[qubes-users] How to autorun startup script on login/reboot in dom0 with i3wm?
I just installed i3wm and it switches my 2 displays from extended to mirrored. In effort to fix this, I wrote a simple script called rc.local containing the following commands: xrandr --output DP-1 --auto xrandr --output VGA-1 --right-of DP-1 xrandr --output VGA-1 --mode 1920x1080 The script works fine when I execute it manually from the terminal (I've already done chmod+x). However, at the end of my /etc/i3/config file i added the line: exec /etc/rc.local I added this line to automatically run the script when i reboot my computer but for some reason it doesn't work. I've tried it with single and double quotes as well as exec_always and --no-startup-id but nothing seems to work. Any ideas how I can get this working? I've also tried putting the commands directly into the config without calling the script but that didn't work either. Even echo test >> /tmp/testfile didn't output anything. Any ideas would be much appreciated, thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b44ebe1a-19cc-4ac7-a37b-679418280f88%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Query - Why unable to clone net-sys VM ?
On Friday, January 13, 2017 at 3:29:45 AM UTC+4, Ángel wrote: > Steve wrote: > > my default net-sys includes both Ethernet and Wifi. I wanted to split them > > out into > > net-sys-eth and > > net-sys-wifi > > > > each with the appropriate PCI device. I tried to clone the net-sys but it > > is greyed out and I was wondering why > > > > Probably because it is running. Stop the VM before attempting to clone it. > Also, you will need to remove one of the pci devices while it is > stopped, as those cannot be edited while it is running (nor can you > attach the same pci to two VMs). I had everything shutdown apart from Dom0 but still greyed out. Doesn't look like its possible to clone sys-net -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/14a85b62-22d2-455e-b010-eab191f5ded1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: DOS VM - Spinrite - Direct Access to Drives
On Thursday, January 12, 2017 at 4:51:44 PM UTC+4, Steve wrote: > I would like to be able to run Spinrite which runs in DR-DOS in a VM. The > software needs to have direct access to the SATA hard drives. Is this likely > to be possible I have been researching and to make this work I need to be able to setup the equivalent of a RAW DISK (Virtual Box). Initial research shows that this might be possible in Xen, does that mean I will be able to do it in Qubes ? thx -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/24c65f25-7e64-4837-9bf3-42bf6fc263ee%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Windows 7 VM - Direct access to Hard Drives to flash SSD firmware
On Friday, January 13, 2017 at 7:15:41 AM UTC+4, tai...@gmx.com wrote: > On 01/12/2017 07:52 AM, Steve wrote: > > > I need to run Samsung Magician software in Windows to flash the firmware of > > the SSD's I put in the laptop, is there any special way I need to setup the > > Windows VM to give direct access to the firmware > > > You would have to attach to the VM with IOMMU the storage controller > that the drive is connected to, > > Obviously you can't do that if you are also using this controller for > your OS, without some ramdisk magic which is possible with some effort > but if you have the money it would be cheaper to simply buy an > Expresscard controller that supports SATA (fyi SAS almost always > includes SATA) > > In the future don't buy crappy consumer level devices that only provide > a windows flashing utility. Thank you for the ExpressCard suggestion, that is possible. I also have two internal mSata slots and will check whether they are on a different controller than the main SATA -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3d8e2a25-4adb-4f13-9684-2e2fc2d0b04d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: KDE - Cube desktop query
On Friday, January 13, 2017 at 7:58:04 AM UTC+4, Steve wrote: > On Friday, January 13, 2017 at 7:28:31 AM UTC+4, tai...@gmx.com wrote: > > On 01/12/2017 07:49 AM, Steve wrote: > > > > > On Thursday, January 12, 2017 at 2:15:57 PM UTC+4, Steve wrote: > > >> I have installed Qubes 3.2 and changed the desktop manager to KDE , > > >> specifically to get the Cube desktop. > > >> > > >> I have gone into the KDE settings and enabled the cube effect however I > > >> can;t get it to appear, any suggestions > > >> > > >> thx > > > I am using an Nvidia graphics card , do I need to install the nvidia > > > graphics driver to get the "cube" to animate ? thx > > > > > You do if it isn't supported by nouveau 3D mode, most of the newer > > nvidia devices make open source drivers like nouveau impossible... > > > > Nvidia is a shitty company to buy from if you want stuff to work the > > first time and all the time, as they deliberately break linux features > > to try and force people to use windows or buy a card from their > > overpriced quadro line. > > I am fortunate to have a NVIDIA Quadro K5000M with 4 GB dedicated GDDR5 video > memory which is supported by SuSE Linux Enterprise Desktop 11 & Red Hat > Enterprise Linux 6.x so I'm assuming I can get drivers that work with Qubes > (Fedora). > > I did lspci and found that I am running VGA compatible controller: NVIDIA > Corporation GK104GLM (Quadro K5000M) > > Do I need to change this driver to get the KDE Cube working ? I should have researched more before posting ! I have now found out that the Nouveau drivers do not support this particular Nvidia card. I did however, find a specific NVIDIA driver that does and I guess provides the necessary 3D capability. I will research how to install in Qubes and report back at some point -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7850325d-44c6-4fb2-8dd3-0ccce3de26c5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: KDE - Cube desktop query
On Friday, January 13, 2017 at 7:28:31 AM UTC+4, tai...@gmx.com wrote: > On 01/12/2017 07:49 AM, Steve wrote: > > > On Thursday, January 12, 2017 at 2:15:57 PM UTC+4, Steve wrote: > >> I have installed Qubes 3.2 and changed the desktop manager to KDE , > >> specifically to get the Cube desktop. > >> > >> I have gone into the KDE settings and enabled the cube effect however I > >> can;t get it to appear, any suggestions > >> > >> thx > > I am using an Nvidia graphics card , do I need to install the nvidia > > graphics driver to get the "cube" to animate ? thx > > > You do if it isn't supported by nouveau 3D mode, most of the newer > nvidia devices make open source drivers like nouveau impossible... > > Nvidia is a shitty company to buy from if you want stuff to work the > first time and all the time, as they deliberately break linux features > to try and force people to use windows or buy a card from their > overpriced quadro line. I am fortunate to have a NVIDIA Quadro K5000M with 4 GB dedicated GDDR5 video memory which is supported by SuSE Linux Enterprise Desktop 11 & Red Hat Enterprise Linux 6.x so I'm assuming I can get drivers that work with Qubes (Fedora). I did lspci and found that I am running VGA compatible controller: NVIDIA Corporation GK104GLM (Quadro K5000M) Do I need to change this driver to get the KDE Cube working ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/19e53840-866f-4072-9f82-1cf438ee9fea%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: KDE - Cube desktop query
On 01/12/2017 07:49 AM, Steve wrote: On Thursday, January 12, 2017 at 2:15:57 PM UTC+4, Steve wrote: I have installed Qubes 3.2 and changed the desktop manager to KDE , specifically to get the Cube desktop. I have gone into the KDE settings and enabled the cube effect however I can;t get it to appear, any suggestions thx I am using an Nvidia graphics card , do I need to install the nvidia graphics driver to get the "cube" to animate ? thx You do if it isn't supported by nouveau 3D mode, most of the newer nvidia devices make open source drivers like nouveau impossible... Nvidia is a shitty company to buy from if you want stuff to work the first time and all the time, as they deliberately break linux features to try and force people to use windows or buy a card from their overpriced quadro line. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c576dc02-4f80-d5a0-51ff-0eed7f5fc690%40gmx.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Setup for Graphic Design work / Failing to configure a PCI pasthrough on Archlinux
