520 and previous T420 I had...but mine is "on" 16 hours a day or more...sometimes I just leave it on when I go to bed...that is not really a surprise. I found myself synthesizing the basic concept of template VM's manually with VirtualBox before I discovered Qubes. In a Dom0 terminal, the command "xentop" will list running qubes and the resources they are consuming. It is a faster refresh than the GUI Qube Manager. Stuart 42 years in IT. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20230525222440.694ef12c%40yahoo.com.
Re: [qubes-users] Re: Beginner questions
Sounds helpful, I'll try it when I get a chance, thanks :) After reading this [1], I can now even use my USB mouse directly after booting, without having to assign it to dom0 first. So slowly but surely I'm warming up to QubesOS. A wonderful system :) Now if I can just find a way to see how much processor load and memory is currently being used globally, I'll have all the pressing open construction sites taken care of for the time being. Over the weekend I will switch to a QubesOS installation as my new device for daily use. I am excited and glad that this project exists with this great community :) 1: https://www.qubes-os.org/doc/usb-qubes/#usb-mice --- Original Message --- On Thursday, May 25th, 2023 at 8:39 AM, haaber wrote: > Hi > > > 5) The question about autocomplete in the terminal has been resolved. This > > was indeed not due to QubesOS but to the fact that > > the bash-completion package is not pre-installed by default in Debian. > But this can be easily fixed: > https://unix.stackexchange.com/questions/312456/debian-apt-not-apt-get-autocompletion-not-working > > I have a nice working auto-complete for dom0. It allows usual > qvm-commands (qvm-start, qvm-stop, etc) in dom0 terminal and > distinguishes between running and non-running VM's according to what the > command expects. Like: qvm-shutdown [TAB] proposes only running VM's to > be shut down. etc. > > Works like charm since qubes 3.2. You find the code attached. > > Bernhard > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/023ce574-96ab-7f94-21d6-4726c1801ce1%40web.de. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ghDIY56OTqypK0u10MIiEMqaI9sDzcAVb7In4BOJ2wboKq5kLQ0P8ityQD6dRGulKYEpDWCIM_75cIoF5GHhPdqeWCrSJd5mcE1rbYcGuzc%3D%40protonmail.ch.
Re: [qubes-users] Re: Beginner questions
Hi 5) The question about autocomplete in the terminal has been resolved. This was indeed not due to QubesOS but to the fact that the bash-completion package is not pre-installed by default in Debian. But this can be easily fixed: https://unix.stackexchange.com/questions/312456/debian-apt-not-apt-get-autocompletion-not-working I have a nice working auto-complete for dom0. It allows usual qvm-commands (qvm-start, qvm-stop, etc) in dom0 terminal and distinguishes between running and non-running VM's according to what the command expects. Like: qvm-shutdown [TAB] proposes only running VM's to be shut down. etc. Works like charm since qubes 3.2. You find the code attached. Bernhard -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/023ce574-96ab-7f94-21d6-4726c1801ce1%40web.de. qvm-autocomplete.sh Description: Bourne shell script
[qubes-users] Re: HCL - cirrus7 nimbini v3 (NUC12WSHv5)
I forgot to attach the yml file. Sorry! --- Original Message --- On Wednesday, May 24th, 2023 at 11:51 PM, sonnenfinsternis wrote: > Here's my review of the cirrus7 nimbini v3, which is largely based on the > Intel NUC 12 (NUC12WSHv5). QubesOS with the "kernel latest" option runs > great. Most importantly, it is a dream to work on a fanless computer that > still runs completely silent under heavy load despite various Qubes running > in parallel including several standalone machines. > > Best regards :-) > Eichennarr > > --- > layout: > 'hcl' > type: > 'mini pc' > hvm: > 'yes' > iommu: > 'yes' > slat: > 'yes' > tpm: > 'unknown' > remap: > 'yes' > brand: | > cirrus7 > model: | > nimbini v3 (NUC12WSHv5) > bios: | > WSADLV57.0087.2023.0306.1817 > cpu: | > 12th Gen Intel(R) Core(TM) i5-1250P > cpu-short: | > i5-1250P > chipset: | > Intel Corporation Device [8086:4621] (rev 02) > chipset-short: | > FIXME > gpu: | > Intel Iris Xe 80U > gpu-short: | > FIXME > network: | > Intel Wi-Fi 6E AX211 > memory: | > 65092 > scsi: | > > usb: | > 4 > versions: > > - works: > yes > qubes: | > R4.1 > xen: | > 4.14.5 > kernel: | > 6.1.12-1 > remark: | > works with kernel latest > credit: | > Eichennarr > link: | > FIXLINK > > --- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/oGEvIb__nU8T7im80hRH0HyuAK5o-E7gxP6Ex0LnkhL0NaK2u16YAxlts8SdTbDGpKSXFkH3l8BFpybf3hCT6g7N29iLgFZX81pK33-qnBc%3D%40protonmail.ch. Qubes-HCL-Intel_R__Client_Systems-NUC12WSHv5-20230524-223156.yml Description: application/yaml
[qubes-users] HCL - cirrus7 nimbini v3 (NUC12WSHv5)
Here's my review of the cirrus7 nimbini v3, which is largely based on the Intel NUC 12 (NUC12WSHv5). QubesOS with the "kernel latest" option runs great. Most importantly, it is a dream to work on a fanless computer that still runs completely silent under heavy load despite various Qubes running in parallel including several standalone machines. Best regards :-) Eichennarr --- layout: 'hcl' type: 'mini pc' hvm: 'yes' iommu: 'yes' slat: 'yes' tpm: 'unknown' remap: 'yes' brand: | cirrus7 model: | nimbini v3 (NUC12WSHv5) bios: | WSADLV57.0087.2023.0306.1817 cpu: | 12th Gen Intel(R) Core(TM) i5-1250P cpu-short: | i5-1250P chipset: | Intel Corporation Device [8086:4621] (rev 02) chipset-short: | FIXME gpu: | Intel Iris Xe 80U gpu-short: | FIXME network: | Intel Wi-Fi 6E AX211 memory: | 65092 scsi: | usb: | 4 versions: - works: yes qubes: | R4.1 xen: | 4.14.5 kernel: | 6.1.12-1 remark: | works with kernel latest credit: | Eichennarr link: | FIXLINK --- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/Q_i_As0bHmEZamFHxeUPHXSib7W3-W1TNAmwfB98J79p1NznD73wi27Q9bFxOhLI_6ougZkvC3YkNJgA5O2A0NaJrV7aaEr48JLN_1Gu8g4%3D%40protonmail.ch.
Re: [qubes-users] HCL - TUXEDO InfinityBook S 15 Gen7
Thanks for quickly adding my data to the list :-) --- Original Message --- On Thursday, May 11th, 2023 at 2:32 AM, Sven Semmler wrote: > Thank you Eichennarr for your HCL report, which is online now! > > /Sven > > -- > https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7 > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/c9d56257-3daf-7656-2e0c-325c94f9ff26%40SvenSemmler.org. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8UJOjuL2wsgemPxZnojoDE-C0eNb9XGXXLPRC3EugUV0uJ78PppNs9QAhUPnNvbnXE__l20Wwj5h8Dkd_JRGLQGIFccfAxdEwn_ST-BCbAo%3D%40protonmail.ch.
Re: [qubes-users] Re: Beginner questions
First of all, thank you Kamil Aronowski for the long answer. There was a lot in it that helped me. :) It might be clearest if I sort my answer by the numbering of my original questions: 1) I am still looking for a way to display the real global processor load and the real total global RAM usage in Qubes. Unfortunately I haven't found anything yet -_-. 2) I'll just stick with the existing ready-made templates for Linux then. If there is a clickable solution at some point, I would still be very interested in it though! 3) Too bad, but could have been. Then we just stick to opening qvm-template-gui via the terminal in dom0. It's not witchcraft, I just thought that maybe I missed the link in the GUI. 4) Interesting, thanks! 5) The question about autocomplete in the terminal has been resolved. This was indeed not due to QubesOS but to the fact that the bash-completion package is not pre-installed by default in Debian. But this can be easily fixed: https://unix.stackexchange.com/questions/312456/debian-apt-not-apt-get-autocompletion-not-working Best regards :) --- Original Message --- On Tuesday, May 9th, 2023 at 7:57 PM, 'Kamil Aronowski' via qubes-users wrote: > Thanks for being part of our community! > > I don't know everything but can provide some hints. > >> 2) I have a Windows Qube as a standalone VM. The integration works fine >> thanks to qubes-windows-tools. But is there something similar for standalone >> Linux VMs? Assuming there is a LinuxMint in a standalone qube: What is the >> best way to exchange files or pass the clipboard to other "normal" Qubes? >> Via a USB stick? Surely there is a software solution :slight_smile: > > I haven't seen an ISO file or such a friendly distribution of the tools Qubes > uses for integration for Linux qubes. The tools do run in AppVMs (run `sudo > ps aux | grep qubes` to see for yourself) and if they were to be ported to > the target distro, I assume we'll be home then. > > There's the [qubes-builder](https://github.com/QubesOS/qubes-builder) > framework the developers wrote that can do this but this assumes building the > tools for the supported distros. I can't provide further assistance because > while the project is great and I was able to compile the officially supported > templates along with everything they require, I failed when trying to add an > unsupported system - some old Fedora and Debian releases. > >> 3) How do I know that there is a new template, e.g. Fedora 38? Do I have to >> check this myself regularly under qvm-template-gui? And while we are at it: >> Do I reach qvm-template-gui also somehow with the mouse over the gui? > > Currently it looks like it needs to be ran from commandline but I can help > writing a `.desktop` shortcut/launcher for this. > >> 4) I got to thinking when I saw that there is his fedora-37-xfce template. >> Is it possible to start the desktop in an app VM based on it? Does this >> actually work in general in a qube that is not a standalone installation? Or >> can I always start only individual programs? > > Yes and no. > > Keep in mind that Qubes has these tools and a custom X11 config provided for > this integration. They would have to be rewritten for a proper support, I > guess. > > Maybe it's a good idea to connect to a qube remotely via VNC or something and > instantiate an xfce4-session there. But in a regular case this will cause > visual mess. I'll attach a screenshot for this. > >> 5) And why does the tab completion in the terminal often not work in the >> Debian templates? Especially when installing software with "sudo apt install >> xyz" I have problems, because I have to know exactly what the packages are >> called. > > Seems like this is Debian-related and outside of the scope of Qubes > community. Maybe its `bash-completion` doesn't work as intended? I'd contact > the Debian team directly for that, since I suppose the same would be > happening even if installing Debian on a bare-matal environment. > >> I hope that I have not outed myself as a complete idiot with these >> questions. But I honestly haven't been able to figure them out for myself so >> far, so I wanted to put them up for debate here. Maybe there are other >> newbies like me with similar questions. > > No, you haven't. We're humans and have limited resources, especially when > coming to a new project. And just because something is intuitive for one > person, doesn't mean it will be intuitive for another one. > We're here to assist each other and have a great time. > > On Tuesday, May 9, 2023 at 11:34:19 AM UTC+2 sonnenfinsternis wrote: > >> Hi there :) >> >> I've only been using QubesOS for
[qubes-users] Qubes Canary 035
s they reproduce validly-signed text from the qubes-secpack). If the actual canary in the qubes-secpack is healthy, but reposts are late, absent, or modified on the website, mailing lists, forum, or social media platforms, you should not be concerned about the canary. - *Last-minute signature(s).* If the canary is signed at the last minute but before the deadline, that's okay. (People get busy and procrastinate sometimes.) - *Signatures at different times.* If one signature is earlier or later than the other, but both are present within a reasonable period of time, that's okay. (For example, sometimes one signer is out of town, but we try to plan the deadlines around this.) - *Permitted changes.* If something about a canary changes without violating any of statements in prior canaries, that's okay. (For example, canaries are usually scheduled for the first fourteen days of a given month, but there's no rule that says they have to be.) - *Unusual but planned changes.* If something unusual happens, but it was announced in advance, and the appropriate statements are signed, that's okay (e.g., when Joanna left the security team and Simon joined it). In general, it would not be realistic for an organization to exist that never changed, had zero turnover, and never made mistakes. Therefore, it would be reasonable to expect such events to occur periodically, and it would be unreasonable to regard *every* unusual or unexpected canary-related event as a sign of compromise. For example, if something usual happens with a canary, and we say it was a mistake and correct it, you will have to decide for yourself whether it's more likely that it really was just a mistake or that something is wrong and that this is how we chose to send you a subtle signal about it. This will require you to think carefully about which among many possible scenarios is most likely given the evidence available to you. Since this is fundamentally a matter of judgment, canaries are ultimately a *social* scheme, not a technical one. ## What are the PGP signatures that accompany canaries? A [PGP](https://en.wikipedia.org/wiki/Pretty_Good_Privacy) signature is a cryptographic [digital signature](https://en.wikipedia.org/wiki/Digital_signature) made in accordance with the [OpenPGP](https://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP) standard. PGP signatures can be cryptographically verified with programs like [GNU Privacy Guard (GPG)](https://en.wikipedia.org/wiki/GNU_Privacy_Guard). The Qubes security team cryptographically signs all canaries so that Qubes users have a reliable way to check whether canaries are genuine. The only way to be certain that a canary is authentic is by verifying its PGP signatures. ## Why should I care whether a canary is authentic? If you fail to notice that a canary is unhealthy or has died, you may continue to trust the Qubes security team even after they have signaled via the canary (or lack thereof) that they been compromised or coerced. Falsified canaries could include manipulated text designed to sow fear, uncertainty, and doubt about the security of Qubes OS or the status of the Qubes OS Project. ## How do I verify the PGP signatures on a canary? The following command-line instructions assume a Linux system with `git` and `gpg` installed. (See [here](https://www.qubes-os.org/security/verifying-signatures/#openpgp-software) for Windows and Mac options.) 1. Obtain the Qubes Master Signing Key (QMSK), e.g.: ```shell_session $ gpg --fetch-keys https://keys.qubes-os.org/keys/qubes-master-signing-key.asc gpg: directory '/home/user/.gnupg' created gpg: keybox '/home/user/.gnupg/pubring.kbx' created gpg: requesting key from 'https://keys.qubes-os.org/keys/qubes-master-signing-key.asc' gpg: /home/user/.gnupg/trustdb.gpg: trustdb created gpg: key DDFA1A3E36879494: public key "Qubes Master Signing Key" imported gpg: Total number processed: 1 gpg: imported: 1 ``` (See [here](https://www.qubes-os.org/security/verifying-signatures/#how-to-import-and-authenticate-the-qubes-master-signing-key) for more ways to obtain the QMSK.) 2. View the fingerprint of the PGP key you just imported. (Note: `gpg>` indicates a prompt inside of the GnuPG program. Type what appears after it when prompted.) ```shell_session $ gpg --edit-key 0x427F11FD0FAA4B080123F01CDDFA1A3E36879494 gpg (GnuPG) 2.2.27; Copyright (C) 2021 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. pub rsa4096/DDFA1A3E36879494 created: 2010-04-01 expires: never usage: SC trust: unknown validity: unknown [ unknown] (1). Qubes Master Signing Key gpg> fpr pub rsa4096/DDFA1A3E36879494 2010-04-01 Qubes Master Signing Key Primary key fingerprint: 427F 11FD 0FAA 4B08 0123 F01C DDFA 1A3E 3687 94
Re: [qubes-users] Time and date of appVM
Qubes wrote: Qubes wrote: Qubes wrote: Qubes wrote: Qubes wrote: I have noticed than when my computer wakes up from sleep the dom0 date and time updates as soon as my computer gets net connectivity, but my appVMs can take a loong time before their date and time also update. Is there any explanation for this and maybe a way to fix it? Ok I can sync it manually in the appVM using `sudo qvm-sync-clock`. So the question is how can I set it to run more frequently in the appVM? Update: When my computer wakes from sleep the appVMs never update their time. The only way is to manually run `sudo-qvm-sync-clock` or reboot the VM. Why do I see this behavior? I am sure date and time should sync everywhere automatically. Without the need, which looks to be the only solution currently, to create a small script that is executed at VM startup and it goes into a loop and runs `sudo-qvm-sync-clock` every 30 seconds. This is a serious problem, VMs don't sync their time on 4.2. Can anybody provide meaningful input? Is there nothing I can do here? Is it just me and my system or are you also seeing this? I have resolved the issue of my VMs not syncing their time. It is actually quite interesting, because although VMs are set to automatically sync their time every 6 hours as is explained [here][1] a certain set of conditions caused the clocks on my VMs to 'never' sync. Other users can quite easily experience the same situation without realizing it. I have filed [bug report 8217](https://github.com/QubesOS/qubes-issues/issues/8217) for this. To fix my issue I defined a custom clock sync definition in `sudo vim /etc/systemd/system/qubes-sync-time.timer` and added ``` [Timer] OnUnitActiveSec=10s ``` [1]: https://github.com/Qubes-Community/Contents/blob/master/docs/system/clock-time.md#tweaking-time-synchronization-defaults -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0c5a1c40-0534-90cc-ca5f-55ba9da2a50c%40ak47.co.za.
