[qubes-users] Qubes Windows Tools R4 - testing repository or old version?

2019-04-22 Thread Daniil Travnikov
Hi,

I installed from here: https://www.qubes-os.org/doc/windows-tools/


And I installed with this command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing 
qubes-windows-tools


instead of this command:
sudo qubes-dom0-update qubes-windows-tools



And every time I get this version: qubes-windows-tools 4.0.1-3


Can anybody tell me is there old version. If yes, then how can I install the 
older version of QWT?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eaced45c-82be-4344-87f6-688f8a74fd00%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] /usr/bin/notify-send does not work when invoked via qubes-rpc

2019-04-22 Thread tomhet
> Can I ask why you want to do this?
> Why dont you just call notify-send in the qube? 

First some introduction:
- I have 'storage' vm. It takes storage devices (few HDDs) on startup and 
exposes them via NFS & Samba to other VMs and physical machines. Each VM can 
access just what is exported for it, rw or r/o. 
- When 'storage' is started it has to trigger assignment of block devices to 
itself (and un-assign them on shutdown). Achieving this is discussed here 
https://groups.google.com/d/topic/qubes-users/RogG5rXG_Pw/discussion
- Assign/un-assign is triggered from storage via qubes-rpc actions 
'storage-attach/detach'

I just want to be notified on screen for each device that is 
assigned/de-assigned. And since assign/de-assign happens in dom0, 'notify-send' 
is called there. It seems clumsy that dom0 calls back 'storage' to run 
'notify-send' there, but if this is the only working option in Q4 - I'll do it. 
Will try it on next Q4 run

  Tom

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5f1c1c39-b396-4ae0-ad33-abdd6187b183%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [qubes-devel] Re: [qubes-project] Re: Google "Season of Docs" -- deadline April 22

2019-04-22 Thread Michael Carbone
On 4/21/19 8:18 PM, Andrew David Wong wrote:
> On 19/04/2019 10.15 PM, Andrew David Wong wrote:
>> On 19/04/2019 1.12 AM, Michael Carbone wrote:
>>> hey all,
> 
>>> sorry for the short notice -- I'll be submitting the Season of Docs
>>> application on Monday night April 22 (deadline April 23).
> 
>>> Before then we need a 2019 Google Season of Docs page
>>> (https://www.qubes-os.org/gsod ?) that has project ideas for technical
>>> writing / documentation.
> 
>>> So let's get started with some brainstorming on technical writing /
>>> documentation needs!
> 
>>> Also with these ideas we need volunteer mentors - if you'd like to be a
>>> mentor, you need to register here:
> 
>>> https://forms.gle/a1x26WQGzURLerv66
> 
>>> More info here:
> 
>>> https://developers.google.com/season-of-docs/
> 
>>> https://developers.google.com/season-of-docs/docs/project-ideas
> 
>>> Thanks,
>>> Michael
> 
> 
>> Thanks, Michael. I've created an initial version of the GSoD page here:
> 
>> https://www.qubes-os.org/gsod/
> 
>> It's pretty minimal and bare. Everyone, please help add content to this
>> page, especially project ideas to the ideas list.
> 
> 
> Cross-posting to qubes-users for greater visibility. Everyone is
> welcome to contribute.


great thanks Andrew!

for anyone interested, please feel free to highlight any documentation
ideas that you would prospectively like to mentor a technical writer on.

I just did a pull request with some ideas:

https://github.com/QubesOS/qubes-doc/pull/816

It'll be ideal to have some ideas on the page by the end of tomorrow
April 23.

Thanks,
Michael


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b69005d-66f0-5c76-9684-34d66b43c3d1%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes installer reboots computer spontaneously

2019-04-22 Thread freddycribbs17
After some tinkering, I’ve come to find out that it’s not only the installer 
that causes the computer to reboot, but the initial setup post-installation as 
well. It’s as if my laptop refuses to play nice with the OS. I’m at a loss as 
to what to do going forward. I can confirm that the media is fine, and that the 
installer successfully installs a copy to an external drive is another computer.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b03bb965-adcc-4d0e-9914-4f6bc238ee27%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] E' DA ARRESTARE SUBITO L' AVV PEDOFILO ED ASSASSINO DANIELE MINOTTI (CRIMINALISSIMO AVVOCATO DI RAPA