On 01/12/2017 06:50 AM, joseph.yeng...@gmail.com wrote: Have you ran the HCL tools? No, where do can I find it? I comes installed with Qubes 3.2? I went through the system requirements and recommendations (https://www.qubes-os.org/doc/system-requirements/), they all check. ok open a terminal in dom0 and type qubes-hcl-report press enter and then paste the result after maybe removing any serial numbers if you don't like to share them. Does your chipset support IOMMU? (inspiron is a garbage consumer level device so probably not) Yes, It's compatible with Intel VT-d. I believe that's it for IOMMU... or am I missing something? Maybe the chipset theoretically is but your laptop? you still have not ran the HCL nor checked the bios to see if IOMMU is supported (intel calls it VT-d) Consumer level computers don't bother to properly implement this 99% of the time. Graphics device assignment is an experimental feature, it doesn't work all of the time and you can only (easily) assign a secondary graphics device that isn't in use. I assume you tried to assign your primary video adapter... It will only work with HVM. So you suggest that I assign the GPU to an HVM version of Archlinux instead of an AppVM version of it? Yeah you can try, but maybe you would have better luck not using qubes for this. Either way you must look up a tutorial "iommu vt-d graphics qubes xen", it isn't plug and play just yet so you have to configure some obscure options. If you want more than one video device on a laptop you can try an external pci-e device, they connect via various interfaces including expresscard. Assigning a USB controller (all of it) doesn't involve emulation, any usb device will work as long as the guest supports it just like on bare metal. I play the latest games in a virtual machine with an attached graphics card on QEMU, I will be happy to help if you have any further questions Then I must thank you for your patience, because I don't think I got this part. XD How would this PCI-e and expresscard business be helpful? If Assigning a USB controller doesn't involve emulation, does it mean that it shouldn't cause any problems when assigning it to the Archlinux appVM? Because if I only assign the USB controller to the Archlinux AppVM, it still locks any new initialization of VMs. How would I go about using QEMU to run Adobe CC software? You are assigning the controller that is in use for your hypervisor, it doesn't let you do this because either it is already assigned to a usb-VM or as a built in safety feature to prevent you from locking yourself out of controlling the hypervisor. You can only assign secondary devices without significant effort. You can't assign a primary video device without pain, so getting an external expresscard to pci-e slot would let you pop in another graphics device and assign that instead. There are many tutorials as to how to do that, maybe google "kvm qemu gaming" It is what you should do if you want this and it is more secure than bare metal or emulation if you follow the above. Using it with qubes is difficult but some users have reported success, maybe better to use another distro with xen or qemu if you want this. Where were these successes reported? If you google "qubes vt-d graphics" you can find them. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aa1aa0c2-92dd-68a0-c085-5447993dcc33%40gmx.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Windows 7 VM - Direct access to Hard Drives to flash SSD firmware
On 01/12/2017 07:52 AM, Steve wrote: I need to run Samsung Magician software in Windows to flash the firmware of the SSD's I put in the laptop, is there any special way I need to setup the Windows VM to give direct access to the firmware You would have to attach to the VM with IOMMU the storage controller that the drive is connected to, Obviously you can't do that if you are also using this controller for your OS, without some ramdisk magic which is possible with some effort but if you have the money it would be cheaper to simply buy an Expresscard controller that supports SATA (fyi SAS almost always includes SATA) In the future don't buy crappy consumer level devices that only provide a windows flashing utility. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a4f62006-d518-e9ee-05c5-11de8bc37569%40gmx.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: VM chaining visualisation tool
On Friday, 13 January 2017 09:58:45 UTC+11, Andrew wrote: > Jean-Philippe Ouellet: > > See this thread: > > https://groups.google.com/forum/#!topic/qubes-devel/64-WJIMY18A > > > > Implementation linked in last post: > > https://gist.github.com/Zrubi/6229d5400bde987b1aa8da516553b909 > > > > Render result w/ graphviz. > > > > See also this script I wrote: > https://github.com/kbrn/qubes-app-print-vm-status > > Screenshot on my current system attached (with some redactions, of course). > > Andrew Hi Andrew, Nice little script. Any chance you can give it option to set the colour as text colour instead of background colour? Very hard on the eyes with coloured background. I think that coloured text would be more beneficial, but that's just my personal opinion, but it would be nice. Sincerely, Drew. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/23fcd834-e143-407a-8f0d-c0cba0076741%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] New Lenovo laptops: X1 (4th Gen), T460/p, and T560
sbore...@gmail.com wrote: > Thus, is there a (documented) way to add a newer kernel to the 3.2 install > image? I'd rather avoid taking the SSD out and install qubes in my older > machine. > > Thanks in advance, > > Stefan For booting the install or for being installed? I expect that changing the kernel being used during the install should be as simple as replacing the isolinux/vmlinuz* / EFI/BOOT/vmlinuz plus initrd in the install media. Changing the kernel that is getting installed may be harder, although it can surely be inserted into Packages/ but anyway you could drop the right file into the boot partition just until you get to install it correctly. Make sure you only replace them with a trusted binary, though. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1484264579.1203.10.camel%4016bits.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Query - Why unable to clone net-sys VM ?
Steve wrote: > my default net-sys includes both Ethernet and Wifi. I wanted to split them > out into > net-sys-eth and > net-sys-wifi > > each with the appropriate PCI device. I tried to clone the net-sys but it is > greyed out and I was wondering why > Probably because it is running. Stop the VM before attempting to clone it. Also, you will need to remove one of the pci devices while it is stopped, as those cannot be edited while it is running (nor can you attach the same pci to two VMs). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1484263774.1203.6.camel%4016bits.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] DispVM does not work anymore
mittend...@digitrace.de wrote: > Hey there, > > today I noticed that my dispVM is no longer working (not in Dom0 and not > in AppVMs). There is the notification that the DispVM starts, but > nothing shows up. > If I start the internal fedora-23-dvm I boots up without any problems > and also allows me to start tools (e.g. Firefox) > > any idea what is wrong? > > Thanks I suspect you too may be suffering https://github.com/QubesOS/qubes-issues/issues/2182 Look at /var/log/libvirt/libxl/libxl-driver.log and see if there is a line like xc: error: X86_PV_VCPU_MSRS record truncated: length 8, min 9: Internal error The reason that directly booting the dvn works is that the problem lies in restoring the savefile (and the buggy creation of it). There are some patches fixing it, but you would need to recompile xen :/ Best regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1484263628.1203.4.camel%4016bits.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Windows 7 VM - Direct access to Hard Drives to flash SSD firmware
Steve wrote > I need to run Samsung Magician software in Windows to flash the firmware of > the SSD's I put in the laptop, is there any special way I need to setup the > Windows VM to give direct access to the firmware > I don't think that is going to work at all. If you really need to do that, I would install Windows 7 in a different partition/disk, boot from that, and flash the firmware from there. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1484263410.1203.1.camel%4016bits.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: VM chaining visualisation tool