[qubes-users] Updating the fedora template (36->38)
Hi! Following the instructions to update the fedore-36 template to fedora-38, I saw these errors: ... Running scriptlet: pulseaudio-16.1-4.fc38.x86_64 2866/2866 Running scriptlet: kernel-modules-core-6.2.15-300.fc38.x86_64 2866/2866 Running scriptlet: kernel-core-6.2.15-300.fc38.x86_64 2866/2866 /etc/default/grub: line 1: /etc/default/grub.qubes: No such file or directory /etc/default/grub: line 1: /etc/default/grub.qubes: No such file or directory warning: %posttrans(kernel-core-6.2.15-300.fc38.x86_64) scriptlet failed, exit status 1 Error in POSTTRANS scriptlet in rpm package kernel-core Running scriptlet: kernel-modules-6.2.15-300.fc38.x86_64 2866/2866 Running scriptlet: thunderbird-102.10.0-1.fc38.x86_64 2866/2866 Running scriptlet: xen-runtime-4.17.1-1.fc38.x86_64 2866/2866 Running scriptlet: libgcc-12.2.1-4.fc36.x86_64 2866/2866 Verifying : abseil-cpp-20220623.1-4.fc38.x86_64 1/2866 Verifying : braille-printer-app-1:2.0~b0^386eea385f-3.fc38 2/2866 ... Unsure how serious that is, and whether it needs manual intervention. Kind regards, Ulrich -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/188493c6-1e9d-80c4-3f5a-b7d31b768136%40gmail.com.
Re: [qubes-users] dom0 backup/restore
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Qubes: > However, when I use the Qubes backup tool it shows the size of the dom0 > backup is going to be 7.1 GB, but other than about 20 MB of screenshots in > `/home/Pictures/` I don't have anything in `/home/`. It's a bug in the GUI backup tool's size calculation for dom0: https://github.com/QubesOS/qubes-issues/issues/5699#issuecomment-593500155 Rusty -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEhLWbz8YrEp/hsG0ERp149HqvKt8FAmRkvh9fFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDg0 QjU5QkNGQzYyQjEyOUZFMUIwNkQwNDQ2OUQ3OEY0N0FBRjJBREYACgkQRp149Hqv Kt/pkw//TWCjS5AQplGo2SbiNHjv1xb9vbN0+ffxZ8QDjKuiiVGB990r3oWr6n2b uIPkDlmMGHOqrcQOm9tnDk2rkZ6avgCAJMo0KR7A9o+HFoPfkIBghwff6s91uV5A d/hfVAF7Tk6iIB+43A2yWz4BK50loJ0CCWyjTkd7HYKou1KSnuqPISDSQ/RZ0Xo2 7dT0RZ2Ed8NsdGlqvGDAEmCR0ClX/nPs1vmOX5adSFOIRSPcmHybzZAE6FTzH1Pl JhzugkHEGq77Beepup8we/idwRYr0AEUMCy/6IFo6rPKcG+mlnhS7rAj/nIyPZfk fB/LJw5NzU4ATWXJa2TbE3R9fq05lsuiq0x0H18fdVNNhbk/dltrnh4iJ89TuxQ0 HV5TKrfhOxzJ0u0v5oJ/pDgyGGpYb5mQCRIZGnJZQcwgQvYFdhhohzC8MSfWPNWb ++zqIiUjdmmVxiNdHAJ6wSG0gL1NgRu4Hs45cQ4YGihspL0g+6x+c15kw0cigk0X tG+IwGFLxR+A58NkOFXrVPH72bVYsUYkuBvjDazJZ/e5ISVgZMHwnLbUHvUpImLx hvm74f3I+H4RBF9cng0wc9asO+mNvqAb9eV7DLUrWZDfbxs+W66bMucLbthY6+H0 6+f1bqwtTFNa5jWSrJdi3gnF7gdtIr9ISajf87zFAhCaVX1qwyY= =77/E -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ZGS9vplNIR1bBpW7%40mutt.
[qubes-users] dom0 backup/restore
The documentation on [how to backup, restore and migrate](https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/) says, "When backing up dom0 using the Qubes backup tool (explained below), only the home directory is backed up. Therefore, if there are files outside of the home directory you wish to save, you should copy them into the home directory prior to creating a backup." However, when I use the Qubes backup tool it shows the size of the dom0 backup is going to be 7.1 GB, but other than about 20 MB of screenshots in `/home/Pictures/` I don't have anything in `/home/`. Why then does the Qubes backup tool report the dom0 backup is going to be 7.1 GB. What is it then backing up? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d75d54d9-cc15-4597-d77e-cd84c0223840%40ak47.co.za.
[qubes-users] XSAs released on 2023-05-16
Dear Qubes Community, The [Xen Project](https://xenproject.org/) has released one or more [Xen security advisories (XSAs)](https://xenbits.xen.org/xsa/). The security of Qubes OS *is not affected*. Therefore, *no user action is required*. ## XSAs that DO affect the security of Qubes OS The following XSAs *do affect* the security of Qubes OS: - (none) ## XSAs that DO NOT affect the security of Qubes OS The following XSAs *do not affect* the security of Qubes OS, and no user action is necessary: - [XSA-431](https://xenbits.xen.org/xsa/advisory-431.html) - Qubes OS 4.1 uses an unaffected version of Xen (4.14). ## About this announcement Qubes OS uses the [Xen hypervisor](https://wiki.xenproject.org/wiki/Xen_Project_Software_Overview) as part of its [architecture](https://www.qubes-os.org/doc/architecture/). When the [Xen Project](https://xenproject.org/) publicly discloses a vulnerability in the Xen hypervisor, they issue a notice called a [Xen security advisory (XSA)](https://xenproject.org/developers/security-policy/). Vulnerabilities in the Xen hypervisor sometimes have security implications for Qubes OS. When they do, we issue a notice called a [Qubes security bulletin (QSB)](https://www.qubes-os.org/security/qsb/). (QSBs are also issued for non-Xen vulnerabilities.) However, QSBs can provide only *positive* confirmation that certain XSAs *do* affect the security of Qubes OS. QSBs cannot provide *negative* confirmation that other XSAs do *not* affect the security of Qubes OS. Therefore, we also maintain an [XSA tracker](https://www.qubes-os.org/security/xsa/), which is a comprehensive list of all XSAs publicly disclosed to date, including whether each one affects the security of Qubes OS. When new XSAs are published, we add them to the XSA tracker and publish a notice like this one in order to inform Qubes users that a new batch of XSAs has been released and whether each one affects the security of Qubes OS. This announcement is also available on the Qubes website: https://www.qubes-os.org/news/2023/05/16/xsas-released-on-2023-05-16/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/034437ff-1944-fa19-76c9-fd4f673b509a%40qubes-os.org.
Re: [qubes-users] HCL- Purism-Librem_14
Thank you Antoine for your HCL report, which is [online](https://www.qubes-os.org/hcl/#purism_librem-14-v1_i7-10710u_integrated-graphics-uhd-620_antoine-luciani_r4-1) now! /Sven -- https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5d9d7bc7-8d6d-889e-d262-59f0d07b2012%40SvenSemmler.org.
[qubes-users] HCL- Purism-Librem_14
Installation instructions : Please note that I'm using HEADS and not a normal BIOS 1. Use ISO Qubes 2. In the Heads menu, go to USB boot 3. When booting to install, select “Install Qubes OS" 4. Finish installation and boot into OS Remarks The only issue I've encountered is the WiFi killswitch : If you deactivate the wifi/bluetooth before booting, sys-net will have an issue and won't boot. It seems that it's because of Dom0 recheking each time the PCI device. If you re-enable the wifi and reboot the laptop the wifi will work again without problems The important things work: -Wifi -Sound (Even though, you have to manually change from Speaker/headphone librem EC's fault, not QubesOS) -HDMI -USB -Fedora 37 -Debian 11 -Whonix -Gentoo Archlinux BlackArchlinux parrot kali Openbsd debian 12 Not tested: -Bluetooth -Microphone/Camera -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8089615f-7ce9-b77e-c1f6-132096ea4fe0%40gmail.com. Qubes-HCL-Purism-librem_14-20230514-182829.yml Description: application/yaml
Re: [qubes-users] KDE on 4.1
'unman' via qubes-users wrote: On Tue, Jul 19, 2022 at 01:26:13PM +0200, Qubes wrote: Qubes wrote: 'unman' via qubes-users wrote: On Tue, Jul 19, 2022 at 08:41:40AM +0200, Qubes wrote: The procedure to install KDE in 4.1 doesn't seem to work, is that expected behavior? Yes, the group isn't present. qubes-dom0-update kde-settings-qubes Is this the way of installing KDE now which means the documentation must be updated or is this just a workaround? Also, would the correct procedure to remove KDE still be as per the documentation, "sudo dnf remove kdelibs plasma-workspace" dnf remove kde-settings-qubes The [documentation](https://www.qubes-os.org/doc/kde/) still shows the procedure for removing KDE as `sudo dnf remove kdelibs plasma-workspace`. Shouldn't this be updated to `sudo dnf remove kde-settings-qubes`? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6af6926f-6672-d77d-c2d8-9d9d85874810%40ak47.co.za.
Re: [qubes-users] Best practice VPN in Qubes
On 5/13/23 7:33 AM, taran1s wrote: > > > Demi Marie Obenour: >> On Sat, May 13, 2023 at 10:57:00AM +, Qubes OS Users Mailing List wrote: >>> Andrew David Wong: >>>> On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote: >>>>> If anon-whonix AppVM is set to use mullvad-VPN that is connected to >>>>> sys-whonix it doesn't connect to internet. If one uses Debian or Fedora >>>>> based AppVM and runs vanilla Firefox, it works like a breeze. >>>>> >>>>> Any ideas how to solve this? >>>>> >>>> >>>> I think that's by design. Whonix does that to protect you from >>>> accidentally compromising your own privacy. >> > > The answer below was meant to you David. I misidentified Patrick as the > author of the answer. > You can call me "Andrew." "David" is my middle name. :) >> >>> Thank you for the answer Patrick. It is possible. The question is how does >>> one use VPN over Tor in this case with Torbrowser that doesn't compromise >>> the privacy (see the use case below please). >>> The use case is to connect to a service like Twitter that is not Tor >>> friendly from a static non-tor IP address (VPN), but at the same time hide >>> my real IP address from the VPN provider by using Tor before I connect to >>> the VPN. >> >>> Some services, like Twitter even if they have onion site keep forcing me to >>> reset password periodically, reminding me that there is a suspicious >>> behavior (just by connecting from Tor, not even posting anything) in an >>> endless loop. >> >>> I would like to use the anon-whonix-twitter AppVM Torbrowser specifically >>> for connection to that particular account only and nothing else, no other >>> apps or even websites ever used in that anon-whonix-twitter AppVM. >> >>> Do you have any advice how to enable Torbrowser in the anon-whonix-twitter >>> to work in the VPN over Tor scenario? >> >> I would use the onion service and deal with the Twitter-side brokenness. > You should read this, then decide whether you still think this setup would be a good idea for you: https://www.whonix.org/wiki/Tunnels/Introduction -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1780d3b7-c915-9a75-0a0a-fa01cf8a9aae%40qubes-os.org.
Re: [qubes-users] Best practice VPN in Qubes
Demi Marie Obenour: On Sat, May 13, 2023 at 10:57:00AM +, Qubes OS Users Mailing List wrote: Andrew David Wong: On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote: If anon-whonix AppVM is set to use mullvad-VPN that is connected to sys-whonix it doesn't connect to internet. If one uses Debian or Fedora based AppVM and runs vanilla Firefox, it works like a breeze. Any ideas how to solve this? I think that's by design. Whonix does that to protect you from accidentally compromising your own privacy. The answer below was meant to you David. I misidentified Patrick as the author of the answer. Thank you for the answer Patrick. It is possible. The question is how does one use VPN over Tor in this case with Torbrowser that doesn't compromise the privacy (see the use case below please). The use case is to connect to a service like Twitter that is not Tor friendly from a static non-tor IP address (VPN), but at the same time hide my real IP address from the VPN provider by using Tor before I connect to the VPN. Some services, like Twitter even if they have onion site keep forcing me to reset password periodically, reminding me that there is a suspicious behavior (just by connecting from Tor, not even posting anything) in an endless loop. I would like to use the anon-whonix-twitter AppVM Torbrowser specifically for connection to that particular account only and nothing else, no other apps or even websites ever used in that anon-whonix-twitter AppVM. Do you have any advice how to enable Torbrowser in the anon-whonix-twitter to work in the VPN over Tor scenario? I would use the onion service and deal with the Twitter-side brokenness. So you would propose to drop the VPN entirely from the equation, use twitter's onion service and just use normal sys-whonix networking in the anon-whonix-twitter AppVM. The issue I face is not much of a laziness to deal with the annoyance but with the requests for additional, looped identity checks like sms (I can deal with that from time to time, but not always), continuous password changes and similar craziness. They want to "protect me", omg. I have set the 2FA but still the same. Funny part is that one even doesn't need to have any activity on the account that could be suspicious, because there is no activity at all. The issue is purely the fact of connection through their own onion service. Which would be funny if it wasn't sad. Are there any significant drawbacks to use Torbrowser in the VPN over Tor scenario? Just in case they lock me out or something., for my protection of course. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e18aa56b-8ffe-b14d-e3df-9efec275d6f3%40mailbox.org.
[qubes-users] sys-gui
When i installed `sys-gui` on my system the `SaltStack` formula downloaded and installed fedora-36-xfce. Do i need to do anything more than download the `fedora-37-xfce` template and switching the template for `sys-gui` to the new template? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/58dbf781-0be6-aae5-75ca-6b9acd26a941%40ak47.co.za.
Re: [qubes-users] Best practice VPN in Qubes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Sat, May 13, 2023 at 10:57:00AM +, Qubes OS Users Mailing List wrote: > Andrew David Wong: > > On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote: > > > If anon-whonix AppVM is set to use mullvad-VPN that is connected to > > > sys-whonix it doesn't connect to internet. If one uses Debian or Fedora > > > based AppVM and runs vanilla Firefox, it works like a breeze. > > > > > > Any ideas how to solve this? > > > > > > > I think that's by design. Whonix does that to protect you from accidentally > > compromising your own privacy. > > > Thank you for the answer Patrick. It is possible. The question is how does > one use VPN over Tor in this case with Torbrowser that doesn't compromise > the privacy (see the use case below please). > > The use case is to connect to a service like Twitter that is not Tor > friendly from a static non-tor IP address (VPN), but at the same time hide > my real IP address from the VPN provider by using Tor before I connect to > the VPN. > > Some services, like Twitter even if they have onion site keep forcing me to > reset password periodically, reminding me that there is a suspicious > behavior (just by connecting from Tor, not even posting anything) in an > endless loop. > > I would like to use the anon-whonix-twitter AppVM Torbrowser specifically > for connection to that particular account only and nothing else, no other > apps or even websites ever used in that anon-whonix-twitter AppVM. > > Do you have any advice how to enable Torbrowser in the anon-whonix-twitter > to work in the VPN over Tor scenario? I would use the onion service and deal with the Twitter-side brokenness. - -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEdodNnxM2uiJZBxxxsoi1X/+cIsEFAmRflBQACgkQsoi1X/+c IsG/ohAAs0r584ZGCNUOAeJ6+ViAjTiN/PllOsErT5SRIrMqBbJH3anB6DKQMGE5 aW+Y4H4xzmQh449LYhz8yVfHlMb0551m6ROTGainEKSneVFafKkMCR5E2Yl+jde+ CRCLGFZVQ9MZlrhMuehPWJ0jZXxI0DGuamm0o65Cgi/qiGGSuZqs3B+ZWLHQA2ZN vIYwSyiw2eG4bY5/dpofXFZeDuNY+qkkXEWzLa1Fm//J/iC+Q2AJLi4ap5w2dyOn THNhSW+ouPowjXSuzASwD8P3P3s0h2/9Yma1PgkV8xwtn6ACS8oTtdoZp8iycd7a yNOTNNEo0wGapSrLrUrZJCYttNTAEqwdyeyrUHv4/C1BQxOJQHzEXh6w/VDtepmD lbZd6roSNBZ+wK8grcmq5nRUEFxTEu+/LkF0fSDTOEvbIwbaPYY572S/GQjJwK9N 7sJbFJgHDWGqEwalXKibPacRQ6WwO9I/E+xq6R+jktgBsEadnLkFNocFhxx6fqoz oXe5RoJxHw/li/7KVBmliu01SHho2Zhosdhx/cDKT6l8TLphPZPOK9TbQ2nUzFwa m6RaDpHpQecRqvJlRUz4FSEp9FjFjBEcW35n2DJKBaV2aWudB4C2ROPbfHbk2HiV d6pgo30pyr3vx+QpAjXdmYP2XBLnnLoIIX726dK6vH3n5+JKCIU= =X7Te -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ZF%2BUEjd6huPK7Fu1%40itl-email.
