[qubes-users] Qubes Windows Tools R4 - testing repository or old version?
Hi, I installed from here: https://www.qubes-os.org/doc/windows-tools/ And I installed with this command: sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools instead of this command: sudo qubes-dom0-update qubes-windows-tools And every time I get this version: qubes-windows-tools 4.0.1-3 Can anybody tell me is there old version. If yes, then how can I install the older version of QWT? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/eaced45c-82be-4344-87f6-688f8a74fd00%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] /usr/bin/notify-send does not work when invoked via qubes-rpc
> Can I ask why you want to do this? > Why dont you just call notify-send in the qube? First some introduction: - I have 'storage' vm. It takes storage devices (few HDDs) on startup and exposes them via NFS & Samba to other VMs and physical machines. Each VM can access just what is exported for it, rw or r/o. - When 'storage' is started it has to trigger assignment of block devices to itself (and un-assign them on shutdown). Achieving this is discussed here https://groups.google.com/d/topic/qubes-users/RogG5rXG_Pw/discussion - Assign/un-assign is triggered from storage via qubes-rpc actions 'storage-attach/detach' I just want to be notified on screen for each device that is assigned/de-assigned. And since assign/de-assign happens in dom0, 'notify-send' is called there. It seems clumsy that dom0 calls back 'storage' to run 'notify-send' there, but if this is the only working option in Q4 - I'll do it. Will try it on next Q4 run Tom -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5f1c1c39-b396-4ae0-ad33-abdd6187b183%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: [qubes-devel] Re: [qubes-project] Re: Google "Season of Docs" -- deadline April 22
On 4/21/19 8:18 PM, Andrew David Wong wrote: > On 19/04/2019 10.15 PM, Andrew David Wong wrote: >> On 19/04/2019 1.12 AM, Michael Carbone wrote: >>> hey all, > >>> sorry for the short notice -- I'll be submitting the Season of Docs >>> application on Monday night April 22 (deadline April 23). > >>> Before then we need a 2019 Google Season of Docs page >>> (https://www.qubes-os.org/gsod ?) that has project ideas for technical >>> writing / documentation. > >>> So let's get started with some brainstorming on technical writing / >>> documentation needs! > >>> Also with these ideas we need volunteer mentors - if you'd like to be a >>> mentor, you need to register here: > >>> https://forms.gle/a1x26WQGzURLerv66 > >>> More info here: > >>> https://developers.google.com/season-of-docs/ > >>> https://developers.google.com/season-of-docs/docs/project-ideas > >>> Thanks, >>> Michael > > >> Thanks, Michael. I've created an initial version of the GSoD page here: > >> https://www.qubes-os.org/gsod/ > >> It's pretty minimal and bare. Everyone, please help add content to this >> page, especially project ideas to the ideas list. > > > Cross-posting to qubes-users for greater visibility. Everyone is > welcome to contribute. great thanks Andrew! for anyone interested, please feel free to highlight any documentation ideas that you would prospectively like to mentor a technical writer on. I just did a pull request with some ideas: https://github.com/QubesOS/qubes-doc/pull/816 It'll be ideal to have some ideas on the page by the end of tomorrow April 23. Thanks, Michael -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1b69005d-66f0-5c76-9684-34d66b43c3d1%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes installer reboots computer spontaneously
After some tinkering, I’ve come to find out that it’s not only the installer that causes the computer to reboot, but the initial setup post-installation as well. It’s as if my laptop refuses to play nice with the OS. I’m at a loss as to what to do going forward. I can confirm that the media is fine, and that the installer successfully installs a copy to an external drive is another computer. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b03bb965-adcc-4d0e-9914-4f6bc238ee27%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] E' DA ARRESTARE SUBITO L' AVV PEDOFILO ED ASSASSINO DANIELE MINOTTI (CRIMINALISSIMO AVVOCATO DI RAPA
E' DA ARRESTARE SUBITO L' AVV PEDOFILO ED ASSASSINO DANIELE MINOTTI (CRIMINALISSIMO AVVOCATO DI RAPALLO E GENOVA.. RAPALLO..OVE ORGANIZZA TRAME ASSASSINE ED OMICIDI NAZISTI E MAFIOSI, INSIEME "AL RAPALLESE" DI RESIDENZA, OSSIA IL PEZZO DI MERDA HITLERIANO, RAZZISTA, KU KLUK KLANISTA, RICICLA SOLDI MAFIOSI, SEMPRE PIU' PEDERASTA ANCHE LUI: PIERSILVIO BERLUSCONI)! E' DA FERMARE STRA SUBITO: L ' AVVOCATO SATANISTA, NAZISTA, ^SATA-N-AZISTA^, PEDOFILO ED OMICIDA DANIELE MINOTTI DI GENOVA, RAPALLO! CRIMINALE OMICIDA, TERRRORISTA DI ESTREMA DESTRA, AGENTE SEGRETO IN COPERTO DI TIPO ASSASSINO! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b8aa47a9-ff98-4ac8-8f07-563997415816%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes Installation freeze
On Sun, 21 Apr 2019 11:52:32 -0700 (PDT) Blue&Red wrote: > I've so far been unable to get qubes 4.0.1 to install on my Dell > laptop, it keeps freezing of file 909/1042 kernel-qubes-vm.x86_64. > Its a nvme drive if that makes a difference. > > I've verified the ISO of qubes and that matches, I created the pen > drive in Ubuntu using the DD command,as per the site, and I've used > 2 different 16gb pen drives. > > The pen drive boots in legacy mode and lets me enter all settings and > starts install. The installation hangs at the file shown above and I > cannot find any way to exit or restart the machine other than a hard > reboot. > > I've tried the UEFI troubleshooting on the qubes site as well, anyone > else got any ideas? > I had the same problem on my Dell laptop. I had to blacklist the nouveau module in the xen.cfg file, but if you are using legacy boot, then the grub.cfg is probably the one to look at. Mike. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190422193311.37e2468e.mike%40keehan.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes installer reboots computer spontaneously