Jean-Philippe Ouellet: > See this thread: > https://groups.google.com/forum/#!topic/qubes-devel/64-WJIMY18A > > Implementation linked in last post: > https://gist.github.com/Zrubi/6229d5400bde987b1aa8da516553b909 > > Render result w/ graphviz. > See also this script I wrote: https://github.com/kbrn/qubes-app-print-vm-status Screenshot on my current system attached (with some redactions, of course). Andrew -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d7cf3001-1882-a371-9ef1-69ae735ca670%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Use an remote PULSE Audio server
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Jan 09, 2017 at 10:11:18AM +0100, Robert Mittendorf wrote: > Hey fellow Qubes-Users, > > I want to use an remote PULSE audio server to playback sound output. The > server side is up & running. The connecting AppVM is based on the > debian-8 template > > Standard auto-discover does not work, probably because the AppVM tries > to locate the remote server in the virtual internal networks of my Qubes OS. > I tried to use a tunnel in /etc/pulse/default.pa: > load-module module-tunnel-sink-new server=%SERVER_IP% sink_name=Remote > channels=2 rate=44100 > > I noticed that Qubes itself uses PULSE audio. > When I boot a VM, there is a Qubes VSINK device, but no tunnel. > If I restart PULSE audio > pulseaudio -k > pulseaudio --start > that device is gone, but the tunnel is shown. > > Even though the tunnel is shown, I cannot playback sound using it. This is probably some network related problem. Check pulseaudio logs (probably just `journalctl`). > I would like to have both devices (Qubes VSINK and the remote PULSE > server) to choose from in pavucontrol > > Questions > 1) What does Qubes do in order to show/connect to the VSINK? Is there a > different config file which is loaded when an AppVM boots? Yes, the default pulseaudio instance is started with /etc/pulse/qubes-default.pa as config. It's done with this script: start-pulseaudio-with-vchan > 2) Is a tunnel the right/best option to connect to the remote PULSE > audio server? I haven't used that module, but I think you can try to load it dynamically using pactl, instead of restarting pulseaudio with modified config. > 3) Is it a bug that a restart of pulseaudio does remove/not reconnect to > Qubes VSINK? Depends on what you want to accomplish ;) - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYeAhDAAoJENuP0xzK19csLI0H/A+0EZJml4OeTOEf9isHMvMe Co26GY6PaNcrSOQeGK62DB/A82XvlJFetAAQGyEQKfABZC0nFazmzD1U+gxcH9BW idKtt/TXvcqcYlhGjoh2bj/BZv8WYiYVXyt02ikRy8qjKOSOozy8A1lSirBEbSsi GlRDPV6kgAt8OzjojOesloqmZ3N4aiDrif6TpsNhJ3l1UIfI+LA+r5HODWza9SYD hjEjNlqwpnTNQT/niolJR9z2pnu21vw8OmZcXfFqMJtTivXxLNbGqBqgronQS2oW aqgtbnMZA1NpqmUr2XwNemk4LHi+YVR6Exhg29nO/uKoBR7F1/qArubrc48W0gk= =bIzY -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170112225043.GB17864%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Resolution Issues In Qubes
I'm new to Qubes so please forgive me if I'm asking an obvious question. I finished installing Qubes 3.1 to an external hard disk and am having a difficult time getting Qubes to run at 1920x1080. Currently the only options I have are 1024X768. From my research in the backlogs of the mailing list I'm thinking it might be a driver issue. I have an AMD R9 380 installed and no integrated gpu to fall back on. I've seen lots in the back logs about installing NVIDIA drivers but not so much on AMD. I'd appreciate any tips anyone has for me. Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fd10d777-a095-4235-8996-397c566caf3a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Use an remote PULSE Audio server
On 01/12/2017 11:56 AM, Robert Mittendorf wrote: > I do not define the sink parameter, maybe that is the problem? > I expect that "sink" is the local name of the sink at the server? > how is thet defined in /etc/oulse/default.pa on server side? It is not defined on the server side at all. But you need to load the 'module-native-protocol-tcp' module on the server side. Also on the server, you can list your existing sinks like this and get the name to specify on the client side: $ pactl list sinks My Bluetooth speaker is added there automatically whenever I turn it on. Kind Regards, Torsten -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/92286276-405f-9135-9f7f-73963dad5dfe%40grobox.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Bad GPG sig on R3.2 release
Okay, nevermind, I got it verified from the command line. Thanks guys! I am using GPG Tools for Mac, and I think its "Verify" command from the Finder context menu tried to parse the digests file as a list of signatures - the output looks like it was verifying the ISO, not the digests file itself. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/87c1f7a0-0390-4c71-b0b5-970acdc7048b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: IPv6 connectivity and qubes proxy VM
On Thursday, January 12, 2017 at 6:47:00 PM UTC+3, daltong defourne wrote: > Hi! > I've created a VPN proxyvm (debian-8 based) according to existing > documentation (more or less - I'm using the VPN provider's standalone client > because, in a VM, why not?) > > For IPv4 it works flawlessly. > > For IPv6 it does not work at all for the VMs "behind" the proxyvm (VPN's IPv6 > support works for a browser launched within proxyvm itself, but any VM behind > the proxyvm can only use IPv4) > > what's up? > Can it be helped? Found this commit. https://github.com/marmarek/qubes-core-agent-linux/commit/789eb511266d9e8bd812e40f952ec2bce6d7a414 Managed to activate the qubes-ipv6 service (worked!) on the appvm, the firewallvm before the proxyvm, and the proxyvm. No budge, IPv6 still missing in action :( -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/90c3fd3a-673d-43f2-8451-f8ad1655e927%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Prob installing VLC in Fedora24 Template
When I try to install vlc als described in the faq and elsewhere I get this error: Downloading Packages: (1/60): aalib-libs-1.4.0-0.29.rc5.fc24.x86_64.r 126 kB/s | 70 kB 00:00 [MIRROR] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: Interrupted by header callback: Server reports Content-Length: 15400 but expected size is: 1605926 [FAILED] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: No more mirrors to try - All mirrors were already tried without success (3-4/60): libcaca-0. 5% [= ] 708 kB/s | 1.6 MB 00:37 ETA The downloaded packages were saved in cache until the next successful transaction. You can remove cached packages by executing 'dnf clean packages'. Error: Error downloading packages: Cannot download vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: All mirrors were tried I tried it several times and got always the same error. Procedure: sudo dnf upgrade --refresh sudo dnf install vlc Any advice? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/091aaec2-4600-4954-bc45-1ec3c57acae8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Marek Marczykowski-Górecki: > Rusty, Matt rightly just pointed out to Qubes Security Team that the > current behaviour of AEM could be misleading. AEM should refuse to work > if TXT isn't really working - otherwise it's easy to not notice it and > have false sense of security. Thanks for CCing, I agree: https://github.com/QubesOS/qubes-issues/issues/2569#issuecomment-272235227 Rusty -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJYd8SQXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfU80P/i2VfKaxLVONuk+Btmfc3WfN f+SrUZIPPzclrPpCb3k0SiEnYbkJBI+9Ece+jWRpyUJNVFVayy0RJ3lW+JS9FNOk dorBfJvJ4IoE7CYulsW/2qvPbmHf6FqzSoAyZ29KKWa1X1lR26kUMA/3ZmTJTdRy c3qWXjnbIhfXoutqfSs2Nb1sEI8M46hsTUR8ESiIjVYnjBdRmO6jogiGBiy7zQ4w pmH3djALJVrj4lpAOm5AEgkHmkoYcxlVOkTJKEqCIm7kdLuQiiLshJWU5HkjVFOV cY6sUgyjJAqnvuGNbVrpKaP96RpE1yKtd00777DnbkWsTYlDjtSEiwC3KhEzN/So Ga82zeHHicC1j76v0UbOlaFtdIo3rZk1mvzhoL3mVT3oWZkN+IbznwtFNnwbqJip 798+Ki+283ZxFz99Cj9y7nq/qTGGgP2qZ8imTBtt9LaOipgkgqdCzom85VqHFYTA 2ZivgY3fFLoJEys7nie5XPZcMWQ1pD5f6qp81aVNpU6L0X2iFTuCOS9DH76jd0BJ HOq4lSfQfbZHco9/U87REipB5EWmoi5UN+NPqkemSyTkDXum4OMa7bEPvzwQbyUm xyCzIO6/u3GT3mwJQ/kNa/+/ya1+CJlG8obd239AEk/6jIdkCwbAJ7HeEaw0KqGq MlnIDTcfDmiL94iZRsIN =SA4W -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170112180152.GA1242%40mutt. For more options, visit https://groups.google.com/d/optout.