Re: [qubes-users] Re: QSB-089: Qrexec: Memory corruption in service request handling
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Thu, May 11, 2023 at 11:00:41PM -0700, Vít Šesták wrote: > If the process is not reused, just an update without restarting anything is > enough, isn't it? (This wouldn't be the case if the process was forking > from a zygote.) The process forks for each request, so one will need to kill all currently-running qrexec-daemon processes to be protected from this vulnerability. The simplest way to do this is to reboot all domUs. - -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEdodNnxM2uiJZBxxxsoi1X/+cIsEFAmRffrwACgkQsoi1X/+c IsE+aBAAyAIS9c03+E6KQJAuKBwoa02szKGHbqUHHUtUCX1t961jXCq8Li/MC14e qEUBrZdniIgvcszPLJ4SDH1nIVCovimUu4a1Z+gN/ofvTrxcAH+kSzxth30aIIuE foh4LGFEZLZVng72X002917lDquw0hs0BaMBKzP/JhKAAlpkDIivEbCn7vOvztET hSCRK4mBhfur1gSogkPF69vJnOfoq4FFz2GIsBaWfDF6j0hfmddUbk+mU2f5ooH/ mg7AUFCfltR7GO7swHksFX+S7p+tI/L6VfoxARFjarHZ4f4PYEEXrV/LQXusL60x /oPDOap8AlmPksjC/OITLRCV11jACjeQCIUX2r9pE8KioXmElrNsKKKMAKjf6FSr fy3ylxX3o1cdX1DhHDpbVtv8GM/6nXPfSDg2sbF3AmMTHh1kfOx5GWp32F+BBL3a pI3AuJbXMirrXRVNIDRsdxQ8v+TwEK0jRaI5Z/IbL2kClMODgwBHuZZ8l1xFTFXG xVfWbrbLvhJC9qupoWTKJKIyjmlisF9Q8vQZm2KURgQ0/qO5oesGf8X+XdkynCqO VTjZvxN/UpvAmxvbQB9YxCwO6hAhvdPLNz70uE8C8PDiMWS3VM2iAAoRLSb7CqTz kmkAXkC4M7Y9wKthgY20I4ZFOc2dvvdoV5uXPMG75La0lOQoG0A= =dX/W -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ZF9%2BugKzSKnf6Ah%2B%40itl-email.
Re: [qubes-users] Best practice VPN in Qubes
Andrew David Wong: On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote: If anon-whonix AppVM is set to use mullvad-VPN that is connected to sys-whonix it doesn't connect to internet. If one uses Debian or Fedora based AppVM and runs vanilla Firefox, it works like a breeze. Any ideas how to solve this? I think that's by design. Whonix does that to protect you from accidentally compromising your own privacy. Thank you for the answer Patrick. It is possible. The question is how does one use VPN over Tor in this case with Torbrowser that doesn't compromise the privacy (see the use case below please). The use case is to connect to a service like Twitter that is not Tor friendly from a static non-tor IP address (VPN), but at the same time hide my real IP address from the VPN provider by using Tor before I connect to the VPN. Some services, like Twitter even if they have onion site keep forcing me to reset password periodically, reminding me that there is a suspicious behavior (just by connecting from Tor, not even posting anything) in an endless loop. I would like to use the anon-whonix-twitter AppVM Torbrowser specifically for connection to that particular account only and nothing else, no other apps or even websites ever used in that anon-whonix-twitter AppVM. Do you have any advice how to enable Torbrowser in the anon-whonix-twitter to work in the VPN over Tor scenario? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5dfa9007-6f21-3032-a1e1-395f719d0457%40mailbox.org.
Re: [qubes-users] Global value for the paramater "revisions_to_keep"
Hello Thanks Thomas! That was of big help :D I haven't checked if that works retroactively... anyway though, to rapidly free some memory up and recover the system I just deleted all revisions with "lvremove /dev/qubes/dom0/*-back" (responding myself to the second question on my previous mail). El vie, 12 may 2023 a las 22:34, Thomas Clarke () escribió: > Hi, > > You can list your pools with `qvm-pool`. And list options for a pool with > (where my pool is pool00) `qvm-pool info pool00`. Then you can set > `revisions_to_keep` for a pool like `qvm-pool set -o revisions_to_keep=0 > pool00`. > > I'm not sure if this will work retroactively on already created volumes, > but should be applied to all new ones going forward. > > On 12/05/2023 18:28, roger paranoia wrote: > > Hello > > > > I had a hard time cause I didn't notice the pool memory was running out > of space because of the accumulation of snapshot revisions. > > > > I actually don't need 2 snapshots for most of my qubes and I've been > wondering if it's possible to set a global value so those qubes don't fill > up my disk with "garbage" but I haven't found anything neither at the > corresponding wiki ( https://www.qubes-os.org/doc/volume-backup-revert/ < > https://www.qubes-os.org/doc/volume-backup-revert/>) nor any other > relevant result on google. > > > > It also would be useful to know if there is a fast way to just delete > all revisions all at once without affecting the main qube. > > > > > > Thanks in advance for any help > > > > -- > > You received this message because you are subscribed to the Google > Groups "qubes-users" group. > > To unsubscribe from this group and stop receiving emails from it, send > an email to qubes-users+unsubscr...@googlegroups.com qubes-users+unsubscr...@googlegroups.com>. > > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/CANyf1MJnZK5Qtwj5UOCRN8jaPLEHd-ft2_igxrx5dAq99cw0-A%40mail.gmail.com > < > https://groups.google.com/d/msgid/qubes-users/CANyf1MJnZK5Qtwj5UOCRN8jaPLEHd-ft2_igxrx5dAq99cw0-A%40mail.gmail.com?utm_medium=email_source=footer > >. > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/a47a277a-3779-337a-fdf3-adf3c2172616%40riseup.net > . > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CANyf1M%2BnMPN8nmSQcVq3emJo28%3D9V10XkcL3-fYDNWs1TRY7nQ%40mail.gmail.com.
Re: [qubes-users] Best practice VPN in Qubes
On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote: > If anon-whonix AppVM is set to use mullvad-VPN that is connected to > sys-whonix it doesn't connect to internet. If one uses Debian or Fedora based > AppVM and runs vanilla Firefox, it works like a breeze. > > Any ideas how to solve this? > I think that's by design. Whonix does that to protect you from accidentally compromising your own privacy. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1855e2e4-f9f2-7c37-735b-f6a36e112533%40qubes-os.org.
Re: [qubes-users] Re: QSB-089: Qrexec: Memory corruption in service request handling
On 5/11/23 11:00 PM, Vít Šesták wrote: > If the process is not reused, just an update without restarting anything is > enough, isn't it? (This wouldn't be the case if the process was forking > from a zygote.) Marek has previously told me that only Xen and Kernel updates require a reboot. FWIW, `needs-restarting -r` also didn't detect anything requiring a restart. > After the update, I got a shower of notifications “Failed to execute > qubes.WindowIconUdater (from to dom0)”, probably for each > running domU qube. Same. > But this looks like a temporary issue, as QRPc seems to > continue working, either for newly launched qubes and for qubes launched > before update. I haven't noticed any unusual behavior either. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6b3d8443-454f-045c-dcec-4156d34c96bd%40qubes-os.org.
Re: [qubes-users] Global value for the paramater "revisions_to_keep"
Hi, You can list your pools with `qvm-pool`. And list options for a pool with (where my pool is pool00) `qvm-pool info pool00`. Then you can set `revisions_to_keep` for a pool like `qvm-pool set -o revisions_to_keep=0 pool00`. I'm not sure if this will work retroactively on already created volumes, but should be applied to all new ones going forward. On 12/05/2023 18:28, roger paranoia wrote: Hello I had a hard time cause I didn't notice the pool memory was running out of space because of the accumulation of snapshot revisions. I actually don't need 2 snapshots for most of my qubes and I've been wondering if it's possible to set a global value so those qubes don't fill up my disk with "garbage" but I haven't found anything neither at the corresponding wiki ( https://www.qubes-os.org/doc/volume-backup-revert/ <https://www.qubes-os.org/doc/volume-backup-revert/>) nor any other relevant result on google. It also would be useful to know if there is a fast way to just delete all revisions all at once without affecting the main qube. Thanks in advance for any help -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com <mailto:qubes-users+unsubscr...@googlegroups.com>. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CANyf1MJnZK5Qtwj5UOCRN8jaPLEHd-ft2_igxrx5dAq99cw0-A%40mail.gmail.com <https://groups.google.com/d/msgid/qubes-users/CANyf1MJnZK5Qtwj5UOCRN8jaPLEHd-ft2_igxrx5dAq99cw0-A%40mail.gmail.com?utm_medium=email_source=footer>. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a47a277a-3779-337a-fdf3-adf3c2172616%40riseup.net.
[qubes-users] Global value for the paramater "revisions_to_keep"
Hello I had a hard time cause I didn't notice the pool memory was running out of space because of the accumulation of snapshot revisions. I actually don't need 2 snapshots for most of my qubes and I've been wondering if it's possible to set a global value so those qubes don't fill up my disk with "garbage" but I haven't found anything neither at the corresponding wiki ( https://www.qubes-os.org/doc/volume-backup-revert/) nor any other relevant result on google. It also would be useful to know if there is a fast way to just delete all revisions all at once without affecting the main qube. Thanks in advance for any help -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CANyf1MJnZK5Qtwj5UOCRN8jaPLEHd-ft2_igxrx5dAq99cw0-A%40mail.gmail.com.
Re: [qubes-users] Fedora 36 reaches EOL on 2023-05-16
On Thu, 11 May 2023 15:20:17 -0700 Andrew David Wong wrote: >Dear Qubes Community, > >The Fedora Project has >[announced](https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org/thread/4GXBZJSGQ2PEKIBM2APCTLXBS6IDKSOP/) > that Fedora 36 will reach EOL >([end-of-life](https://fedoraproject.org/wiki/End_of_life)) on 2023-05-16. We >strongly recommend that all users >[upgrade](https://www.qubes-os.org/doc/templates/fedora/#upgrading) their >Fedora templates and standalones to [Fedora >37](https://www.qubes-os.org/news/2023/03/03/fedora-37-templates-available/) >no later than 2023-05-16. > >We provide fresh Fedora 37 template packages through the official Qubes >repositories, which you can install in dom0 by following the standard >[installation >instructions](https://www.qubes-os.org/doc/templates/fedora/#installing). >Alternatively, we also provide step-by-step instructions for [performing an >in-place >upgrade](https://www.qubes-os.org/doc/templates/fedora/in-place-upgrade/) of >an existing Fedora template. After upgrading your templates, please remember >to [switch all qubes that were using the old template to use the new >one](https://www.qubes-os.org/doc/templates/#switching). > >For a complete list of template releases that are supported for your specific >Qubes release, see our [supported template >releases](https://www.qubes-os.org/doc/supported-releases/#templates). > >Please note that no user action is required regarding the OS version in dom0. >For details, please see our [note on dom0 and >EOL](https://www.qubes-os.org/doc/supported-releases/#note-on-dom0-and-eol). > > >This announcement is also available on the Qubes website: >https://www.qubes-os.org/news/2023/05/11/fedora-36-reaches-eol-on-2023-05-16/ > Wonderful warning. Nothing like advance notice. :/ Following the procedure here... https://www.qubes-os.org/doc/templates/fedora/in-place-upgrade/ It kind of works, but there is an issue. Trying to attach the cache space image gets the error that it is not "exposed" so I had to work around it. Perhaps due to the fact that I don't use LVM on my machine...and the install put the bulk of the available storage in /var/lib/qubes, which is NOT exposed. I don't wish to add the additional layer of LVM complication to an already encrypted system. I have a 700gb image I used to contain a 600gb image where I collect files for archive purposes. I mount the 700gb image in dom0 at a mount point in /mnt, and create the cache image in that space to attach to which ever Qube I desire. After doing the losetup, I use the device menu to attach it to the Qube. This works. Since I have modified the fedora-36 template to add claws-mail, gimp and dosbox-x (I use an old editor that requires it to be usable), it is best to upgrade in place after clone. I have two fedora-36 templates...one with no modifications and one with the aforementioned software additions. The unmodified one is used by sys-net, sys-firewall and such. Qubes 4.1 with Xfce desktop, Lenovo w540. Stuart -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20230512103948.4c7b7cd8%40yahoo.com.
Re: [qubes-users] Best practice VPN in Qubes
I managed to make run the tasket guide even for VPN over Tor. The only issue I didn't solve is that it is not working with Torbrowser in anon-whonix AppVM. If anon-whonix AppVM is set to use mullvad-VPN that is connected to sys-whonix it doesn't connect to internet. If one uses Debian or Fedora based AppVM and runs vanilla Firefox, it works like a breeze. Any ideas how to solve this? Leo28C: I followed this guide: https://micahflee.com/2019/11/using-mullvad-in-qubes/ (works with others too not just Mullvad) On Wed, May 10, 2023 at 9:51 AM 'taran1s' via qubes-users < qubes-users@googlegroups.com> wrote: Hi, What is the best practice for setting up a VPN proxy in Qubes these days (for Mullvad, VPN over Tor)? I found two versions for setup of VPN proxy in Qubes: The first one is from tasket called Qubes-vpn-support. The last version is dated Dec 2020: https://github.com/tasket/Qubes-vpn-support/tree/v1.4.4 Second one is directly from Mullvad dated March 6th 2023 and so it seems more fresh. https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn/ I plan to use VPN over Tor with Mullvad. Which guide would you recommend to use for this case and why? Thank you a ton! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/35163750-58a0-66fd-d46c-8f755051f59c%40mailbox.org . -- Kind regards taran1s gpg: 12DDA1FE5FB39C110F3D1FD5A664B90BD3BE59B3 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/47054e41-8891-cab3-0159-64a4a17e5191%40mailbox.org.
[qubes-users] Re: QSB-089: Qrexec: Memory corruption in service request handling
If the process is not reused, just an update without restarting anything is enough, isn't it? (This wouldn't be the case if the process was forking from a zygote.) After the update, I got a shower of notifications “Failed to execute qubes.WindowIconUdater (from to dom0)”, probably for each running domU qube. But this looks like a temporary issue, as QRPc seems to continue working, either for newly launched qubes and for qubes launched before update. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/58ee4c42-1d8a-437e-b28e-7efb8758185bn%40googlegroups.com.
Re: [qubes-users] Fedora 36 reaches EOL on 2023-05-16
Five day warning... Very nice of them... On Thu, May 11, 2023 at 5:20 PM Andrew David Wong wrote: > Dear Qubes Community, > > The Fedora Project has [announced]( > https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org/thread/4GXBZJSGQ2PEKIBM2APCTLXBS6IDKSOP/) > that Fedora 36 will reach EOL ([end-of-life]( > https://fedoraproject.org/wiki/End_of_life)) on 2023-05-16. We strongly > recommend that all users [upgrade]( > https://www.qubes-os.org/doc/templates/fedora/#upgrading) their Fedora > templates and standalones to [Fedora 37]( > https://www.qubes-os.org/news/2023/03/03/fedora-37-templates-available/) > no later than 2023-05-16. > > We provide fresh Fedora 37 template packages through the official Qubes > repositories, which you can install in dom0 by following the standard > [installation instructions]( > https://www.qubes-os.org/doc/templates/fedora/#installing). > Alternatively, we also provide step-by-step instructions for [performing an > in-place upgrade]( > https://www.qubes-os.org/doc/templates/fedora/in-place-upgrade/) of an > existing Fedora template. After upgrading your templates, please remember > to [switch all qubes that were using the old template to use the new one]( > https://www.qubes-os.org/doc/templates/#switching). > > For a complete list of template releases that are supported for your > specific Qubes release, see our [supported template releases]( > https://www.qubes-os.org/doc/supported-releases/#templates). > > Please note that no user action is required regarding the OS version in > dom0. For details, please see our [note on dom0 and EOL]( > https://www.qubes-os.org/doc/supported-releases/#note-on-dom0-and-eol). > > > This announcement is also available on the Qubes website: > > https://www.qubes-os.org/news/2023/05/11/fedora-36-reaches-eol-on-2023-05-16/ > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/1201eea6-25ed-8305-a050-d9638c57c29d%40qubes-os.org > . > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAALhvVYK4BSpg2ixZqoHg2ZbervkxtjaPT4exhcPcJ2AVfxTXQ%40mail.gmail.com.