As of right now, I am unable to install Qubes 4.0. The installer loads perfectly fine, and the media is in good shape. However, while I am configuring the installer (destination disk, user accounts, etc) the installer will hang and the computer will reboot. This occurs on a consistent basis, I could probably set it to a clock. I’m running a Dell Inspiron 7000 gaming laptop with a dedicated GTX 1050ti. I’m thinking that might have something to do with it. Additionally, fallback graphics mode fails when trying to start x-server, booting me out of the installer. Any idea as to how I could get this to work. P.S. Any other Linux installers/live instances work flawlessly, for hours at a time. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7f77253f-2d22-4a36-87e4-3cdbbae6d902%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Windows 10 Pro HVM does not work with Mirage Firewall
On Friday, April 19, 2019 at 12:19:28 PM UTC+1, Claudio Chinicz wrote: > On 19/04/2019 12:05, Thomas Leonard wrote: > > On Thursday, April 18, 2019 at 9:53:25 AM UTC+1, Claudio Chinicz wrote: > >> Hi All, > >> > >> Once again I turn to the Qubes Community to ask for help. > >> > >> I have a Mirage Firewall VM that works with HVM (Linux Mint) and > >> Debian/Fedora template-based PVMs. > >> > >> My Windows 10 HVM, which works just fine through sys-firewall > >> (copy/paste and file sharing with other VMs dont, but I can live with it). > >> > >> I've tried setting up networking manually by adding its IP, mask and > >> gateway and rebooting but it did not work. It works with DHCP instead > >> when getting network through sys-firewall. > >> > >> I've followed all the ideas from here > >> (https://www.windowscentral.com/how-regain-internet-access-after-installing-update-windows-10) > >> and it still did not work. > >> > >> One last piece of information, my Windows 10 Pro was successfully > >> activated using a key I provided. > >> > >> Any ideas? This is not critical, since I can continue using > >> sys-firewall, but would love to free some memory by using Mirage. > > > > There might be clues in the firewall VM's logs. You can see them with Qubes > > Manager (right-click on mirage-firewall and choose Logs -> > > guest-mirage-firewall.log). Open the logs just after booting Windows and > > seeing that networking doesn't work and look at the end. > > > > You can also do "sudo xl console mirage-firewall" in dom0 to follow the > > logs and then boot Windows and watch for new entries. > > > > Hi Thomas, > > Thanks in advance. Please see below logs from guest-mirage-firewall.log. > My Windows VM is 10.137.0.21. > > What really surprises me is why I does not work even if I set my > ip/mask/gateway as it works with Linux Mint? What's different with Windows? > > Best Regards, > > Claudio > > 2019-04-18 11:20:11 -00:00: INF [qubes.db] got update: > "/mapped-ip/10.137.0.21/visible-ip" = "10.137.0.21" > 2019-04-18 11:20:11 -00:00: INF [qubes.db] got update: > "/mapped-ip/10.137.0.21/visible-gateway" = "10.137.0.23" [...] > 2019-04-18 11:20:22 -00:00: INF [client_eth] who-has 10.137.0.1? > 2019-04-18 11:20:22 -00:00: INF [client_eth] unknown address; not responding (continued at https://github.com/mirage/qubes-mirage-firewall/issues/56) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/90a21fd2-ae0b-4963-86ac-4c91155e7112%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Portable external laptop monitors?
Hello, I'm curious if anyone has tried using any portable eternal laptop monitors in Qubes, like the DisplayLink-powered USB ones? Some examples of the kind of monitors I'm talking about: - ASUS MB169B+ -- https://www.asus.com/uk/Monitors/MB169BPlus/ - ASUS ZenScreen MB16AC -- https://www.asus.com/us/Monitors/MB16AC/ - AOC E1659FWU -- http://us.aoc.com/en/products/e1659fwu They seem appealing to me because it seems they can get power and signal from a single USB port, and be easily thrown in a laptop bag. These all seem to be driven by DisplayLink [1], which seems to have at least some WIP linux support. Of course, having your *output* devices also attached via your ideally-untrusted USB controller opens up a whole new world of possibilities not previously reasoned about in my threat modeling, especially on laptops where the input devices are rather unfortunately internally attached via only the same single USB controller, but it would definitely be an interesting possibility to explore regardless! Has anyone tried such devices? Anything interesting to report with respect to Qubes support, or even just Linux support generally? There would of course be lots of details to figure out, but I would ultimately be interested in passing through such a device to a only-partially-trusted USB/GUI VM which could only view/render a subset of my graphics, thus allowing me to benefit from the extra screen real-estate for non-sensitive work while still trying to ensure that I could not accidentally allow a malicious monitor to e.g. screen-scrape my vault VMs, as well as isolate dom0 from exploits in the USB/graphics stack. There is at least some communication from a display back to a host [2][3] (and almost certainly more that I am unaware of), and I bet there are some interesting and unexplored potential attack vectors for a malicious display trying to compromise an attached host. Regards, Jean-Philippe [1]: https://en.wikipedia.org/wiki/DisplayLink [2]: https://en.wikipedia.org/wiki/Extended_Display_Identification_Data [3]: https://en.wikipedia.org/wiki/Display_Data_Channel -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABQWM_CLNXojy%3DYu3iPOqwqanBhsrABu_Z3Vnghj%3DwPi2eg3KA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.