[qubes-users] IPv6 connectivity and qubes proxy VM
Hi! I've created a VPN proxyvm (debian-8 based) according to existing documentation (more or less - I'm using the VPN provider's standalone client because, in a VM, why not?) For IPv4 it works flawlessly. For IPv6 it does not work at all for the VMs "behind" the proxyvm (VPN's IPv6 support works for a browser launched within proxyvm itself, but any VM behind the proxyvm can only use IPv4) what's up? Can it be helped? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5733982e-d4da-41a7-ae3a-fce858b0d47f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?
To the original point of this thread (figuring out /why/ the measured boot isn't working): The way I found to do this is to configure tboot to log to the screen by setting (for example) "logging=vga vga_delay=10" on the "multiboot /tboot.gz" line in grub.cfg. The Qubes default setting is "logging=memory,serial", but I don't have a serial console on hand and I couldn't find an obvious way to retrieve the "logging=memory" data from within Qubes. (The "txt-stat" tool doesn't show anything; possibly it would work if I were booting Linux without Xen.) The relevant part of the log for my Lenovo ThinkPad L430: ... TBOOT: IA32_FEATURE_CONTROL_MSR: 0005 TBOOT: CPU is SMX_capable TBOOT: ERR: SENTER disabled by feature control MSR (5) TBOOT: SMX not supported. ... Matt -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1484235497.1680.11.camel%40mattmccutchen.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?
On 01/12/2017 03:51 PM, Matt McCutchen wrote: > On Thu, 2017-01-12 at 13:42 +0100, Marek Marczykowski-Górecki wrote: >> On Thu, Dec 01, 2016 at 04:32:50PM +0100, Swâmi Petaramesh wrote: >>> Hi Rusty Bird, and thanks for your help, >>> >>> Please see below. >>> Is the SINIT module working? Run the "find" command from step 2b of /usr/share/doc/anti-evil-maid/README, but look at the lines for PCRs 17, 18, and 19 instead: They should have very random-looking values. >>> Uh... Lines 17-19 are all FF >>> >>> On my system : >>> > PCR-00 to 07 look random > PCR-08 to 12 are all 00 > PCR-13looks random > PCR-14 to 16 are all 00 > PCR-17 to 22 are all FF > PCR-23are all 00 >>> So the problem seems to be there... But I don't know what to do with >>> this (I know almost nothing about TPM...) >> Rusty, Matt rightly just pointed out to Qubes Security Team that the >> current behaviour of AEM could be misleading. AEM should refuse to work >> if TXT isn't really working - otherwise it's easy to not notice it and >> have false sense of security. > Thanks marmarek for pointing me to the existing thread. My search was > not good enough. :( > > I filed https://github.com/QubesOS/qubes-issues/issues/2569 to help > make sure we don't forget about this. > > Matt Hi Matt, Marek and all, Thanks for coming back on this. I have personally uninstalled AEM from both of my HP systems as I realized it wasn't actually working AND anyway gave me this false sense of security - plus the fact that installing an SSD cache on one of the machines broke it completely dead (AEM exiting to initramfs, complaining that it found the root fs "unexpectedly unencrypted"). For the record, it is broken on : - HP EliteBook 820 G1 (Intel 4th gen Core i5) - HP Probook 6470B 5 (Intel 3rd gen Core i5) ...Both using the correct SINIT module as far as I can tell. ...Both showing the symptoms described above (PCR-17 to 22 staying desperately FF) Also, I understood (at least I think I understood...) from tboot documentation (which I believe AEM uses) that it works only for systems that have iommu, which is the case for my HP EliteBook 820 but apparently not for my Probook 6470B (too bad I bought this machine with the idea of using it in the future with Qubes 4.0, but it seems it won't be compatible). Currently AEM doesn't complain if iommu is unavailable. tboot README advises to boot Xen with "iommu=required", but AEM seems not to set this up this way... Best regards. ॐ -- Swâmi Petaramesh PGP 9076E32E -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b4b6c557-824c-b1a6-318f-90f944803819%40petaramesh.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Query - Why unable to clone net-sys VM ?
my default net-sys includes both Ethernet and Wifi. I wanted to split them out into net-sys-eth and net-sys-wifi each with the appropriate PCI device. I tried to clone the net-sys but it is greyed out and I was wondering why -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1c4b717f-397d-4fd6-918a-5a3d1d850ebd%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Installing using pacman command
On Thursday, January 12, 2017 at 2:18:08 PM UTC, tezeb wrote: > On 01/12/17 15:14, joseph.yeng...@gmail.com wrote: > > I forgot to add, but I've modified the pacman.conf as specified in the > > Qubes documentation for the creation of an Archlinux Template VM. > > > > Are you running it in TemplateVM or AppVM? > Do you allow it to connect via update proxy? (Firewall Rules->Allow > connection to Updates Proxy)? Template VM. Yes. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c19401c4-0015-4593-88ee-7c200481325f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?