[qubes-users] Fedora 36 reaches EOL on 2023-05-16
Dear Qubes Community, The Fedora Project has [announced](https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org/thread/4GXBZJSGQ2PEKIBM2APCTLXBS6IDKSOP/) that Fedora 36 will reach EOL ([end-of-life](https://fedoraproject.org/wiki/End_of_life)) on 2023-05-16. We strongly recommend that all users [upgrade](https://www.qubes-os.org/doc/templates/fedora/#upgrading) their Fedora templates and standalones to [Fedora 37](https://www.qubes-os.org/news/2023/03/03/fedora-37-templates-available/) no later than 2023-05-16. We provide fresh Fedora 37 template packages through the official Qubes repositories, which you can install in dom0 by following the standard [installation instructions](https://www.qubes-os.org/doc/templates/fedora/#installing). Alternatively, we also provide step-by-step instructions for [performing an in-place upgrade](https://www.qubes-os.org/doc/templates/fedora/in-place-upgrade/) of an existing Fedora template. After upgrading your templates, please remember to [switch all qubes that were using the old template to use the new one](https://www.qubes-os.org/doc/templates/#switching). For a complete list of template releases that are supported for your specific Qubes release, see our [supported template releases](https://www.qubes-os.org/doc/supported-releases/#templates). Please note that no user action is required regarding the OS version in dom0. For details, please see our [note on dom0 and EOL](https://www.qubes-os.org/doc/supported-releases/#note-on-dom0-and-eol). This announcement is also available on the Qubes website: https://www.qubes-os.org/news/2023/05/11/fedora-36-reaches-eol-on-2023-05-16/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1201eea6-25ed-8305-a050-d9638c57c29d%40qubes-os.org.
[qubes-users] QSB-089: Qrexec: Memory corruption in service request handling
process (which also handles only a single request). 3. Due to how GNU libc's malloc works, if there is a small chunk available, it will be used. It won't be split out of a bigger chunk. And, due to point 2 above, if there was a small chunk initially, it will get used again. 4. The allocations done during startup and reconnection leave a few small free chunks that are interleaved with allocated areas (the libvchan_t structure, something from libxengnttab, libxentoollog, and a few others). These memory chunks can't be merged due to their layout. 5. Every small allocation includes a NUL byte somewhere in the payload before being freed. This applies to both initial areas as well as to the buffers used for `service_name`. Given all of these considerations, successfully exploiting this vulnerability in an attack is very unlikely. However, due to the complexity of the memory allocator, we cannot completely rule out such a possibility. Credits This issue was discovered by Demi Marie Obenour. References --- [1] https://www.qubes-os.org/doc/testing/ [2] https://www.qubes-os.org/doc/how-to-update/ [3] https://www.qubes-os.org/doc/qrexec/ [4] https://www.qubes-os.org/doc/qrexec-internals/ [5] https://sourceware.org/glibc/wiki/MallocInternals -- The Qubes Security Team https://www.qubes-os.org/security/ ``` *Source*: <https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-089-2023.txt> ## [Marek Marczykowski-Górecki](https://www.qubes-os.org/team/#marek-marczykowski-górecki)'s PGP signature ``` -BEGIN PGP SIGNATURE- iQIzBAABCAAdFiEELRdx/k12ftx2sIn61lWk8hgw4GoFAmRcEs8ACgkQ1lWk8hgw 4GoOyg/+MotkJUbomFgs+lxw/oMhJ9kDAoDd678OeJyKn+7SQ2RUq+LlAvoHwqoS FUNwb/g7ZzS4oBphpvxiXK1AoV8ZX00AjKaMgPgLAkWBQyx0zY0RCyQGELwf/j4r iL+yClcRTcQ4VuJa4hicJjnxVD5xSwqUlqKz7fNDNPiFGTTqaymnHO7ZNR0OI4sM Alx/BvJE8a8yBC1mW+hiO8TcfE33uQMhtE1N3rr5VxAKeIyfk0dW8iPGoLYECVBS aV6YfOBoeKwlrZPgbuUhRIbPuWnhL7tJTttda1BF9H4RuS58UVcg2MHvkgrRKMqD qLHWFB3S/CVPboGwiTlnBoss05HRMfkLDxTBeEO1UVEF6FfGgXoS1gFMrRZyvTEp +T+90mCXD2QhpcvIqFvZBP/BW3pp4iVijs/EdrqZIBuV1zN1FRrTe02dy3XtIx0I qGh+iamaQG43v+exPwQG0eYcBjjSxG9CRtDcCXixt0uh5qlT31upI9XD0e2E/1AM SG6EFdMeKs5bYMNGnq2pDCOWBscE8DRK6gfj8ZEnPxPzuZY7vP3vrRo5QbM8l4Jx NDu+kJolEaQXYP00ofKw3wcb6Rh2v/iW6PstpntxgWRVC2wOyzmhs4puXPzGfIaj 3nqkUovrQszbKJXKhZlNOnXT/oWVUmjj0Oy6o0Xrk20/0Y5E8Lk= =1b+G -END PGP SIGNATURE- ``` *Source*: <https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-089-2023.txt.sig.marmarek> ## [Simon Gaiser (aka HW42)](https://www.qubes-os.org/team/#simon-gaiser-aka-hw42)'s PGP signature ``` -BEGIN PGP SIGNATURE- iQIzBAABCgAdFiEE6hjn8EDEHdrv6aoPSsGN4REuFJAFAmRcKqkACgkQSsGN4REu FJChQxAAgSDk/FsVdd6pDi5p82s7/lsdnPdLs7pinoM7MY5tlC/Mi2+7Jd3CvZbf ok/d3LmAt0/qs2rwKIrDwnTCxcrscTTT0q0QovRZQNUPGtAtgyGagHH22H/wLMxq aheHXT5bV8K1GL+GIXfyIb0a2jFf62h1YcJklmgiHDiRIjv9rR/lNyCYm1PzSOC2 M/NruX3xoq15fQCZVar/0yxy35hynX38ZXYxfLvAV3VBZMBVpBz5QkXZ5namMhYr XqRy1N5oTbQaTbNYbwYsG7uR4d0SOKevMlXvmAFVIYS0YlrLy0rGyOJAsoNiwHg2 z9h5eAAZKr68vTfOIa3JLRqRmpAmnQnG5POafhB8bJXCl/TFaPm2meFs19jiD8kE zp6o2jb+Af5WcprSrDGW5JPmwuMQiV/+D/4JA8o5OKqmiE4iQosio/P7OP4eWlpP H0BWxdpczYSBfBdHHMZzrHjcq1xssXsTg52W1JTJQ8QiDbSioTm0bi/ZF3C7ovsA DN5rbLDdOJUwKbOroFuaj1snWS/UZ9AAM2rMMDJr3F///ErVC/DAyMFieIeTpkHN EfVHstuherfMwWUFA6+3JrTsONx1t16svTw2coEYLxwhkIvuj61iiRFKpgMnDZf1 ssE+QXzSx+Zt4ee7b5m2ci2pFfaQZWabyk+5Z5GtmiWrMJS6FIM= =zjXb -END PGP SIGNATURE- ``` *Source*: <https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-089-2023.txt.sig.simon> ## What is the purpose of this announcement? The purpose of this announcement is to inform the Qubes community that a new Qubes Security Bulletin (QSB) has been published. ## What is a Qubes Security Bulletin (QSB)? A Qubes security bulletin (QSB) is a security announcement issued by the [Qubes security team](https://www.qubes-os.org/security/#qubes-security-team). A QSB typically provides a summary and impact analysis of one or more recently-discovered software vulnerabilities, including details about patching to address them. A list of all QSBs is available [here](https://www.qubes-os.org/security/qsb/). ## Why should I care about QSBs? QSBs tell you what actions you must take in order to protect yourself from recently-discovered security vulnerabilities. In most cases, security vulnerabilities are addressed by [updating normally](https://www.qubes-os.org/doc/how-to-update/). However, in some cases, special user action is required. In all cases, the required actions are detailed in QSBs. ## What are the PGP signatures that accompany QSBs? A [PGP](https://en.wikipedia.org/wiki/Pretty_Good_Privacy) signature is a cryptographic [digital signature](https://en.wikipedia.org/wiki/Digital_signature) made in accordance with the [OpenPGP](https://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP) standard. PGP signatures can be cryptographically verified with programs like [GNU Privacy
Re: [qubes-users] HCL - TUXEDO InfinityBook S 15 Gen7
Thank you Eichennarr for your HCL report, which is [online](https://www.qubes-os.org/hcl/#tuxedo_infinitybook-s-15-gen7_i7-1260p_integrated-graphics-iris-xe_eichennarr_r4-1) now! /Sven -- https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c9d56257-3daf-7656-2e0c-325c94f9ff26%40SvenSemmler.org.
[qubes-users] Best practice VPN in Qubes
Hi, What is the best practice for setting up a VPN proxy in Qubes these days (for Mullvad, VPN over Tor)? I found two versions for setup of VPN proxy in Qubes: The first one is from tasket called Qubes-vpn-support. The last version is dated Dec 2020: https://github.com/tasket/Qubes-vpn-support/tree/v1.4.4 Second one is directly from Mullvad dated March 6th 2023 and so it seems more fresh. https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn/ I plan to use VPN over Tor with Mullvad. Which guide would you recommend to use for this case and why? Thank you a ton! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/35163750-58a0-66fd-d46c-8f755051f59c%40mailbox.org.
[qubes-users] Beginner questions
Hi there :) I've only been using QubesOS for two weeks and so far I'm totally thrilled! Thanks to all who contribute to this wonderful project :-) But there are a few questions that I have not been able to clarify online or with friends, so I would like to try here: 1) Is there somewhere in the GUI an overview of the real processor load of the device? I think the percentage display in the upper right corner of the Qube overview shows this relative to the allocated cores. The task manager in dom9, however, only shows the load of dom0. Or have I misunderstood this? 2) I have a Windows Qube as a standalone VM. The integration works fine thanks to qubes-windows-tools. But is there something similar for standalone Linux VMs? Assuming there is a LinuxMint in a standalone qube: What is the best way to exchange files or pass the clipboard to other "normal" Qubes? Via a USB stick? Surely there is a software solution :) 3) How do I know that there is a new template, e.g. Fedora 38? Do I have to check this myself regularly under qvm-template-gui? And while we are at it: Do I reach qvm-template-gui also somehow with the mouse over the gui? 4) I got to thinking when I saw that there is his fedora-37-xfce template. Is it possible to start the desktop in an app VM based on it? Does this actually work in general in a qube that is not a standalone installation? Or can I always start only individual programs? 5) And why does the tab completion in the terminal often not work in the Debian templates? Especially when installing software with "sudo apt install xyz" I have problems, because I have to know exactly what the packages are called. I hope that I have not outed myself as a complete idiot with these questions. But I honestly haven't been able to figure them out for myself so far, so I wanted to put them up for debate here. Maybe there are other newbies like me with similar questions. Regards and thanks for reading :) Eichennarr -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1fRNrzab0LEa2j5bsfaZicNCklhV2LUH8YfOZj5tL_pTkklftQD7hHj7FVQ2WItPz6Ri6RADX3NOzhYNkQhe7XZzMvbpkVlZrCqlvLr8SNs%3D%40protonmail.ch.
[qubes-users] HCL - TUXEDO InfinityBook S 15 Gen7
Here is my report on the TUXEDO InfinityBook S 15 Gen7. Great laptop, but honestly it is quite annoying in the long run that the fan blows so loud when you work in many Qubes in parallel :-( Greetings! Eichennarr --- layout: 'hcl' type: 'notebook' hvm: 'yes' iommu: 'yes' slat: 'yes' tpm: 'unknown' remap: 'yes' brand: | TUXEDO model: | TUXEDO InfinityBook S 15 Gen7 bios: | 1.07.09RTR2 cpu: | 12th Gen Intel(R) Core(TM) i7-1260P cpu-short: | Intel Core i7-1260P chipset: | Intel Corporation Device [8086:4621] (rev 02) chipset-short: | FIXME gpu: | Intel Corporation Device [8086:46a6] (rev 0c) (prog-if 00 [VGA controller]) gpu-short: | Intel Iris Xe Graphics G7 96EUs network: | Intel Corporation Wi-Fi 6 AX200 (rev 1a) Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 15) memory: | 65240 scsi: | usb: | 3 versions: - works: 'yes' qubes: | R4.1 xen: | 4.14.5 kernel: | 6.1.12-1 remark: | All very slow with the default settings. But after a new installation with the option kernel latest everything works smoothly! credit: | Eichennarr link: | FIXLINK --- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/EYG7ourMqffnb9w-08hMuyUwdWJkhyuVEEI2OlVTdrb1jo0YtulNmiVTWpKJ9qTorg73szrOMeaJmHW81HDiqG1bFtqAkjvtiLkf7FkkjGY%3D%40protonmail.ch. Qubes-HCL-TUXEDO-TUXEDO_InfinityBook_S_15_17_Gen7-20230509-094307.yml Description: application/yaml
Re: [qubes-users] Colourful prompt
> I do see this in .bashrc on Debian and there is nothing of it in .bashrc > on Fedora. There is in fact a lot of stuff in .bashrc on Debian that is > not there on Fedora. I use a custom color prompt for my bash shell. I had to use different methods in my Fedora and Debian qubes to get the prompt I wanted. It's a little tricky because you have to check and see how the system files setup the $PS1 file. Because I wanted the same definition in each of my qubes I ended up creating a /etc/profile.d/custom.sh file to define the prompt in Fedora templates to set the prompt in each appVM based on that template. The code based on some adapted Debian or Ubuntu code. There is also a bunch of code to setup definitions for colors and other terminal escape sequences. My custom.sh produces prompt like: [user@docker-fed-37:2 Fri 2023-05-05 17:35 GMT /etc/profile.d]$ where user@docker-fed-37 is green /etc/profile.d is bright_blue the :2 represents the terminal number where numbering starts with :0 ===custom.sh=== # User specific aliases and functions term-control-colors () { # https://mywiki.wooledge.org/BashFAQ/037 # Variables for terminal requests. [[ -t 2 ]] && { alt=$( tput smcup || tput ti ) # Start alt display ealt=$( tput rmcup || tput te ) # End alt display hide=$( tput civis || tput vi ) # Hide cursor show=$( tput cnorm || tput ve ) # Show cursor save=$( tput sc ) # Save cursor load=$( tput rc ) # Load cursor bold=$( tput bold || tput md ) # Start bold stout=$(tput smso || tput so ) # Start stand-out estout=$( tput rmso || tput se ) # End stand-out under=$(tput smul || tput us ) # Start underline eunder=$( tput rmul || tput ue ) # End underline reset=$(tput sgr0 || tput me ) # Reset cursor blink=$(tput blink || tput mb ) # Start blinking italic=$( tput sitm || tput ZH ) # Start italic eitalic=$( tput ritm || tput ZR ) # End italic [[ $TERM != *-m ]] && { red=$( tput setaf 1|| tput AF 1) green=$(tput setaf 2|| tput AF 2) yellow=$( tput setaf 3|| tput AF 3) blue=$( tput setaf 4|| tput AF 4) bright_blue=$( tput setaf 12|| tput AF 12) magenta=$( tput setaf 5|| tput AF 5) cyan=$( tput setaf 6|| tput AF 6) # for broken termcap databases with 16 ANSI colors # blue=$'\e[0;34m' # green=$'\e[0;32m' # white=$'\e[0;37m' } white=$(tput setaf 7|| tput AF 7) default=$( tput op ) eed=$( tput ed || tput cd ) # Erase to end of display eel=$( tput el || tput ce ) # Erase to end of line ebl=$( tput el1|| tput cb ) # Erase to beginning of line ewl=$eel$ebl# Erase whole line draw=$( tput -S <<< ' enacs smacs acsc rmacs' || { \ tput eA; tput as; tput ac; tput ae; } ) # Drawing characters back=$'\b' } 2>/dev/null ||: } # set local definitions term-control-colors # my_blue=$'\e[0;34m' # my_green=$'\e[0;32m' # my_white=$'\e[0;37m' # my_reset=$'\e[00m' # uncomment for a colored prompt, if the terminal has the capability; turned # off by default to not distract the user: the focus in a terminal window # should be on the output of commands, not on the prompt force_color_prompt=yes if [ -n "$force_color_prompt" ]; then if [ -x /usr/bin/tput ] && tput setaf 1 >&/dev/null; then # We have color support; assume it's compliant with Ecma-48 # (ISO/IEC-6429). (Lack of such support is extremely rare, and such # a case would tend to support setf rather than setaf.) color_prompt=yes else color_prompt= fi fi if [ "$color_prompt" = yes ]; then PS1='[\[$green\]\u@\h\[$reset\]:\l \D{%a %F %R %Z} \[$bright_blue\]\w\[$reset\]]\$ ' # PS1='[\[\033[01;32m\]\u@\h\[\033[00m\]:\l \D{%a %F %R %Z} \[\033[01;34m\]\w\[\033[00m\]]\$ ' else PS1='[\u@\h:\l \D{%a %F %R %Z} \w]\$ ' fi unset color_prompt force_color_prompt ===custom.sh=== Another alternative I explored is the setup the above or similar file in the appVM .bashrc.d file. Unfortunately, the Debian default overrides any $PS1 string defined /etc/profile.d/custom.sh so I define and export a $CUSTOM_PS1 environment variable and then use it appropriately in my Debian .bashrc to set the $PS1 string. Also note that the term-control-colors function doesn't work in Debian login shell and the "my_" variable definitions can be used instead. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscri
Re: [qubes-users] Time and date of appVM
Qubes wrote: Qubes wrote: Qubes wrote: Qubes wrote: I have noticed than when my computer wakes up from sleep the dom0 date and time updates as soon as my computer gets net connectivity, but my appVMs can take a loong time before their date and time also update. Is there any explanation for this and maybe a way to fix it? Ok I can sync it manually in the appVM using `sudo qvm-sync-clock`. So the question is how can I set it to run more frequently in the appVM? Update: When my computer wakes from sleep the appVMs never update their time. The only way is to manually run `sudo-qvm-sync-clock` or reboot the VM. Why do I see this behavior? I am sure date and time should sync everywhere automatically. Without the need, which looks to be the only solution currently, to create a small script that is executed at VM startup and it goes into a loop and runs `sudo-qvm-sync-clock` every 30 seconds. This is a serious problem, VMs don't sync their time on 4.2. Can anybody provide meaningful input? Is there nothing I can do here? Is it just me and my system or are you also seeing this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a9005303-c449-b4c8-73b7-43305243ef95%40ak47.co.za.