On Thu, 2017-01-12 at 13:42 +0100, Marek Marczykowski-Górecki wrote: > On Thu, Dec 01, 2016 at 04:32:50PM +0100, Swâmi Petaramesh wrote: > > Hi Rusty Bird, and thanks for your help, > > > > Please see below. > > > > > > > > Is the SINIT module working? Run the "find" command from step 2b of > > > /usr/share/doc/anti-evil-maid/README, but look at the lines for PCRs > > > 17, 18, and 19 instead: They should have very random-looking values. > > > > Uh... Lines 17-19 are all FF > > > > On my system : > > > > > > PCR-00 to 07look random > > > > PCR-08 to 12are all 00 > > > > PCR-13 looks random > > > > PCR-14 to 16are all 00 > > > > PCR-17 to 22are all FF > > > > PCR-23 are all 00 > > > > So the problem seems to be there... But I don't know what to do with > > this (I know almost nothing about TPM...) > > Rusty, Matt rightly just pointed out to Qubes Security Team that the > current behaviour of AEM could be misleading. AEM should refuse to work > if TXT isn't really working - otherwise it's easy to not notice it and > have false sense of security. Thanks marmarek for pointing me to the existing thread. My search was not good enough. :( I filed https://github.com/QubesOS/qubes-issues/issues/2569 to help make sure we don't forget about this. Matt -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1484232704.1680.6.camel%40mattmccutchen.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Installing using pacman command
Temporarily disabled the firework. Different error: :: Synchronizing package databases... core is up to date extra is up to date community is up to date multilib is up to date :: Starting full system upgrade... resolving dependencies... :: There are 4 providers available for lib32-libgl: :: Repository multilib 1) lib32-mesa-libgl 2) lib32-nvidia-304xx-libgl 3) lib32-nvidia-340xx-libgl 4) lib32-nvidia-libgl Enter a number (default=1): 1 looking for conflicting packages... :: xorg-server and xf86-input-joystick are in conflict (X-ABI-XINPUT_VERSION). Remove xf86-input-joystick? [y/N] y error: failed to prepare transaction (could not satisfy dependencies) :: qubes-vm-gui: installing xorg-server (1.19.1-1) breaks dependency 'xorg-server<1.19.0' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8868a414-7464-448e-84d2-8afad19dd924%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Installing using pacman command
On 01/12/17 15:14, joseph.yeng...@gmail.com wrote: > I forgot to add, but I've modified the pacman.conf as specified in the Qubes > documentation for the creation of an Archlinux Template VM. > Are you running it in TemplateVM or AppVM? Do you allow it to connect via update proxy? (Firewall Rules->Allow connection to Updates Proxy)? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/613d1e9e-0616-3e53-d41d-a21e33bca924%40outoftheblue.pl. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
[qubes-users] Re: Installing using pacman command
I forgot to add, but I've modified the pacman.conf as specified in the Qubes documentation for the creation of an Archlinux Template VM. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0b1f06c2-a68c-40c3-ad39-76c20fe8758e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] DispVM does not work anymore
Hey there, today I noticed that my dispVM is no longer working (not in Dom0 and not in AppVMs). There is the notification that the DispVM starts, but nothing shows up. If I start the internal fedora-23-dvm I boots up without any problems and also allows me to start tools (e.g. Firefox) any idea what is wrong? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0b05594d-f20f-e818-1827-ed2f378f9d37%40digitrace.de. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Use an remote PULSE Audio server
Am 01/12/2017 um 02:25 PM schrieb Torsten Grote: > On 01/12/2017 08:37 AM, Robert Mittendorf wrote: >> Now I have the tunnel enabled when I start the AppVM - but it is still >> not working (the "current volume" bar right above the greyed-out >> "Advanced" is missing for the tunnel as well.. > That's strange it is working for me. > > This is what I have in my rc.local: > > echo "load-module module-tunnel-sink-new server=192.168.1.2 > sink_name=Test sink=bluez_sink.XX_XX_XX_XX_XX_XX" >> > /etc/pulse/qubes-default.pa > > However, the issue I have is that this sink disappears from time to time > which might be related to the fact that this Bluetooth speaker is not > always on. Suggestions on how to automatically re-add the sink in that > case are welcome. > > Kind Regards, > Torsten > I do not define the sink parameter, maybe that is the problem? I expect that "sink" is the local name of the sink at the server? how is thet defined in /etc/oulse/default.pa on server side? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f2a89bb2-a7f0-4cdc-791a-10f48cb08b28%40digitrace.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Installing using pacman command
While trying to use an installation command like, say, localhost% sudo pacman -Syu wine I get the following response: error: GPGME error: No data error: xyne-x86_64: missing required signature :: Synchronizing package databases... core is up to date extra is up to date community is up to date multilib is up to date error: failed retrieving file 'xyne-x86_64.db' from xyne.archlinux.ca : Operation too slow. Less than 1 bytes/sec transferred the last 10 seconds error: failed to update xyne-x86_64 (download library error) error: database 'xyne-x86_64' is not valid (invalid or corrupted database (PGP signature)) How do I get to make installations on Archlinux? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e81e3ea9-adc7-4008-b7f9-956add56ecd9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Use an remote PULSE Audio server
On 01/12/2017 08:37 AM, Robert Mittendorf wrote: > Now I have the tunnel enabled when I start the AppVM - but it is still > not working (the "current volume" bar right above the greyed-out > "Advanced" is missing for the tunnel as well.. That's strange it is working for me. This is what I have in my rc.local: echo "load-module module-tunnel-sink-new server=192.168.1.2 sink_name=Test sink=bluez_sink.XX_XX_XX_XX_XX_XX" >> /etc/pulse/qubes-default.pa However, the issue I have is that this sink disappears from time to time which might be related to the fact that this Bluetooth speaker is not always on. Suggestions on how to automatically re-add the sink in that case are welcome. Kind Regards, Torsten -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/79cb09af-27ac-66bc-c06b-8d0ff40181a8%40grobox.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Windows 7 VM - Direct access to Hard Drives to flash SSD firmware
I need to run Samsung Magician software in Windows to flash the firmware of the SSD's I put in the laptop, is there any special way I need to setup the Windows VM to give direct access to the firmware -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f2a1b0c0-672f-46fe-95d3-fa9d08b706d8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] DOS VM - Spinrite - Direct Access to Drives
I would like to be able to run Spinrite which runs in DR-DOS in a VM. The software needs to have direct access to the SATA hard drives. Is this likely to be possible -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ebf10873-4e43-4975-aed9-7502f65b5ee8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: KDE - Cube desktop query
On Thursday, January 12, 2017 at 2:15:57 PM UTC+4, Steve wrote: > I have installed Qubes 3.2 and changed the desktop manager to KDE , > specifically to get the Cube desktop. > > I have gone into the KDE settings and enabled the cube effect however I can;t > get it to appear, any suggestions > > thx I am using an Nvidia graphics card , do I need to install the nvidia graphics driver to get the "cube" to animate ? thx -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a299bb21-c6d8-4cf1-a2c9-f28b97d899d1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Dec 01, 2016 at 04:32:50PM +0100, Swâmi Petaramesh wrote: > Hi Rusty Bird, and thanks for your help, > > Please see below. > > > > > Is the SINIT module working? Run the "find" command from step 2b of > > /usr/share/doc/anti-evil-maid/README, but look at the lines for PCRs > > 17, 18, and 19 instead: They should have very random-looking values. > > Uh... Lines 17-19 are all FF > > On my system : > > PCR-00 to 07 look random > PCR-08 to 12 are all 00 > PCR-13looks random > PCR-14 to 16 are all 00 > PCR-17 to 22 are all FF > PCR-23are all 00 > > So the problem seems to be there... But I don't know what to do with > this (I know almost nothing about TPM...) Rusty, Matt rightly just pointed out to Qubes Security Team that the current behaviour of AEM could be misleading. AEM should refuse to work if TXT isn't really working - otherwise it's easy to not notice it and have false sense of security. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYd3nBAAoJENuP0xzK19csxfYH/AngaxY7yDmLXBc8sZufHjg4 lv3nM1otgcQmYxzvIyWDut0qbpLLhmqnQ4StntS/ajesdzFZnKghS0LyJmNjAG/9 hiyfNGYMEml738SCaNujCq2c75ZLi3SFELtPqk4TT4pSJ4rGXX39d2rcnQxs4pGy xYpkUcWSnLQKQXnkWKphkzAx4IpsaVwtgntVpLYDJ2J0owp4BbtoyBFfDztvEICU Hp0+r5wUtP8XuuQ6SB3+OqvOeymsgp6SRQln8LsLChQApxk1wC7XiNx3k6rN/nYa wbo2kI0Plir7SSnYXCNmwyR3S3O45AVxQSMphDHUUw6bC0o+xk3Z6+K6WaAGObk= =NzFB -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170112124241.GA17864%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Setup for Graphic Design work / Failing to configure a PCI pasthrough on Archlinux
> Have you ran the HCL tools? No, where do can I find it? I comes installed with Qubes 3.2? I went through the system requirements and recommendations (https://www.qubes-os.org/doc/system-requirements/), they all check. > Does your chipset support IOMMU? (inspiron > is a garbage consumer level device so probably not) Yes, It's compatible with Intel VT-d. I believe that's it for IOMMU... or am I missing something? > Graphics device assignment is an experimental feature, it doesn't work > all of the time and you can only (easily) assign a secondary graphics > device that isn't in use. I assume you tried to assign your primary > video adapter... > It will only work with HVM. So you suggest that I assign the GPU to an HVM version of Archlinux instead of an AppVM version of it? > If you want more than one video device on a laptop you can try an > external pci-e device, they connect via various interfaces including > expresscard. > > Assigning a USB controller (all of it) doesn't involve emulation, any > usb device will work as long as the guest supports it just like on bare > metal. > > I play the latest games in a virtual machine with an attached graphics > card on QEMU, I will be happy to help if you have any further questions Then I must thank you for your patience, because I don't think I got this part. XD How would this PCI-e and expresscard business be helpful? If Assigning a USB controller doesn't involve emulation, does it mean that it shouldn't cause any problems when assigning it to the Archlinux appVM? Because if I only assign the USB controller to the Archlinux AppVM, it still locks any new initialization of VMs. How would I go about using QEMU to run Adobe CC software? > It is what you should do if you want this and it is more secure than > bare metal or emulation if you follow the above. > > Using it with qubes is difficult but some users have reported success, > maybe better to use another distro with xen or qemu if you want this. Where were these successes reported? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cf431fb1-a9ed-4c50-8443-d3800e429550%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] New Lenovo laptops: X1 (4th Gen), T460/p, and T560
I somehow overlooked this discussion before ordering a new laptop; thus, I am stuck with a Lenovo T560 which reboots immediately/endlessly when trying to install. Thus, is there a (documented) way to add a newer kernel to the 3.2 install image? I'd rather avoid taking the SSD out and install qubes in my older machine. Thanks in advance, Stefan [Curiously, I could install debian jessie with a 3.16 kernel (obviously no Xen!) without problems and aside from wireless networking everythings seems to work out of the box] Am Dienstag, 27. Dezember 2016 00:13:12 UTC+1 schrieb Marek Marczykowski-Górecki: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Mon, Dec 26, 2016 at 08:29:55PM +0100, 'Olivier Médoc' via qubes-users > wrote: > > Maybe, Qubes installer bootloader could support both stable and unstable > > kernels, in order to support new hardware ? > > I'd wait for the next longterm support kernel, then maybe release > updated installation disk with it. > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJYYaPoAAoJENuP0xzK19csvZMH/R16udTk/sYcGotx1OK+GOHt > y1mmDYBkTHJ3Moapd/AAoBuSlZolz9FuYst5XwPx5paWgVj9vFeuvfd+ZmHozUin > xnwD47XAh56AEycdbm4BK54NtOPZ9xohK018R/29s/RhAvZsWiMCu4a1k6FXbP4X > iArEfOGraZmJ95MF23VM2jnaPORaNXkMhUhydDYsS44lku4SefddpxCsIIbK6H7R > YXCibjXF8BgZmyZFK0IZUxJjpeNpKorD2uDd1j5hIM3zAnKUUZHRIQ4OiWUBIL7y > WPNYMRRnssnb3gycCw3bWXQD91pQjyX8YpOmRylhRKbVHUv3nPSCvxpPzH2zJJA= > =Jw8Z > -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0c400967-b66c-497b-8ed7-a1e58f71aa08%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: VM chaining visualisation tool
See this thread: https://groups.google.com/forum/#!topic/qubes-devel/64-WJIMY18A Implementation linked in last post: https://gist.github.com/Zrubi/6229d5400bde987b1aa8da516553b909 Render result w/ graphviz. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABQWM_CviSygtoe9zG%2BQ%2BbXxetsuaTeBAjNW05bAN3SZsWZ6bQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Use an remote PULSE Audio server
Am 01/09/2017 um 02:51 PM schrieb Torsten Grote: > On 01/09/2017 07:15 AM, Robert Mittendorf wrote: >> I tried to use a tunnel in /etc/pulse/default.pa > I think this is the wrong config file. There should be a qubes.pa or > something like that. > > Kind Regards, > Torsten > Thank you, Torsten. In fact qubes uses a qubes-default.pa in the same directory. I think its a but that restarting PULSEaudio causes the use of the default.pa. Now I have the tunnel enabled when I start the AppVM - but it is still not working (the "current volume" bar right above the greyed-out "Advanced" is missing for the tunnel as well.. Any PULSEaudio expert here? thank you -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f6671594-381f-0869-ce91-78bbf0f066a9%40digitrace.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] KDE - Cube desktop query
I have installed Qubes 3.2 and changed the desktop manager to KDE , specifically to get the Cube desktop. I have gone into the KDE settings and enabled the cube effect however I can;t get it to appear, any suggestions thx -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a898d662-dbb7-4159-8575-4d7ce91d5c4f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Hp 8770W eliteBook laptop - looking very good
I am new to Qubes . I was looking for a suitable machine to install it on and found an old HP 8770W EliteBook I hadn't used for a while. Good news is that Qubes seems to have installed very nicely, I have HVM, IOMMU, HAP/SLAT and a detected TPM device. The machine is i7 with NVIDIA K5000M graphics card. I am happy to explore setting up TPM and testing the full features if someone can guide me. It looks like it might be the first laptop with a complete sweep of YES in the HCL matrix -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8ceebad0-f198-4d01-b491-cdfbbe7a4d22%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Oracle Template Advice Requested
Hello, I'm a three month newbie to qubes and am attempting to make an Oracle templateVM and various oracle-related AppVMs. The template would be of (possibly) solaris or oracle-linux as an environment for all Oracle applications such as oracle db 12.c, netbeans, sql developer, jdk, jre, etc. The appVMs would separate as like for SQL dev, java dev, db server, etc, on their own netVM. I want to do this both for personal use and learning on my 2.7GHz i7 8GB laptop for the proof-of-concept.. My hope is that an oracle os would come with proper repo/package signature enforcement while also providing a low-fuss and unifying environment for the various isolated appvms used for domain segregation between apps and server/client roles. I'm leaning towards an hvm template of either oracle-linux or solaris. My thought is that the template should be a minimally-maintained environment for oracle apps, and could be installed from either iso, an *.ovm conversion through qemu, or from an oracle repo. An obstacle I face is that my https connections to oracle servers are sometimes invalid for the ssl certificate. If I were to install to a fedora or debian template, I think that I would need to download/install the oracle packages from the browser while live on the template, breaking isolation. If I knew whether oracle's rpm repo was compatible to qubes (i.e. void of dependency conflicts to qubes packages and such), I could probably just add it to fedora template's dnf repo list, and try to figure out a white-list for oracle ip's.. but that somehow seems unclean.. should I not think that I won't want a server config on default template environments? would it be optimal However I'm curious about a few things, such as the cpu/mem or work flow costs for using a default templateVM or a clone vs a standaloneVM or hvm template... For example, I would be concerned that, if I were to keep an oracledb vm running as a server (using whatever qubes best-practice paradigm for this purpose), then the impact for developing against it and subsequently running queries from other various vms on that virtual network might make the machine unusable. Can anyone provide advise on why I should prefer one approach over the other for creating this oracle template? Thank you in advance! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0f682e16-7a5c-4916-b763-7ee55373edb0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: HCL - Dell XPS 15 9550