Re: [qubes-users] qubes HCL report HP_EliteBook 845 G8
Am having occasional crashing after lid-closing suspend with Rysen-powered Dell Inspiron… will try xfce button then lid closing. Many thanks for the hint. On Thursday, May 4, 2023, haaber wrote: > Dear all, > > Update of my HCL report: suspend to memory via xfce button works fine, > but often sys-net is dead at wake-up. No harm: a simple qvm-start > sys-net resolves that quickly, in particular, sys-firewall takes it > easy. Only lid-closing is more delicate: it hangs/crashes often -- so I > decided close lid *after* "suspend to memory" via xfce button only. > > best, Bernhard > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/ms > gid/qubes-users/073859e0-3338-2ff5-5994-c6b796d01a27%40web.de. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAOBBCnasPOh21tmUztd_g72BfMUdJMTgv2M3%2B1XYqDXOr0%2BpQw%40mail.gmail.com.
Re: [qubes-users] qubes HCL report HP_EliteBook 845 G8
updated, might take a few minutes until visible /Sven -- https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/80a9884e-89a7-bb5f-d84a-29f5538b309c%40SvenSemmler.org.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
Qubes wrote: Is this normal/expected behavior? As has been discussed in this thread, making changes in `/etc/skel` in a template of an existing VM does not propagate to the VM. However, if you change the VMs template to a different template it seems like `/etc/skel` is copied to `/home/user` when the VM boots, even though it is not a new VM. I don't understand the documentation in this way. I checked this now. This not the case, it was because of a test I was doing with another thread "Injecting configuration files into appVM when it's created/started for the first time". The test I was doing did something unexpected that made it appear as if `/etc/skel` was copied to a VM when the Template changes when in fact it does not. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c5a6598f-137b-db4b-a176-e0377d4a2ff5%40ak47.co.za.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
Qubes wrote: Vít Šesták wrote: Perhaps my search terms are just out of whack, but I have had a good look around and I cannot find a system wide location for `~/.config/qt5ct/qt5ct.conf` that controls the Style and Icon Theme for example. It's easy to find. 1. Me: Do you know a system-wide file for ~/.config/qt5ct/qt5ct.conf? ChatGPT: Yes, the system-wide configuration file for ~/.config/qt5ct/qt5ct.conf is typically located at /etc/xdg/qt5ct/qt5ct.conf. This file contains the default settings for I tried `/etc/xdg/qt5ct/qt5ct.conf` and it didn't work. I also tried `/etc/xdg/qt5ct.conf` (just to try my luck) but it also doesn't work. I will try it again just to double check, maybe my midnight oil lamp was already running out of oil when I did try and I made a mess of it. Ok so just to provide feedback, I have tried this again. The default is in fact located at `/etc/xdg/qt5ct/qt5ct.conf`, but it is only applied if `~/.config/qt5ct/qt5ct.conf` does not exist, with caveats. In fact what happens is if `~/.config/qt5ct/qt5ct.conf` does not exist `/etc/xdg/qt5ct/qt5ct.conf` is copied to `~/.config/qt5ct/`. Which kind of solves the problem. If the file exists you can delete it and just close all of you Qt applications and open them again. With the first one that you open it will check if `~/.config/qt5ct/qt5ct.conf` exists and if not make a copy of `/etc/xdg/qt5ct/qt5ct.conf`. This still does not allow a seamless edit to `/etc/xdg/qt5ct/qt5ct.conf` (in the Template) that will just apply to all VMs, but it does make it easier. I had a look at `strings /usr/lib64/libQt5Gui.so.5.15.9|grep '^QT_'` but I don't see a variable name that indicates to me it has anything to do with the path of `qt5ct.conf`. Thank you for the suggestion I have learnt something new today. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c2330fbd-e579-4639-afbe-de396679ff9f%40ak47.co.za.
Re: [qubes-users] Colourful prompt
Qubes wrote: 'unman' via qubes-users wrote: On Thu, May 04, 2023 at 05:01:38AM -0700, Andrew David Wong wrote: On 5/3/23 4:02 AM, Qubes wrote: I have noticed on Fedora, the cli prompt itself is not colourful although the rest of the output is. Is there a way to get the prompt itself in colour as well? The prompt on Debian is in colour, it makes it easier to find things when the prompt is in colour aswell. Since this is not a Qubes-specific question, you might have better luck searching the web for how to do this in Fedora (or Linux in general) or asking in a Fedora (or general Linux) venue. I wonder if this *is* Qubes specific, as it is stated that the Debian prompt is in color. (Implicit, I think, is the suggestion that the color matches the window decorations.) OP - is that what you see? That the prompt is consistent with the window decoration set by Qubes? No the colour of the prompt does not follow the window decoration, I was wondering if this isn't maybe a problem only on Fedora on Qubes and not Fedora in general. I don't have a Fedora standalone I can check on. I just found it odd that the prompt on Debian would be in colour (Green, and it is real easy to find in between a lot of other output) and on Fedora it is the same colour as the text you type. But as I was re-reading my reply here I just had another look over and I just discovered that the prompt on some of the Fedora VMs is in colour, also a bright green, and some of them are default text colour. So in essense it doesn't have anything to do with Qubes. I am a little confused though because I can swear some of the VMs that I previously check where the prompt was the default text colour now has a colourful prompt. (head scratch head scratch) It must be because of a dependency that gets installed along the way because booting the vanilla Fedora-37 template it does not have a colourful prompt. I don't install anything specific for this myself. Glad we cleared that up :-) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b540c0d6-c835-9f9f-eac7-5a08604e3748%40ak47.co.za.
Re: [qubes-users] The NovaCustom NV41 Series laptop is Qubes-certified!
Leo28C wrote: On Wed, May 3, 2023 at 5:12 AM Andrew David Wong <mailto:a...@qubes-os.org>> wrote: nor can we control whether physical hardware is modified (whether maliciously or otherwise) *en route* to the user. Actually you could: 1) Laminate product with `warranty void if removed` stickers of various brands and types 2) Send PGP-signed high-res photo of sticker placement to buyer before shipping 3) Buyer receives product and compares sticker placement to the photo to verify integrity This is a great idea, you should contact Nova and propose it to them. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c28ae291-97e6-a918-68de-e6e7f6dc5e44%40ak47.co.za.
Re: [qubes-users] Colourful prompt
'unman' via qubes-users wrote: On Thu, May 04, 2023 at 05:01:38AM -0700, Andrew David Wong wrote: On 5/3/23 4:02 AM, Qubes wrote: I have noticed on Fedora, the cli prompt itself is not colourful although the rest of the output is. Is there a way to get the prompt itself in colour as well? The prompt on Debian is in colour, it makes it easier to find things when the prompt is in colour aswell. Since this is not a Qubes-specific question, you might have better luck searching the web for how to do this in Fedora (or Linux in general) or asking in a Fedora (or general Linux) venue. I wonder if this *is* Qubes specific, as it is stated that the Debian prompt is in color. (Implicit, I think, is the suggestion that the color matches the window decorations.) OP - is that what you see? That the prompt is consistent with the window decoration set by Qubes? No the colour of the prompt does not follow the window decoration, I was wondering if this isn't maybe a problem only on Fedora on Qubes and not Fedora in general. I don't have a Fedora standalone I can check on. I just found it odd that the prompt on Debian would be in colour (Green, and it is real easy to find in between a lot of other output) and on Fedora it is the same colour as the text you type. But as I was re-reading my reply here I just had another look over and I just discovered that the prompt on some of the Fedora VMs is in colour, also a bright green, and some of them are default text colour. So in essense it doesn't have anything to do with Qubes. I am a little confused though because I can swear some of the VMs that I previously check where the prompt was the default text colour now has a colourful prompt. (head scratch head scratch) I do see this in .bashrc on Debian and there is nothing of it in .bashrc on Fedora. There is in fact a lot of stuff in .bashrc on Debian that is not there on Fedora. .bashrc ===truncated=== # set a fancy prompt (non-color, unless we know we "want" color) case "$TERM" in xterm-color|*-256color) color_prompt=yes;; esac # uncomment for a colored prompt, if the terminal has the capability; turned # off by default to not distract the user: the focus in a terminal window # should be on the output of commands, not on the prompt #force_color_prompt=yes if [ -n "$force_color_prompt" ]; then if [ -x /usr/bin/tput ] && tput setaf 1 >&/dev/null; then # We have color support; assume it's compliant with Ecma-48 # (ISO/IEC-6429). (Lack of such support is extremely rare, and such # a case would tend to support setf rather than setaf.) color_prompt=yes else color_prompt= fi fi ===truncated=== I have copied it over to .bashrc on Fedora and uncommented `force_color_prompt=yes` but it makes no difference. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/62120076-9be6-1d62-4831-a3f638d3414f%40ak47.co.za.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
Is this normal/expected behavior? As has been discussed in this thread, making changes in `/etc/skel` in a template of an existing VM does not propagate to the VM. However, if you change the VMs template to a different template it seems like `/etc/skel` is copied to `/home/user` when the VM boots, even though it is not a new VM. I don't understand the documentation in this way. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cd3a4b52-cb34-be7d-f22b-8dcb9246dff9%40ak47.co.za.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
The file location may vary by your distro, at least ChatGPT tells so. Also strace might help you to check what file locations are accessed: 1. strace -o /tmp/strace.log gnome-terminal 2. grep settings.ini /tmp/strace.log You'll probably want to use a Qt app rather than gnome-terminal, but the way to look for that is the same. Regards, Vít Šesták 'v6ak' On Thursday, May 4, 2023 at 2:31:52 PM UTC+2 Qubes wrote: > > Vít Šesták wrote: > > Perhaps my search terms are just out of whack, but I have had a good > > look around and I cannot find a system wide location for > > `~/.config/qt5ct/qt5ct.conf` that controls the Style and Icon Theme for > > example. > > > > > > It's easy to find. > > > > 1. Me: Do you know a system-wide file for ~/.config/qt5ct/qt5ct.conf? > > ChatGPT: Yes, the system-wide configuration file for > > ~/.config/qt5ct/qt5ct.conf is typically located at > > /etc/xdg/qt5ct/qt5ct.conf. This file contains the default settings for > > I tried `/etc/xdg/qt5ct/qt5ct.conf` and it didn't work. I also tried > `/etc/xdg/qt5ct.conf` (just to try my luck) but it also doesn't work. I > will try it again just to double check, maybe my midnight oil lamp was > already running out of oil when I did try and I made a mess of it. > > > the Qt5 Configuration Tool and is used as a fallback configuration file > > if no user-specific configuration is found. > > > > Note that the location of the system-wide configuration file may vary > > depending on your specific Linux distribution or operating system. You > > can use the locate or find command to search for the file on your system. > > > > 2. Verify by Google by searching "/etc/xdg/qt5ct/qt5ct.conf" (including > > quotes). It seems that this location is real. > > > > Even more frustrating I cannot > > find a list of the environment variables that I can potentially use. I > > only know of the `QT_QPA_PLATFORMTHEME=qt5ct` which I currently use and > > `QT_STYLE_OVERRIDE=` [3][4] which you can set to either `adwaita` or > > `kvantum` However there may be an environment variable one can use to > > set the path to the `qt5ct.conf`, but such a list alludes me. > > > > > > > > 1. Look where it is used: > > sudo grep -rl QT_QPA_PLATFORMTHEME /usr > > /usr/share/doc/qgnomeplatform-qt6/README.md > > /usr/share/doc/gnupg2/NEWS > > /usr/share/doc/qgnomeplatform-qt5/README.md > > /usr/lib64/libQt5Gui.so.5.15.9 > > /usr/lib64/libQt6Gui.so.6.4.3 > > > > 2. Look in the binary: > > strings /usr/lib64/libQt6Gui.so.6.4.3 | grep '^QT_' > > > > Thanks I will check this. > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5371dedc-9fd6-4fd3-b29f-f40ce44a35afn%40googlegroups.com.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
Vít Šesták wrote: Perhaps my search terms are just out of whack, but I have had a good look around and I cannot find a system wide location for `~/.config/qt5ct/qt5ct.conf` that controls the Style and Icon Theme for example. It's easy to find. 1. Me: Do you know a system-wide file for ~/.config/qt5ct/qt5ct.conf? ChatGPT: Yes, the system-wide configuration file for ~/.config/qt5ct/qt5ct.conf is typically located at /etc/xdg/qt5ct/qt5ct.conf. This file contains the default settings for I tried `/etc/xdg/qt5ct/qt5ct.conf` and it didn't work. I also tried `/etc/xdg/qt5ct.conf` (just to try my luck) but it also doesn't work. I will try it again just to double check, maybe my midnight oil lamp was already running out of oil when I did try and I made a mess of it. the Qt5 Configuration Tool and is used as a fallback configuration file if no user-specific configuration is found. Note that the location of the system-wide configuration file may vary depending on your specific Linux distribution or operating system. You can use the locate or find command to search for the file on your system. 2. Verify by Google by searching "/etc/xdg/qt5ct/qt5ct.conf" (including quotes). It seems that this location is real. Even more frustrating I cannot find a list of the environment variables that I can potentially use. I only know of the `QT_QPA_PLATFORMTHEME=qt5ct` which I currently use and `QT_STYLE_OVERRIDE=` [3][4] which you can set to either `adwaita` or `kvantum` However there may be an environment variable one can use to set the path to the `qt5ct.conf`, but such a list alludes me. 1. Look where it is used: sudo grep -rl QT_QPA_PLATFORMTHEME /usr /usr/share/doc/qgnomeplatform-qt6/README.md /usr/share/doc/gnupg2/NEWS /usr/share/doc/qgnomeplatform-qt5/README.md /usr/lib64/libQt5Gui.so.5.15.9 /usr/lib64/libQt6Gui.so.6.4.3 2. Look in the binary: strings /usr/lib64/libQt6Gui.so.6.4.3 | grep '^QT_' Thanks I will check this. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/48389e46-b8e0-bf48-bfc0-bafe439dcf05%40ak47.co.za.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
Perhaps my search terms are just out of whack, but I have had a good look around and I cannot find a system wide location for `~/.config/qt5ct/qt5ct.conf` that controls the Style and Icon Theme for example. It's easy to find. 1. Me: Do you know a system-wide file for ~/.config/qt5ct/qt5ct.conf? ChatGPT: Yes, the system-wide configuration file for ~/.config/qt5ct/qt5ct.conf is typically located at /etc/xdg/qt5ct/qt5ct.conf. This file contains the default settings for the Qt5 Configuration Tool and is used as a fallback configuration file if no user-specific configuration is found. Note that the location of the system-wide configuration file may vary depending on your specific Linux distribution or operating system. You can use the locate or find command to search for the file on your system. 2. Verify by Google by searching "/etc/xdg/qt5ct/qt5ct.conf" (including quotes). It seems that this location is real. Even more frustrating I cannot find a list of the environment variables that I can potentially use. I only know of the `QT_QPA_PLATFORMTHEME=qt5ct` which I currently use and `QT_STYLE_OVERRIDE=` [3][4] which you can set to either `adwaita` or `kvantum` However there may be an environment variable one can use to set the path to the `qt5ct.conf`, but such a list alludes me. 1. Look where it is used: sudo grep -rl QT_QPA_PLATFORMTHEME /usr /usr/share/doc/qgnomeplatform-qt6/README.md /usr/share/doc/gnupg2/NEWS /usr/share/doc/qgnomeplatform-qt5/README.md /usr/lib64/libQt5Gui.so.5.15.9 /usr/lib64/libQt6Gui.so.6.4.3 2. Look in the binary: strings /usr/lib64/libQt6Gui.so.6.4.3 | grep '^QT_' Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8b0a4074-5a2f-4954-94d4-8bb76861e40en%40googlegroups.com.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
Cristian Margine wrote: Most software has a default config location. You can search it on archwiki(qubes is using fedora, but in general the arch wiki list paths that work on all distros as location where the configuration for a program must be placed), ask chatgpt or search on google for the default config location for that program. It might be in /etc or somewhere in /usr/. Perhaps my search terms are just out of whack, but I have had a good look around and I cannot find a system wide location for `~/.config/qt5ct/qt5ct.conf` that controls the Style and Icon Theme for example. I have looked around on Archwiki [1] as well but there is no mention of a global conf file for Qt5. Qt4 on the other hand does support a global conf file [2], `/etc/xdg/Trollech.conf`, which I have tried using but Qt5 does not look at it. Even more frustrating I cannot find a list of the environment variables that I can potentially use. I only know of the `QT_QPA_PLATFORMTHEME=qt5ct` which I currently use and `QT_STYLE_OVERRIDE=` [3][4] which you can set to either `adwaita` or `kvantum` However there may be an environment variable one can use to set the path to the `qt5ct.conf`, but such a list alludes me. I also canot find a system wide location for Krusader configuration file `~/.config/krusaderrc`. From there the need arises to inject files into already running VMs. For future VMs this problem is solved with `/etc/skel` but my problem is with running VMs. [1]: https://wiki.archlinux.org/title/Qt#Configuration_of_Qt_5_applications_under_environments_other_than_KDE_Plasma [2]: https://wiki.archlinux.org/title/Qt#Styles_in_Qt_4 [3]: https://wiki.archlinux.org/title/Uniform_look_for_Qt_and_GTK_applications#Adwaita [4]: https://wiki.archlinux.org/title/Uniform_look_for_Qt_and_GTK_applications#Kvantum -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8a7a0fa1-9436-553f-6445-738835375fb9%40ak47.co.za.