On Wednesday, January 11, 2017 at 10:34:22 PM UTC, John Doe wrote: > On Sunday, January 8, 2017 at 10:38:49 PM UTC, bbrr...@gmail.com wrote: > > In original configuration this laptop suffers from freeze on initial boot > > when the system attaches the broadcom wifi card to sys-net. To make > > progress needed to disable the wifi card in BIOS, install was then > > straightforward. > > > > Used an USB wifi for initial investigation/updates. Needed to assign the > > USB controller to the sys-net VM and allow non strict pci reset. > > ThenuUpgraded the fedora23 kernel to the version in unstable repository: > > > > Linux sys-net 4.8.12-12.pvops.qubes.x86_64 #1 SMP Sat Dec 3 19:12:54 UTC > > 2016 x86_64 x86_64 x86_64 GNU/Linux > > > > As there is only one USB controller on this board, this is not a great > > long-term solution. I then replaced the broadcom wifi card with an Intel > > 8265 which works very well with the 4.8 v kernel. Generally everything now > > seems to work well: suspend works, touchpad works well, screen dimming, > > attaching usb storage. No touchscreen on this model so can't comment on > > that. > > Did your 9550 not come with a Killer 1535? At least that's what is listed on > the product page, http://www.dell.com/uk/p/xps-15-9550-laptop/pd?ref=PD_OC No, it came with DW1830 which is a re-badge of Broadcom. It was bought in the first half of last year. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ec524cc1-c938-4f4b-9ceb-932028b07c72%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] bluetooth support in dom0
On Thursday, January 12, 2017 at 3:08:59 AM UTC-5, raah...@gmail.com wrote: > On Thursday, January 12, 2017 at 2:36:43 AM UTC-5, John Smith wrote: > > On Thursday, January 12, 2017 at 12:26:21 AM UTC-7, raah...@gmail.com wrote: > > > On Thursday, January 12, 2017 at 2:23:16 AM UTC-5, John Smith wrote: > > > > On Wednesday, March 12, 2014 at 4:40:16 PM UTC-6, danf...@gmail.com > > > > wrote: > > > > > > > > > > > > > I don't know much about the security side of things, but I'm > > > > > > > happy to > > > > > > > > > > > > > blindly ignore any "in my local neighbourhood" kind of attacks if > > > > > > > > > > > > > that was the only issue. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Why not use Windows then? Or Mac? :) > > > > > > > > > > Because they don't offer the other nice features such as the app > > > > > domains and disposable VMs. Which I assume would still help against > > > > > remote threats such as web browser exploits. > > > > > > > > > > > > > > > > > > Or should I be avoiding Qubes if I can't figure this stuff out > > > > > > > > > > > > > myself? ;) > > > > > > > > > > > > > > > > > > > > > > > > > > I'm just an amateur Linux user mildly interested in increased > > > > > > > > > > > > > security/privacy. > > > > > > > > > > > > > > > > > > > > > > > > > > Side musing: Have the developers considered allowing *optional* > > > > > > > > > > > > > support for things that have security issues, in the spirit of > > > > > > > > > > > > > compromise...? > > > > > > > > > > > > > > > > > > > > > > > > Qubes OS is an open platform, you can configure it however you like, > > > > > > > > > > > > disabling potentially all security feature, if you really want. The > > > > > > user > > > > > > > > > > > > is the ultimate boss. > > > > > > > > > > > > > > > > I should rephrase that as "easy to use", even GUI based, > > > > > configurability. Perhaps you aren't targeting such "novice" users. > > > > > > > > > > > > > > > > > > > > > > > For instance, I absolutely do choose convenience and > > > > > > > > > > > > > even necessity over security (to the tune of bluetooth, full > > > > > > > graphics > > > > > > > > > > > > > card support for game dev work), yet wouldn't there still be > > > > > > > > > > > > > something to be gained by using Qubes even with those security > > > > > > > holes? > > > > > > > > > > > > > When the choice is Qubes with these holes vs just any regular > > > > > > > Linux > > > > > > > > > > > > > distro. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Modern Windows and OSX offer a "reasonable compromise" of security, > > > > > > I heard. > > > > > > > > > > Haha! > > > > > > > > Any update regarding this? > > > > > > hahaha > > > > You manage to figure it out lol? > > I'm sorry i was laughing at Joanna's comments. Do you mean how to enable it > manually, or if Qubes is going to support it? I personally wouldn't want > bluetooth either man. > Maybe you hold your phone too close to it one day haha. Or someone uses some > booster outside your house to reach it who knows. i mean anything can > happen and taking over dom0 is game over. defeats the purpose of using Qubes > which tries to isolate hardware from dom0. > > It is recommended to use usb with a computer that has the Qubes hardware > requirements to be able to isolate the usb controllers from dom0. or at least isolate a controller to dom0 dedicated to only your mouse and keyboard. Just don't use wireless. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e2af9a2e-e791-4eb4-a206-576a0328d222%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] bluetooth support in dom0
On Thursday, January 12, 2017 at 2:36:43 AM UTC-5, John Smith wrote: > On Thursday, January 12, 2017 at 12:26:21 AM UTC-7, raah...@gmail.com wrote: > > On Thursday, January 12, 2017 at 2:23:16 AM UTC-5, John Smith wrote: > > > On Wednesday, March 12, 2014 at 4:40:16 PM UTC-6, danf...@gmail.com wrote: > > > > > > > > > > > I don't know much about the security side of things, but I'm happy > > > > > > to > > > > > > > > > > > blindly ignore any "in my local neighbourhood" kind of attacks if > > > > > > > > > > > that was the only issue. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Why not use Windows then? Or Mac? :) > > > > > > > > Because they don't offer the other nice features such as the app > > > > domains and disposable VMs. Which I assume would still help against > > > > remote threats such as web browser exploits. > > > > > > > > > > > > > > > Or should I be avoiding Qubes if I can't figure this stuff out > > > > > > > > > > > myself? ;) > > > > > > > > > > > > > > > > > > > > > > I'm just an amateur Linux user mildly interested in increased > > > > > > > > > > > security/privacy. > > > > > > > > > > > > > > > > > > > > > > Side musing: Have the developers considered allowing *optional* > > > > > > > > > > > support for things that have security issues, in the spirit of > > > > > > > > > > > compromise...? > > > > > > > > > > > > > > > > > > > > Qubes OS is an open platform, you can configure it however you like, > > > > > > > > > > disabling potentially all security feature, if you really want. The > > > > > user > > > > > > > > > > is the ultimate boss. > > > > > > > > > > > > > I should rephrase that as "easy to use", even GUI based, > > > > configurability. Perhaps you aren't targeting such "novice" users. > > > > > > > > > > > > > > > > > > > For instance, I absolutely do choose convenience and > > > > > > > > > > > even necessity over security (to the tune of bluetooth, full > > > > > > graphics > > > > > > > > > > > card support for game dev work), yet wouldn't there still be > > > > > > > > > > > something to be gained by using Qubes even with those security > > > > > > holes? > > > > > > > > > > > When the choice is Qubes with these holes vs just any regular Linux > > > > > > > > > > > distro. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Modern Windows and OSX offer a "reasonable compromise" of security, I > > > > > heard. > > > > > > > > Haha! > > > > > > Any update regarding this? > > > > hahaha > > You manage to figure it out lol? I'm sorry i was laughing at Joanna's comments. Do you mean how to enable it manually, or if Qubes is going to support it? I personally wouldn't want bluetooth either man. Maybe you hold your phone too close to it one day haha. Or someone uses some booster outside your house to reach it who knows. i mean anything can happen and taking over dom0 is game over. defeats the purpose of using Qubes which tries to isolate hardware from dom0. It is recommended to use usb with a computer that has the Qubes hardware requirements to be able to isolate the usb controllers from dom0. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fbc29b17-6576-4228-a29e-c5cb0a60eee9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes using Cloudflare - Why?
On 01/12/2017 08:24 AM, taii...@gmx.com wrote: > On 01/12/2017 12:33 AM, Andrew David Wong wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA512 >> >> On 2017-01-11 12:34, Andrew David Wong wrote: >>> On 01/11/17 11:04, taii...@gmx.com wrote: https://www.eff.org/deeplinks/2017/01/finally-revealed-cloudflare-has-been-fighting-nsls-years >>> Three main reasons: >>> >>> 1. We distrust the infrastructure anyway. >>> 2. It's low-overhead (in terms of the time and work required for >>> administrative tasks). >>> 3. It's free (as in beer). >>> >> On 2017-01-11 12:37, Alex wrote: >>> In my understanding of the article, cloudflare is trying to challenge >>> the secrecy around broad investigations (by challenging national >>> security letters), not the other way around, so I can't see what you are >>> lamenting, Taiidan... Would you care to explain? >>> >> I mistakenly thought that this was a new thread posing the question in >> the subject line and providing a link to that article as a justification >> for the question. After viewing the whole thread on Google Groups, I >> realize that I've already answered the initial question. (I knew it >> seemed familiar!) >> >> This is what happens when people reply to threads without quoting any >> part of the existing thread to provide context. :) >> >> I second Alex's question. The article is clearly pro-Cloudflare from the >> very first sentence. >> >> - -- Andrew David Wong (Axon) >> Community Manager, Qubes OS >> https://www.qubes-os.org >> -BEGIN PGP SIGNATURE- >> >> iQIcBAEBCgAGBQJYdxUYAAoJENtN07w5UDAwT5IP/3j5VjBj7Txh9bC9z4gOT1bk >> x+DzdFWPH6OAXiaUQs5BDiA/TayjN8GmJgcYi1247MV4xaoNkUqAdOa3Bv+fxprr >> wZREP6UII3LiLlP8TMPsIZNhc/W+AGSUGinG4qtYlz/TJnn2zJnoTmiz1f3wsUVh >> LDT4ncPIUFiVaVLhn5eFnl7nOrDh14O3CRxlu3cpYjTG6bBXBAChCLEE6EACTJgH >> Ocl1fyGOCtlPILC7OEKPoJ1Cuo6RxhVilhv9rqkM8gh8uG4cRZAsKAaWb8C/qrJ1 >> WamA85zEApjI2xonPjkBOCfPnOpDNs21B4uG/hdRq4tPtU+69Xt0a6SCOqPdijDZ >> An62pOlCApLEvCl26ImS0xdmKaYXZ1y0UPS2y+wJ/tMBRZxKNAKlpwYat93t3nIK >> UOW763sA+CVpDIxTaBTGGL7Miz7wz0fGN4TAtGNyOVNnfdwSNnKQcYxwWY9rltsj >> VWvQumHfWE1zLZ2HzknbP3CVSeIuqSrve4rifj62L3+gkKaoqxA7ndN/sSOOX6iO >> TOZZYuWb8YE1rGoV/vznFEftc74mDe0obmF4JSraLEXGRyuZ7dnQjxetZ3BvKnQN >> bKDgRObC78ro0O9ibslZh9rn5w9wxf8T8EQ65JvQdQxyRK4qLC+bk53tPcDz77M1 >> LJ+su7Fq2RLrcqY4/lVK >> =0uH4 >> -END PGP SIGNATURE- > I thought I would share this because it proves that they're fighting a > NSL and thus had one put in to action on them in the first place. > > I realize that you enjoy the "free" services from them and that you lack > the money to use anything else, but it is just something to think about > regarding what happens when a handful of companies control almost the > entire internet and the bigger picture - what happens if a change of > management leads to them dropping the challenge? what companies simply > comply and we never hear about it? > > A theoretical condition of doing business in country X (say china) would > be messing around with certain pages to provide bad advice and > contaminated software to people, you don't have to get the elite > security specialist types who take extraordinary precautions you simply > have to get the average joe who doesn't know anyone in real life who can > provide a real root of trust (even I don't) > > The cloudflare captcha is clearly designed to fingerprint the user > (which works even with a generic DVM due to machine specs) or else it > wouldn't need javascript, it is obvious that they have a market interest > in tracking people even those who use VPN's. > > I bet half the users on this mailing list have never considered the cost > of "free" so my goal is to get people thinking about it. > There is huge discussion on torproject.org on cloudflare ; additionally to the annoying (and as I learned thanks to your question yesterday) user-tracking Captcha I may add that, running a non-exit(!) tor server at home, my home IP is banned (even with an insecure browser) from a lot of useful sites, British Airwairs is on example (that I boycott for them banning me), and many others. Almost all of them are linked to CF if one looks well the whois entries. This behaviour of Cloudflare seems clearly politically motivated to me : there is no danger, no malicous packets, simply nothing that is emerging from my tor middle relay! The "com" about NSL fighting does not mean that Cloudflare are with the good side of the force. Not at all. It is only "com" (communication or comedy?) Bernhard -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9b23ff19-fb13-edf4-741c-5371f997cff6%40web.de. For more options, visit https://gr
Re: [qubes-users] Re: VM chaining visualisation tool
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-01-11 23:26, Steve wrote: > On Thursday, January 12, 2017 at 10:11:48 AM UTC+4, Steve wrote: >> Is there a way I can get a real time visualisation of the VM >> chaining , for example a Domain chaining through a firewall >> through a VPN and sys Network ? > > Is there a way in Terminal to get a textual description of the > linking ? thx > Technically, qvm-ls provides this, but it may not be what you have in mind. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYdzdEAAoJENtN07w5UDAw770QALt7ubGbPiKUj42oNowIbBpT WdlI/TXaO4l3CWu01OU2CsENns07E0+0gAqroZ3cgHKy9A8bgdpVR2J/ZW+MiIEh rh48Y0/uiUPrcXNDn24rL/b/gic0FcoVrhjD0a/6UD8WKqLenVBqp5/IAbr677Zc llLagFcQpZsbZxgV/hIPB/Qnayw3OQ3R89Hx2bIo+L7E2dsxLL0tdsKaKu+KPLKk OZUM8NtlfR/tPiDd33c9VNNNe37pvJYzgiwiXfg578qUxbW3f3e1+xyeO7VMMNhz LRZjNIY0wgqFIOYPn9mkNeucGDzvq8DuIWNZegY5pf9K1c5BY4D+VUG7YM6vrcjc JDRSPpElWXdcSm2nD72xsN64LtwaU1VhXN10FOg9Xr9bAWPhu67zeE5khqRwfI41 C7vGq6t9I0EVZWSgkeCm84arTTpV6D9mP/+KMwcbYg+Tpo52QQdhfxOtmKrYjMve gQN+3y3/IP+10IiJIeYnzF8fSEKrFD3Ev2yZMnY5fPwY3iavyb5mBTuKXpnYLkiM x7OlIGGbK5CrkGaH1+Z9uSlwkALe2f99+RH7ginV3d9jgQ5xESpSQA6bb5fKrHm6 lx/2jqbFHSniipqxQtFsOa/TbFg4L9HbBd6+B/mFqrMAZpHGZcbGhspEC9EiVcKh rHjDHUoELnNHyhCRz1b5 =4WKM -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a8b76d7f-7a1f-990b-342c-5b8a60d6cc56%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.