Re: [qubes-users] Colourful prompt
On Thu, May 04, 2023 at 05:01:38AM -0700, Andrew David Wong wrote: > On 5/3/23 4:02 AM, Qubes wrote: > > I have noticed on Fedora, the cli prompt itself is not colourful although > > the rest of the output is. Is there a way to get the prompt itself in > > colour as well? The prompt on Debian is in colour, it makes it easier to > > find things when the prompt is in colour aswell. > > > > Since this is not a Qubes-specific question, you might have better luck > searching the web for how to do this in Fedora (or Linux in general) or > asking in a Fedora (or general Linux) venue. > I wonder if this *is* Qubes specific, as it is stated that the Debian prompt is in color. (Implicit, I think, is the suggestion that the color matches the window decorations.) OP - is that what you see? That the prompt is consistent with the window decoration set by Qubes? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ZFOgEprkEoVo25%2Bv%40thirdeyesecurity.org.
Re: [qubes-users] Colourful prompt
On 5/3/23 4:02 AM, Qubes wrote: > I have noticed on Fedora, the cli prompt itself is not colourful although the > rest of the output is. Is there a way to get the prompt itself in colour as > well? The prompt on Debian is in colour, it makes it easier to find things > when the prompt is in colour aswell. > Since this is not a Qubes-specific question, you might have better luck searching the web for how to do this in Fedora (or Linux in general) or asking in a Fedora (or general Linux) venue. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3100e550-911f-c078-72a8-e075512009e9%40qubes-os.org.
Re: [qubes-users] The NovaCustom NV41 Series laptop is Qubes-certified!
On 5/3/23 8:30 AM, Leo28C wrote: > On Wed, May 3, 2023 at 5:12 AM Andrew David Wong wrote: > >> nor can we control whether physical hardware is modified (whether >> maliciously or otherwise) *en route* to the user. >> > > Actually you could: > > 1) Laminate product with `warranty void if removed` stickers of various > brands and types > 2) Send PGP-signed high-res photo of sticker placement to buyer before > shipping > 3) Buyer receives product and compares sticker placement to the photo to > verify integrity > We (the Qubes OS Project) can't do that, because we never take possession of inventory. When you purchase a Qubes-certified computer from a vendor, you are purchasing directly from that vendor. However, you could offer your suggestion to the vendors who sell Qubes-certified hardware. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b69230c2-621f-6650-f104-4f2e1fe242dd%40qubes-os.org.
Re: [qubes-users] ThinkPad W530
Sounds like you have not enabled VT-d (intel virtualisation) in the bios. That CPU does support VT-d, so it just needs to be enabled in the bios for qubesOS to work properly. S On Thu, 4 May 2023 at 10:40, T. I. N. Comp-E wrote: > I hope this finds you well... I have a thinkpad W530. I was able to > upgrade it to upgrade the ram to 16 Gigs I have met all the > requirements and specs(I7 3740QM)... it still say my pc is not > supported what else do i need to do... Ive tried many combination on > the bios I dont know how to unlock the advanced tab, I dont understand > what im doing wrong... please help > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/CAAMOyp0zzDXGh%3DNMqAgXLAdcpO5v9KkxrJN9bmLh4h1%2BgEd1oA%40mail.gmail.com > <https://groups.google.com/d/msgid/qubes-users/CAAMOyp0zzDXGh%3DNMqAgXLAdcpO5v9KkxrJN9bmLh4h1%2BgEd1oA%40mail.gmail.com?utm_medium=email_source=footer> > . > -- Kind Regards, Simon Newton E: simon.new...@gmail.com -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CADLktjC7OOm0fCnnzS%3D6f3U6w4R%2BZE_nQN7K1opUvEsuUXZ9Gw%40mail.gmail.com.
[qubes-users] ThinkPad W530
I hope this finds you well... I have a thinkpad W530. I was able to upgrade it to upgrade the ram to 16 Gigs I have met all the requirements and specs(I7 3740QM)... it still say my pc is not supported what else do i need to do... Ive tried many combination on the bios I dont know how to unlock the advanced tab, I dont understand what im doing wrong... please help -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAAMOyp0zzDXGh%3DNMqAgXLAdcpO5v9KkxrJN9bmLh4h1%2BgEd1oA%40mail.gmail.com.
Re: [qubes-users] qubes HCL report HP_EliteBook 845 G8
Dear all, Update of my HCL report: suspend to memory via xfce button works fine, but often sys-net is dead at wake-up. No harm: a simple qvm-start sys-net resolves that quickly, in particular, sys-firewall takes it easy. Only lid-closing is more delicate: it hangs/crashes often -- so I decided close lid *after* "suspend to memory" via xfce button only. best, Bernhard -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/073859e0-3338-2ff5-5994-c6b796d01a27%40web.de. --- layout: 'hcl' type: 'notebook' hvm: 'yes' iommu: 'yes' slat: 'yes' tpm: 'unknown' remap: 'yes' brand: | HP model: | HP EliteBook 845 G8 Notebook PC bios: | T82 Ver. 01.10.01 cpu: | AMD Ryzen 7 PRO 5850U with Radeon Graphics cpu-short: | FIXME chipset: | Advanced Micro Devices, Inc. [AMD] Renoir Root Complex [1022:1630] chipset-short: | FIXME gpu: | Advanced Micro Devices, Inc. [AMD/ATI] Cezanne [1002:1638] (rev d1) (prog-if 00 [VGA controller]) gpu-short: | FIXME network: | Realtek Semiconductor Co., Ltd. RTL8822CE 802.11ac PCIe Wireless Network Adapter memory: | 32065 scsi: | usb: | 3 versions: - works: 'FIXME:yes|no|partial' qubes: | R4.1 xen: | 4.14.5 kernel: | 5.15.94-1 remark: | FIXME credit: | FIXAUTHOR link: | FIXLINK ---
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
On Wed, May 03, 2023 at 04:19:00PM +, Qubes wrote: > > 'unman' via qubes-users wrote: > > On Wed, May 03, 2023 at 12:53:00PM +, Qubes wrote: > > > > > Is there a sane way to update existing `*.conf` files on VMs that are > > > already running? > > > Is there a not-so-labour-intensive way to solve this problem? > > > > Use salt - it's easy to apply to existing qubes, as well as template. > > You can (if you wish) store the config file whole, or just the changes > > that you want to make, as part of the install. > > It also has the advantage of being self documenting. > > > I have looked over salt, albeit briefly, but it definitely does not look > like something that someone with no knowledge of salt can just jump in and > use. You have mentioned this a lot so perhaps the best person here to ask > is you. Can you maybe recommend a salt for 'dummies' guide? > I have some notes at https://github.com/unman/notes which take you through simple steps with many examples of using salt in Qubes. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ZFMc9rIv4VwnBPg7%40thirdeyesecurity.org.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
'unman' via qubes-users wrote: On Wed, May 03, 2023 at 12:53:00PM +, Qubes wrote: Is there a sane way to update existing `*.conf` files on VMs that are already running? Is there a not-so-labour-intensive way to solve this problem? Use salt - it's easy to apply to existing qubes, as well as template. You can (if you wish) store the config file whole, or just the changes that you want to make, as part of the install. It also has the advantage of being self documenting. I have looked over salt, albeit briefly, but it definitely does not look like something that someone with no knowledge of salt can just jump in and use. You have mentioned this a lot so perhaps the best person here to ask is you. Can you maybe recommend a salt for 'dummies' guide? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3ea4f3c0-ec14-a515-1cf2-20eef567bd50%40ak47.co.za.
Re: [qubes-users] The NovaCustom NV41 Series laptop is Qubes-certified!
On Wed, May 3, 2023 at 5:12 AM Andrew David Wong wrote: > nor can we control whether physical hardware is modified (whether > maliciously or otherwise) *en route* to the user. > Actually you could: 1) Laminate product with `warranty void if removed` stickers of various brands and types 2) Send PGP-signed high-res photo of sticker placement to buyer before shipping 3) Buyer receives product and compares sticker placement to the photo to verify integrity -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAALhvVYsei7LV4qJyoyQDYpvvrxfLbi65iDBo0U7nh6%3Dq0PmGw%40mail.gmail.com.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
On Wed, May 03, 2023 at 12:53:00PM +, Qubes wrote: > Is there a sane way to update existing `*.conf` files on VMs that are > already running? > Is there a not-so-labour-intensive way to solve this problem? Use salt - it's easy to apply to existing qubes, as well as template. You can (if you wish) store the config file whole, or just the changes that you want to make, as part of the install. It also has the advantage of being self documenting. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ZFKNmZMMJjV2eD40%40thirdeyesecurity.org.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
Most software has a default config location. You can search it on archwiki(qubes is using fedora, but in general the arch wiki list paths that work on all distros as location where the configuration for a program must be placed), ask chatgpt or search on google for the default config location for that program. It might be in /etc or somewhere in /usr/. --- Original Message --- On Wednesday, May 3rd, 2023 at 3:53 PM, Qubes wrote: > > > > Rusty Bird wrote: > > > Everything in /etc/skel/ on the TemplateVM is copied to /home/user/ on > > VM creation, e.g. /etc/skel/.config/gtk-3.0/settings.ini (although for > > this specific case you could just use /etc/gtk-3.0/settings.ini which > > would also apply to existing VMs, not just newly created ones). > > > Is there a sane way to update existing `*.conf` files on VMs that are > already running? > > For example, I have installed new software in a Template that is used > by several VMs. I would like a default look and feel across all of the > VMs when I use the new software but the software stores its > configuration in `~/.config/...` > > I can put the default configuration in `/etc/skel/.config/...',which > will apply to newly created VMs, but this will not apply to already > created and running VMs. > > Is there a not-so-labour-intensive way to solve this problem? > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/0cf4e184-f257-6937-84b9-dbcf62ba74af%40ak47.co.za. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/SjdM1Aepa5AooGZdsK3xEJskfyyj6BNKHXNMAAUEij2Y24NDnNGQPsleTpYVFYm29hb-1wSCMzfXIOu00Ip4BbSQcPLYv3RvDd_iiSNeZ6k%3D%40cristiioan.me. publickey - cristiioan@cristiioan.me - 0xDAC92D89.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Time and date of appVM
Qubes wrote: Qubes wrote: Qubes wrote: I have noticed than when my computer wakes up from sleep the dom0 date and time updates as soon as my computer gets net connectivity, but my appVMs can take a loong time before their date and time also update. Is there any explanation for this and maybe a way to fix it? Ok I can sync it manually in the appVM using `sudo qvm-sync-clock`. So the question is how can I set it to run more frequently in the appVM? Update: When my computer wakes from sleep the appVMs never update their time. The only way is to manually run `sudo-qvm-sync-clock` or reboot the VM. Why do I see this behavior? I am sure date and time should sync everywhere automatically. Without the need, which looks to be the only solution currently, to create a small script that is executed at VM startup and it goes into a loop and runs `sudo-qvm-sync-clock` every 30 seconds. This is a serious problem, VMs don't sync their time on 4.2. Can anybody provide meaningful input? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/651672d7-f28c-c96c-f243-dbc9e139a40f%40ak47.co.za.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
Rusty Bird wrote: Everything in /etc/skel/ on the TemplateVM is copied to /home/user/ on VM creation, e.g. /etc/skel/.config/gtk-3.0/settings.ini (although for this specific case you could just use /etc/gtk-3.0/settings.ini which would also apply to existing VMs, not just newly created ones). Is there a sane way to update existing `*.conf` files on VMs that are already running? For example, I have installed new software in a Template that is used by several VMs. I would like a default look and feel across all of the VMs when I use the new software but the software stores its configuration in `~/.config/...` I can put the default configuration in `/etc/skel/.config/...',which will apply to newly created VMs, but this will not apply to already created and running VMs. Is there a not-so-labour-intensive way to solve this problem? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0cf4e184-f257-6937-84b9-dbcf62ba74af%40ak47.co.za.
Re: [qubes-users] qubes HCL report
Thank you Bernhard for your HCL report, which is [online](https://www.qubes-os.org/hcl/#hewlett-packard_elitebook-845-g8_ryzen-7-pro-5850u_integrated-graphics-rx-vega-8-5000_bernhard-haaber_r4-1) now! /Sven -- https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ba4b6254-d05c-e91f-87ef-9008fe1335ce%40SvenSemmler.org.
[qubes-users] Colourful prompt
I have noticed on Fedora, the cli prompt itself is not colourful although the rest of the output is. Is there a way to get the prompt itself in colour as well? The prompt on Debian is in colour, it makes it easier to find things when the prompt is in colour aswell. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9dec4ccb-d633-4776-5cbe-617cc716121d%40ak47.co.za.
[qubes-users] The NovaCustom NV41 Series laptop is Qubes-certified!
Dear Qubes Community, It is our pleasure to announce that the [NovaCustom NV41 Series](https://configurelaptop.eu/nv41-series/) laptop has become the fifth [Qubes-certified computer](https://www.qubes-os.org/doc/certified-hardware/) for Qubes 4.X! ## About the NovaCustom NV41 Series The [NV41 Series](https://configurelaptop.eu/nv41-series/) is a 14-inch laptop from [NovaCustom](https://configurelaptop.eu/), a European vendor known for their highly customizable, Linux-friendly laptops. This 12th Generation Intel Core (Alder Lake) laptop comes with Dasharo coreboot open-source firmware, USB-C charging, the latest Intel Xe graphics, and up to 64 GB of memory. ## Qubes-certified configurations The following configuration options are certified for Qubes OS 4.X: Processor: - Intel Core i5-1240P processor - Intel Core i7-1260P processor Memory (Dual Channel): - 2 x 16 GB Kingston DDR4 SODIMM 3200 MHz (32 GB total) - 1 x 32 GB Kingston DDR4 SODIMM 3200 MHz (32 GB total) - 2 x 32 GB Kingston DDR4 SODIMM 3200 MHz (64 GB total) M.2 storage chip: - Samsung 980 SSD (all capacities) - Samsung 980 Pro SSD (all capacities) Wi-Fi and Bluetooth: - Intel AX-200/201 Wi-Fi module 2976 Mbps, 802.11ax/Wi-Fi 6 + Bluetooth 5.2 - Killer (Intel) Wireless-AX 1675x M.2 Wi-Fi module 802.11ax/Wi-Fi 6E + Bluetooth 5.3 - Blob-free: Qualcomm Atheros QCNFA222 Wi-Fi 802.11a/b/g/n + Bluetooth 4.0 - No Wi-Fi/Bluetooth chip ### Notes on Wi-Fi and Bluetooth options - When viewed in a Linux environment with `lspci`, the "Killer (Intel) Wireless-AX 1675x M.2 Wi-Fi module 802.11ax/Wi-Fi 6E + Bluetooth 5.3" device displays the model number "AX210." However, according to its [Intel Ark entry](https://ark.intel.com/content/www/us/en/ark/products/211485/intel-killer-wifi-6e-ax1675-xw.html) (in the "Product Brief" file), they are actually the same Wi-Fi module. - Similarly, when viewed in a Linux environment with `lspci`, the "Blob-free: Qualcomm Atheros QCNFA222 Wi-Fi 802.11a/b/g/n + Bluetooth 4.0" device displays the model number "AR9462," which seems to be just the Wi-Fi chip model number, whereas "QCNFA222" seems to be the model number of the whole device (which include Bluetooth). Meanwhile, the Bluetooth device presents itself as "IMC Networks Device 3487." - The term "blob-free" is used in different ways. In practice, being "blob-free" generally does *not* mean that the device does not use any closed-source firmware "blobs." Rather, it means that the device comes with firmware *preinstalled* so that it does not have to be loaded from the operating system. In theory, the preinstalled firmware could be open-source, but as far as we know, that is not the case with this particular Atheros Wi-Fi/Bluetooth module. (Qualcomm has published firmware source code in the past, but only for other device models, as far as we are aware.) Meanwhile, the Free Software Foundation (FSF) [considers](https://www.gnu.org/philosophy/free-hardware-designs.en.html#boundary) unmodifiable preinstalled firmware to be part of the hardware, hence they regard such hardware as "blob-free" from a software perspective. While common usage of the term "blob-free" often follows the FSF's interpretation, it is worthwhile for Qubes users who are concerned about closed-source firmware to understand the nuance. ## Special note regarding the need for `kernel-latest` Beginning with Qubes OS 4.1.2, the Qubes installer includes the `kernel-latest` package and allows users to select this kernel option from the GRUB menu when booting the installer. At the time of this announcement, `kernel-latest` is *required* for the NovaCustom NV41 Series to function properly. Therefore, all potential purchasers and users of this model should be aware that they will have to select a non-default option (`Install Qubes OS RX using kernel-latest`) from the GRUB menu when booting the installer. However, since Linux 6.1 has officially been promoted to being a long-term support (LTS) kernel, it will become the default kernel at some point, which means that the need for this non-default selection is only temporary. ## What is Qubes-certified hardware? [Qubes-certified hardware](https://www.qubes-os.org/doc/certified-hardware/) is hardware that has been certified by the Qubes developers as compatible with a specific [major release](https://www.qubes-os.org/doc/version-scheme/) of Qubes OS. All Qubes-certified devices are available for purchase with Qubes OS preinstalled. Beginning with Qubes 4.0, in order to achieve certification, the hardware must satisfy a rigorous set of [requirements], and the vendor must commit to offering customers the very same configuration (same motherboard, same screen, same BIOS version, same Wi-Fi module, etc.) for at least one year. [Qubes-certified computers](https://www.qubes-os.org/doc/certifie
Re: [qubes-users] Template for X?
Steve Coleman wrote: > > On Sat, Apr 29, 2023, 4:53 AM Sandy Harris wrote: >> >> Is there a template to make a qube that just runs as an X terminal? > > If you turn on Qubes debugging for any AppVM it will start within a terminal > window with a command line interface. If that AppVM has X installed you > should still be able to start other apps that will appear in their own window. > > Is this what you are looking for? It does not sound like it. I'll have two machines, one running Qubes & two monitors, the other headless. What I want is a qube that runs X with all its client processes on the headless one. I know I can do that with a full linux in that qube, but wonder how much that can be stripped down in an X server. I do not need that qube to do anything except handle display for the headless machine. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CACXcFmneeANShO4TU1jWnc%2BLyD0K6TKJFTS%3DJdE%3D2p1iX5qsFA%40mail.gmail.com.
Re: [qubes-users] Time and date of appVM
Qubes wrote: Qubes wrote: I have noticed than when my computer wakes up from sleep the dom0 date and time updates as soon as my computer gets net connectivity, but my appVMs can take a loong time before their date and time also update. Is there any explanation for this and maybe a way to fix it? Ok I can sync it manually in the appVM using `sudo qvm-sync-clock`. So the question is how can I set it to run more frequently in the appVM? Update: When my computer wakes from sleep the appVMs never update their time. The only way is to manually run `sudo-qvm-sync-clock` or reboot the VM. Why do I see this behavior? I am sure date and time should sync everywhere automatically. Without the need, which looks to be the only solution currently, to create a small script that is executed at VM startup and it goes into a loop and runs `sudo-qvm-sync-clock` every 30 seconds. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4e59b2d6-c25f-0943-0645-b5861fe2f376%40ak47.co.za.
Re: [qubes-users] Re: Injecting configuration files into appVM when it's created/started for the first time
Qubes wrote: Vít Šesták wrote: I sometimes need something similar, but I prefer a slightly different approach. I prefer the config files to be in the TemplateVM, so that I can easily update them for all the VMs. There is no general solution for all the cases, but you often can find a global file. For example: * /etc/xdg/xfce4/terminal/terminalrc for XFCE4 Terminal settings Thank you for the nice tip. Rather using a global config file is in fact more like I want it. I will definitely use the xfce4-terminal settings file global location. What is the best way to find other configuration files' global location. Is it just a matter of searching or is there a more sophisticated approach? For example I would also like to use global settings locations for, 1. global dark theme, currently I have it configured in `~/.config/gtk-3.0/settings.ini` The global path for the dark theme is `/usr/share/gtk-3.0/settings.ini`. 2. is there one for `~./.bashrc` 3. `~/.config/dconf/user` (the config file that gets created by executing `gsettings set org.gnome.desktop.interface color-scheme prefer-dark. A necessary setting with newer Gtk applications, like the latest evince, not following the dark theme setting in `~/.config/gtk-3.0/settings.ini` anymore. Some software is changing over to Handy StyleManager for theming. 4. Is there on for Krusader, currently it is in `~/.config/krusaderrc` -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/517b600b-89df-3d43-6dbe-9885c962298b%40ak47.co.za.
Re: [qubes-users] Re: Injecting configuration files into appVM when it's created/started for the first time
Cristian Margine wrote: That happens because bash will replace an alias only if it is is the first word. You can set the alias alias sudo='sudo '. Because it has a space at the end it will also check the parameter('l' in your situation) if it is an alias. Thank you kindly that works a treat. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f5352c2c-bff5-d147-231c-8b529d5f27cb%40ak47.co.za.
Re: [qubes-users] Re: Injecting configuration files into appVM when it's created/started for the first time
That happens because bash will replace an alias only if it is is the first word. You can set the alias alias sudo='sudo '. Because it has a space at the end it will also check the parameter('l' in your situation) if it is an alias. \ Original Message On May 1, 2023, 11:03 PM, Qubes < qubes...@ak47.co.za> wrote: > > > Vít Šesták wrote: > I have several ways: > > a. Google > b. ChatGPT, e.g. > > “Can I configure XFCE Terminal for all users?” (real > example copied from > > my history) > c. Try to find a file with the same name (maybe without > > initial dot) in > /usr, /etc, etc. Something like this: sudo find / -xdev > > -name zshrc > I have a question that I was hoping someone can shed some > > light on. I put an alias, now in /etc/bashrc to make it global, to alias > > l='ls -Ahl' This works everywhere but it does not work with sudo, > > \[user@fedora ~\]$ sudo l sudo: l: command not found > > \[user@fedora-37-m-default ~\]$ Why is that, can I make it comply? -- You > > received this message because you are subscribed to the Google Groups > > "qubes-users" group. To unsubscribe from this group and stop receiving > > emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. > > To view this discussion on the web visit > > https://groups.google.com/d/msgid/qubes-users/0d57fe08-5556-cf45-7ab1-6fdc376281ef%40ak47.co.za. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fqO_IiJxnkI_1dPgRdYog0VY5gjcAtIaqbCBRWzykKL1rEB6nWhlm9nVUOFihwAT-SpshwjSouETjvdWJ1t2_ACOyeWdZBBh8HTb6L1jeXg%3D%40cristiioan.me. publickey - EmailAddress(s=cristiioan@cristiioan.me) - 0xDAC92D89.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Re: Injecting configuration files into appVM when it's created/started for the first time
Vít Šesták wrote: I have several ways: a. Google b. ChatGPT, e.g. “Can I configure XFCE Terminal for all users?” (real example copied from my history) c. Try to find a file with the same name (maybe without initial dot) in /usr, /etc, etc. Something like this: sudo find / -xdev -name zshrc I have a question that I was hoping someone can shed some light on. I put an alias, now in /etc/bashrc to make it global, to alias l='ls -Ahl' This works everywhere but it does not work with sudo, [user@fedora ~]$ sudo l sudo: l: command not found [user@fedora-37-m-default ~]$ Why is that, can I make it comply? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0d57fe08-5556-cf45-7ab1-6fdc376281ef%40ak47.co.za.
Re: [qubes-users] Re: Injecting configuration files into appVM when it's created/started for the first time
I have several ways: a. Google b. ChatGPT, e.g. “Can I configure XFCE Terminal for all users?” (real example copied from my history) c. Try to find a file with the same name (maybe without initial dot) in /usr, /etc, etc. Something like this: sudo find / -xdev -name zshrc Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/744da41a-f7a2-4764-9342-0bc82ae77c7dn%40googlegroups.com.
Re: [qubes-users] Re: Injecting configuration files into appVM when it's created/started for the first time
Qubes wrote: Vít Šesták wrote: I sometimes need something similar, but I prefer a slightly different approach. I prefer the config files to be in the TemplateVM, so that I can easily update them for all the VMs. There is no general solution for all the cases, but you often can find a global file. For example: * /etc/xdg/xfce4/terminal/terminalrc for XFCE4 Terminal settings Thank you for the nice tip. Rather using a global config file is in fact more like I want it. I will definitely use the xfce4-terminal settings file global location. What is the best way to find other configuration files' global location. Is it just a matter of searching or is there a more sophisticated approach? For example I would also like to use global settings locations for, 1. global dark theme, currently I have it configured in `~/.config/gtk-3.0/settings.ini` 2. is there one for `~./.bashrc` I see in my ~/.bashrc it gives the global location # Source global definitions if [ -f /etc/bashrc ]; then . /etc/bashrc 3. `~/.config/dconf/user` (the config file that gets created by executing `gsettings set org.gnome.desktop.interface color-scheme prefer-dark. A necessary setting with newer Gtk applications, like the latest evince, not following the dark theme setting in `~/.config/gtk-3.0/settings.ini` anymore. Some software is changing over to Handy StyleManager for theming. 4. Is there on for Krusader, currently it is in `~/.config/krusaderrc` -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f8d4d62e-cfd5-80e1-a184-66cd3bb6c1cd%40ak47.co.za.
Re: [qubes-users] Re: Injecting configuration files into appVM when it's created/started for the first time
Vít Šesták wrote: I sometimes need something similar, but I prefer a slightly different approach. I prefer the config files to be in the TemplateVM, so that I can easily update them for all the VMs. There is no general solution for all the cases, but you often can find a global file. For example: * /etc/xdg/xfce4/terminal/terminalrc for XFCE4 Terminal settings Thank you for the nice tip. Rather using a global config file is in fact more like I want it. I will definitely use the xfce4-terminal settings file global location. What is the best way to find other configuration files' global location. Is it just a matter of searching or is there a more sophisticated approach? For example I would also like to use global settings locations for, 1. global dark theme, currently I have it configured in `~/.config/gtk-3.0/settings.ini` 2. is there one for `~./.bashrc` 3. `~/.config/dconf/user` (the config file that gets created by executing `gsettings set org.gnome.desktop.interface color-scheme prefer-dark. A necessary setting with newer Gtk applications, like the latest evince, not following the dark theme setting in `~/.config/gtk-3.0/settings.ini` anymore. Some software is changing over to Handy StyleManager for theming. 4. Is there on for Krusader, currently it is in `~/.config/krusaderrc` -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fa15fb2e-5590-f803-7a15-62a05d44d81a%40ak47.co.za.
[qubes-users] Re: Injecting configuration files into appVM when it's created/started for the first time
I sometimes need something similar, but I prefer a slightly different approach. I prefer the config files to be in the TemplateVM, so that I can easily update them for all the VMs. There is no general solution for all the cases, but you often can find a global file. For example: * /etc/ssh/ssh_known_hosts * /etc/ssh/ssh_config.d/something.conf allows you to configure SSH client, e.g., RevokedHostKeys. * /etc/xdg/xfce4/terminal/terminalrc for XFCE4 Terminal settings * /usr/share/geany/geany.conf Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cdf49d9c-8427-434a-a579-5cc1277c8af1n%40googlegroups.com.
Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Qubes: > I am sure I have read this somewhere here on the list or in the > [documentation](https://www.qubes-os.org/doc/) that it is possible to inject > configuration files into an appVM when it gets created. Can someone maybe > remind me how to do it? > > For example to enable a default dark theme in a VM one does the following: > > mkdir -p .config/gtk-3.0 > vi .config/gtk-3.0/settings.ini > > Then you add the following lines to settings.ini: > > [Settings] > gtk-application-prefer-dark-theme=1 > > The problem here is if you do it in the template the appVM does not inherit > ".config/gtk-3.0/settings.ini" because the appVM gets its own private > storage. It is however a pain to have to manually put it in each appVM. This > is just an example there are many other cases where this is desirable. Everything in /etc/skel/ on the TemplateVM is copied to /home/user/ on VM creation, e.g. /etc/skel/.config/gtk-3.0/settings.ini (although for this specific case you could just use /etc/gtk-3.0/settings.ini which would also apply to existing VMs, not just newly created ones). Rusty -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEhLWbz8YrEp/hsG0ERp149HqvKt8FAmROTJhfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDg0 QjU5QkNGQzYyQjEyOUZFMUIwNkQwNDQ2OUQ3OEY0N0FBRjJBREYACgkQRp149Hqv Kt9e6RAAiExsUJl9d7xyaLd/m7gVX3HuZAVAAVkFDhTU1SU/o0uVs3rhcuMDAmqx /gftDBulJnS6pz30TUN/+C7Qd8GcE2VZ37z6tIsP+VMVVA+cUlNIi8VSsCl7+2ho 2ETt12WjHaGQ3tfhEs9G4ixt3hA7EzXL3qI8ItqE68Yel1oi77R21oAqQbFvPOgy ogAfjIQhmX30esZ9ym5oJZWprzUpPyX3SF1OtgZ5SC84yhPqy1/jOdpxvDNrni3+ ACAMYTBz34nYWS5ioQ6tLEJthFlsswoiKL3R72HRyLhs1gCnVDW/4LNJ0gjJS7jn zJ958zuRw9pnfFobYqk4359tEpEct7GEMuA/DFaiYf5gO3G3iPkuopr1Iu6p3QV9 SulyaL2a32I5cuIuqa4/ryRsF8aPMrtSQbRJFltDmnOWjh58Kf8rYwY6el2aBmMh OQGgg7OODTIS24wRX43VXq51SYRi7d/prB0P/fK9s4twijSZ8yXxbOrulco5Kdgp 2aULUnq2TDQ3ZDh0e/ONWx7Q3S3iR7QiM8W6psTsWBaHw+A7GPYQfHvabvYIyYOI Xh6oRp7PmR9cT0Ojz7QqmAOUB4b6rtjZHXFd3L8oTD+ofmZlHyBXBaFQ+Acbot7n rz49u7CIqoVDrcTc+rFcL20LhM8iSiBeoqzSkF1S7fb7TYKNn7I= =wYrE -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ZE5MmHd1obIbAHvN%40mutt.
Re: [qubes-users] Time and date of appVM
Qubes wrote: I have noticed than when my computer wakes up from sleep the dom0 date and time updates as soon as my computer gets net connectivity, but my appVMs can take a loong time before their date and time also update. Is there any explanation for this and maybe a way to fix it? Ok I can sync it manually in the appVM using `sudo qvm-sync-clock`. So the question is how can I set it to run more frequently in the appVM? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/165f432e-0f49-7676-3028-6de0fa2565e7%40ak47.co.za.
[qubes-users] Time and date of appVM
I have noticed than when my computer wakes up from sleep the dom0 date and time updates as soon as my computer gets net connectivity, but my appVMs can take a loong time before their date and time also update. Is there any explanation for this and maybe a way to fix it? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8e6f8181-5fcd-69e1-4ba9-32f2a650add1%40ak47.co.za.
[qubes-users] Injecting configuration files into appVM when it's created/started for the first time
I am sure I have read this somewhere here on the list or in the [documentation](https://www.qubes-os.org/doc/) that it is possible to inject configuration files into an appVM when it gets created. Can someone maybe remind me how to do it? For example to enable a default dark theme in a VM one does the following: mkdir -p .config/gtk-3.0 vi .config/gtk-3.0/settings.ini Then you add the following lines to settings.ini: [Settings] gtk-application-prefer-dark-theme=1 The problem here is if you do it in the template the appVM does not inherit ".config/gtk-3.0/settings.ini" because the appVM gets its own private storage. It is however a pain to have to manually put it in each appVM. This is just an example there are many other cases where this is desirable. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/42519b14-5963-a2a8-1fa4-680cc0af425c%40ak47.co.za.
Re: [qubes-users] Template for X?
On Sat, Apr 29, 2023, 4:53 AM Sandy Harris wrote: > Is there a template to make a qube that just runs as an X terminal? > If you turn on Qubes debugging for any AppVM it will start within a terminal window with a command line interface. If that AppVM has X installed you should still be able to start other apps that will appear in their own window. Is this what you are looking for? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJ5FDngZpbkSRrY-at8S7082xbfFAqX_ML3XGQ%2B7mAg9dEyYWA%40mail.gmail.com.
Re: [qubes-users] Updating via a wireguard connection
On Fri, Apr 28, 2023 at 11:58:55AM -0700, Jeremy Hansen wrote: > I would like to configure Qubes to do its updates via a connection to a > wireguard service I have set up. > > I understand how to set up a wireguard enabled template and a qubes based on > that template following this: > > https://github.com/hkbakke/qubes-wireguard > > which works great, but I would like to force package updates to also use a > wireguard connection. I???m not quite sure what to alter to do this. Any help > would be much appreciated. > > -jeremy > The default is for updates to run in sys-net. You need to change this by changing the policy - look in `/etc/qubes/policy.d/90-default.policy` for the `qubes.UpdatesProxy` lines, and then create a new policy in `/etc/qubes/policy.d/30-user.policy` like this: `qubes.UpdatesProxy * @type:TemplateVM @default allow target=QUBE` where QUBE is the name of the qube you want to use. If you use Whonix you will need to copy the relevant Whonix lines also. Set the netvm for QUBE to be your wireguard qube. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ZEzwfyp8Whgzsfcl%40thirdeyesecurity.org.
Re: [qubes-users] Template for X?
On Sat, Apr 29, 2023 at 04:53:10PM +0800, Sandy Harris wrote: [quote] Is there a template to make a qube that just runs as an X terminal? [/quote] Have you tried a minimal template? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ZEzuT6GWcmBSk%2BCi%40thirdeyesecurity.org.
[qubes-users] Template for X?
Is there a template to make a qube that just runs as an X terminal? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CACXcFmnT8GbJbz7_OTdeBq6thKGY58dDmM5U8K8GOBOHDu7MnA%40mail.gmail.com.
[qubes-users] Updating via a wireguard connection
I would like to configure Qubes to do its updates via a connection to a wireguard service I have set up. I understand how to set up a wireguard enabled template and a qubes based on that template following this: https://github.com/hkbakke/qubes-wireguard which works great, but I would like to force package updates to also use a wireguard connection. I’m not quite sure what to alter to do this. Any help would be much appreciated. -jeremy -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/99eb6d69-9242-4077-b317-5a8793d189be%40Canary.
Re: [qubes-users] Attaching USB devices by name instead of devid (from the command line)
On Wed, 2023-04-26 at 13:45 +0200, Gabriel Philippe wrote: > Hi, > > I use an USB scanner which is sometimes unplugged and might be > plugged > to another USB port. I would like it to be permanently attached to > the > "scanner" vm (I don't want to reattach it after reboot). > > However the documented way uses the devid, ex. sys-usb:2.5. If I > attach it permanently to a vm (qvm-usb attach -p scanner sys- > usb:2.5), > then unplug the scanner and plug an USB flash drive to same port, the > flash drive gets attached automatically to my "scanner" vm (which I > don't want). > > Is there a way to attach a specific device to a vm, and not an USB > port? > > I tried with qvm-block, but couldn't find my scanner label in /dev/ > > Currently, my best solution is to have a launcher running this: > qvm-usb attach scanner "$(qvm-usb|grep Canon|cut -f 1 -d ' ')" > Currently I have a similar script: qvm-usb attach --verbose sys-net ${qvm-usb l | awk '/.*Realtek_USB_10_100_1000_LAN.*/ {print $1}') > -- > Gabriel > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6d14abeaa2452c8cc20c2c95d79f6d6e5723d3d4.camel%40gmail.com.
Re: [qubes-users] dbus-x11 missing from Fedora-37
To withdraw my mistake, in order to install dbus x11, as an user: 1. sudo dnf install apt 2. add the Debian Buster package repositories to /etc/apt folder via root 3. After you are doing so, sudo apt update for the packages 4. sudo apt install [package] Apr 27, 2023 08:34:53 Qubes : > When i attempted to launch a root gnome-terminal on the default Fedora-37 > template i received a "dbus-launch" error. > > " > [user@fedora-37-clone-1 ~]$ sudo gnome-terminal > # gdk_atom_intern: assertion 'atom_name != NULL' failed > # gdk_atom_intern: assertion 'atom_name != NULL' failed > # Error constructing proxy for > org.gnome.Terminal:/org/gnome/Terminal/Factory0: Failed to execute child > process “dbus-launch” (No such file or directory) > [user@fedora-37-clone-1 ~]$ > " > > I know I can "sudo COMMAND" or I can become root "sudo su", but it my case I > need to launch a root gnome-terminal. > > Installing dbus-launch solves the issue, "sudo dnf install dbus-x11". I have > checked the default Debian-11 template has dbus-x11 installed. > > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/3b77bcf0-bb9d-4cb4-0513-6ec5d4fd6a90%40ak47.co.za. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7be72d21-0f81-4faa-8933-b447406e84db%40gmail.com.
Re: [qubes-users] dbus-x11 missing from Fedora-37
Additionally, the fc37 minimal does not have GUI terminal because of its nature of execution from formal installation of minimal setup. As a result, fc37 minimal only provides CLI based programs. Apr 27, 2023 08:46:45 Howard Chen : > Correct: > > After you went to the terminal, for Debian: execute either sudo or root: > > 1. dnf update > > 2. dnf install dbus-x11 > > > !! Notes: must be executed in xterm, not gnome terminal. !! > > Apr 27, 2023 08:41:32 Qubes : > >> >>> Original Message >>> From: Howard Chen >>> Sent: Thursday, April 27, 2023 at 17:39 >>> To: Qubes >>> Cc: qubes-users@googlegroups.com >>> Subject: [qubes-users] dbus-x11 missing from Fedora-37 >>> Just execute 'gnome-terminal' or 'terminal' without using sudo or root. >>> >> >> You clearly have not read what i have said. >> >> -- >> You received this message because you are subscribed to the Google Groups >> "qubes-users" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to qubes-users+unsubscr...@googlegroups.com. >> To view this discussion on the web visit >> https://groups.google.com/d/msgid/qubes-users/296a94f3-5d54-8b36-0536-b9e17f05d8d6%40ak47.co.za. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8670d29b-f1b4-4ee8-b1f8-3fe9235ca97f%40gmail.com.
Re: [qubes-users] dbus-x11 missing from Fedora-37
Correct: After you went to the terminal, for Debian: execute either sudo or root: 1. dnf update 2. dnf install dbus-x11 !! Notes: must be executed in xterm, not gnome terminal. !! Apr 27, 2023 08:41:32 Qubes : > >> Original Message >> From: Howard Chen >> Sent: Thursday, April 27, 2023 at 17:39 >> To: Qubes >> Cc: qubes-users@googlegroups.com >> Subject: [qubes-users] dbus-x11 missing from Fedora-37 >> Just execute 'gnome-terminal' or 'terminal' without using sudo or root. >> > > You clearly have not read what i have said. > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/296a94f3-5d54-8b36-0536-b9e17f05d8d6%40ak47.co.za. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cb87bfc2-fec5-43ef-a730-187e7fdd1c87%40gmail.com.
Re: [qubes-users] dbus-x11 missing from Fedora-37
Original Message From: Howard Chen Sent: Thursday, April 27, 2023 at 17:39 To: Qubes Cc: qubes-users@googlegroups.com Subject: [qubes-users] dbus-x11 missing from Fedora-37 Just execute 'gnome-terminal' or 'terminal' without using sudo or root. You clearly have not read what i have said. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/296a94f3-5d54-8b36-0536-b9e17f05d8d6%40ak47.co.za.
Re: [qubes-users] dbus-x11 missing from Fedora-37
Just execute 'gnome-terminal' or 'terminal' without using sudo or root. Apr 27, 2023 08:34:53 Qubes : > When i attempted to launch a root gnome-terminal on the default Fedora-37 > template i received a "dbus-launch" error. > > " > [user@fedora-37-clone-1 ~]$ sudo gnome-terminal > # gdk_atom_intern: assertion 'atom_name != NULL' failed > # gdk_atom_intern: assertion 'atom_name != NULL' failed > # Error constructing proxy for > org.gnome.Terminal:/org/gnome/Terminal/Factory0: Failed to execute child > process “dbus-launch” (No such file or directory) > [user@fedora-37-clone-1 ~]$ > " > > I know I can "sudo COMMAND" or I can become root "sudo su", but it my case I > need to launch a root gnome-terminal. > > Installing dbus-launch solves the issue, "sudo dnf install dbus-x11". I have > checked the default Debian-11 template has dbus-x11 installed. > > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/3b77bcf0-bb9d-4cb4-0513-6ec5d4fd6a90%40ak47.co.za. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/53a19007-e5f8-431b-ae80-a1c08f1d57eb%40gmail.com.
[qubes-users] dbus-x11 missing from Fedora-37
When i attempted to launch a root gnome-terminal on the default Fedora-37 template i received a "dbus-launch" error. " [user@fedora-37-clone-1 ~]$ sudo gnome-terminal # gdk_atom_intern: assertion 'atom_name != NULL' failed # gdk_atom_intern: assertion 'atom_name != NULL' failed # Error constructing proxy for org.gnome.Terminal:/org/gnome/Terminal/Factory0: Failed to execute child process “dbus-launch” (No such file or directory) [user@fedora-37-clone-1 ~]$ " I know I can "sudo COMMAND" or I can become root "sudo su", but it my case I need to launch a root gnome-terminal. Installing dbus-launch solves the issue, "sudo dnf install dbus-x11". I have checked the default Debian-11 template has dbus-x11 installed. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3b77bcf0-bb9d-4cb4-0513-6ec5d4fd6a90%40ak47.co.za.
Re: [qubes-users] Re: Help with a small test
Leslie Smith wrote: > As soon as you add evince using the Add button and you > click on Apply you should see the KSysoca error logged on your terminal > window. Yes. I see 10:24:04.570-warning kf.service.services unknown@0 # KServiceFactory: unexpected object entry in KSycoca database (type= 305 ) 10:24:04.571-warning kf.service.services unknown@0 # KServiceFactory: unexpected object entry in KSycoca database (type= 305 ) kf.service.services: KServiceFactory: unexpected object entry in KSycoca database (type= 305 ) kf.service.services: KServiceFactory: unexpected object entry in KSycoca database (type= 305 ) kf.service.services: KServiceFactory: unexpected object entry in KSycoca database (type= 305 ) kf.service.services: KServiceFactory: unexpected object entry in KSycoca database (type= 305 ) > Can you also confirm, when executing "kbuildsycoca5 --noincremental" on > cli do you also get > "applications.menu" not found in ("/etc/xdg/menus") ? To fix this really annoying issue, create a applications.menu symbolic link in /etc/xdg/menus/ (in the template). sudo ln -s /etc/xdg/menus/kf5-applications.menu /etc/xdg/menus/applications.menu -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/50b3a2c4-9a06-11f7-1e1d-8664a1d7b4d7%40ak47.co.za.
Re: [qubes-users] ""applications.menu" not found in ("/etc/xdg/menus")"
Qubes wrote: I am wondering if a Qubes member can have a look at this. I have a problem with Krusader not working properly on a Fedora appVM. In short, if I open Krusader from cli and then I open a file in Krusader the file does not open, instead a dialog window is given in which I must choose which program to use to open the file. This is an endless loop. Error messages I see on cli that I think is the problem is, "warning kf.service.services unknown@0 # KServiceFactory: unexpected object entry in KSycoca database (type= 305 )" After some digging I found this [article](https://userbase.kde.org/KDE_System_Administration/Caches) that tells me the KSysoca database is built using "kbuildsycoca5" which is provided by the already installed package "kf5-kservice". However, when I manually try and build the database using "kbuildsysoca5" I get an error, "[user@fedora-xx ~]$ kbuildsycoca5 --noincremental kbuildsycoca5 running... "applications.menu" not found in ("/etc/xdg/menus")" < What does this complaint about "applications.menu" not found in "/etc/xdg/menus" mean? If I compare the folder contents of /etc/xdg/menus between Fedora-37 and Debian-11, the Fedora template has everything the Debian template has with a few more entries. And neither Fedora nor Debian has "applications.menu". The command completes without errors on Debian-11, and Krusader on Debian works as expected. "user@debian-11:~$ kbuildsycoca5 --noincremental kbuildsycoca5 running... user@debian-11:~$" For anybody else perhaps struggling with Krusader on Fedora, to fix this really annoying issue is to create a applications.menu ymbolic link from /etc/xdg/menus/ (in the template). sudo ln -s /etc/xdg/menus/kf5-applications.menu /etc/xdg/menus/applications.menu -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e07631af-a06a-ade1-1263-5e87b1ccf98e%40ak47.co.za.
[qubes-users] Attaching USB devices by name instead of devid (from the command line)
Hi, I use an USB scanner which is sometimes unplugged and might be plugged to another USB port. I would like it to be permanently attached to the "scanner" vm (I don't want to reattach it after reboot). However the documented way uses the devid, ex. sys-usb:2.5. If I attach it permanently to a vm (qvm-usb attach -p scanner sys-usb:2.5), then unplug the scanner and plug an USB flash drive to same port, the flash drive gets attached automatically to my "scanner" vm (which I don't want). Is there a way to attach a specific device to a vm, and not an USB port? I tried with qvm-block, but couldn't find my scanner label in /dev/ Currently, my best solution is to have a launcher running this: qvm-usb attach scanner "$(qvm-usb|grep Canon|cut -f 1 -d ' ')" -- Gabriel -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJ-6NAsdNNYVQxYfG_%3DST-F_ov8JrZ9CpK4wDFcMUtja_rE1eg%40mail.gmail.com.