2019-04-22 Thread 'GIULIANO URBANI VADAINGALERA ILPEDOFILOBERLUSCONI' via qubes-users
E' DA ARRESTARE SUBITO L' AVV PEDOFILO ED ASSASSINO DANIELE MINOTTI 
(CRIMINALISSIMO AVVOCATO DI RAPALLO E GENOVA.. RAPALLO..OVE ORGANIZZA TRAME 
ASSASSINE ED OMICIDI NAZISTI E MAFIOSI, INSIEME "AL RAPALLESE" DI RESIDENZA, 
OSSIA IL PEZZO DI MERDA HITLERIANO, RAZZISTA, KU KLUK KLANISTA, RICICLA SOLDI 
MAFIOSI, SEMPRE PIU' PEDERASTA ANCHE LUI: PIERSILVIO BERLUSCONI)! E' DA FERMARE 
STRA SUBITO: L ' AVVOCATO SATANISTA, NAZISTA, ^SATA-N-AZISTA^, PEDOFILO ED 
OMICIDA DANIELE MINOTTI DI GENOVA, RAPALLO! CRIMINALE OMICIDA, TERRRORISTA DI 
ESTREMA DESTRA, AGENTE SEGRETO IN COPERTO DI TIPO ASSASSINO!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b8aa47a9-ff98-4ac8-8f07-563997415816%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes Installation freeze

2019-04-22 Thread Mike Keehan
On Sun, 21 Apr 2019 11:52:32 -0700 (PDT)
Blue&Red  wrote:

> I've so far been unable to get qubes 4.0.1 to install on my Dell
> laptop, it keeps freezing of file 909/1042 kernel-qubes-vm.x86_64.
> Its a nvme drive if that makes a difference.
> 
> I've verified the ISO of qubes and that matches, I created the pen
> drive in Ubuntu using the DD command,as  per the site, and I've used
> 2 different 16gb pen drives.
> 
> The pen drive boots in legacy mode and lets me enter all settings and
> starts install. The installation hangs at the file shown above and I
> cannot find any way to exit or restart the machine other than a hard
> reboot.
> 
> I've tried the UEFI troubleshooting on the qubes site as well, anyone
> else got any ideas?
> 

I had the same problem on my Dell laptop.  I had to blacklist the
nouveau module in the xen.cfg file, but if you are using legacy
boot, then the grub.cfg is probably the one to look at.

Mike.
  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190422193311.37e2468e.mike%40keehan.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes installer reboots computer spontaneously

2019-04-22 Thread freddycribbs17
As of right now, I am unable to install Qubes 4.0. The installer loads 
perfectly fine, and the media is in good shape. However, while I am configuring 
the installer (destination disk, user accounts, etc) the installer will hang 
and the computer will reboot. This occurs on a consistent basis, I could 
probably set it to a clock. I’m running a Dell Inspiron 7000 gaming laptop with 
a dedicated GTX 1050ti. I’m thinking that might have something to do with it. 
Additionally, fallback graphics mode fails when trying to start x-server, 
booting me out of the installer.

Any idea as to how I could get this to work.

P.S. Any other Linux installers/live instances work flawlessly, for hours at a 
time. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7f77253f-2d22-4a36-87e4-3cdbbae6d902%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Windows 10 Pro HVM does not work with Mirage Firewall

2019-04-22 Thread Thomas Leonard
On Friday, April 19, 2019 at 12:19:28 PM UTC+1, Claudio Chinicz wrote:
> On 19/04/2019 12:05, Thomas Leonard wrote:
> > On Thursday, April 18, 2019 at 9:53:25 AM UTC+1, Claudio Chinicz wrote:
> >> Hi All,
> >>
> >> Once again I turn to the Qubes Community to ask for help.
> >>
> >> I have a Mirage Firewall VM that works with HVM (Linux Mint) and
> >> Debian/Fedora template-based PVMs.
> >>
> >> My Windows 10 HVM, which works just fine through sys-firewall
> >> (copy/paste and file sharing with other VMs dont, but I can live with it).
> >>
> >> I've tried setting up networking manually by adding its IP, mask and
> >> gateway and rebooting but it did not work. It works with DHCP instead
> >> when getting network through sys-firewall.
> >>
> >> I've followed all the ideas from here
> >> (https://www.windowscentral.com/how-regain-internet-access-after-installing-update-windows-10)
> >> and it still did not work.
> >>
> >> One last piece of information, my Windows 10 Pro was successfully
> >> activated using a key I provided.
> >>
> >> Any ideas? This is not critical, since I can continue using
> >> sys-firewall, but would love to free some memory by using Mirage.
> > 
> > There might be clues in the firewall VM's logs. You can see them with Qubes 
> > Manager (right-click on mirage-firewall and choose Logs -> 
> > guest-mirage-firewall.log). Open the logs just after booting Windows and 
> > seeing that networking doesn't work and look at the end.
> > 
> > You can also do "sudo xl console mirage-firewall" in dom0 to follow the 
> > logs and then boot Windows and watch for new entries.
> > 
> 
> Hi Thomas,
> 
> Thanks in advance. Please see below logs from guest-mirage-firewall.log. 
> My Windows VM is 10.137.0.21.
> 
> What really surprises me is why I does not work even if I set my 
> ip/mask/gateway as it works with Linux Mint? What's different with Windows?
> 
> Best Regards,
> 
> Claudio
> 
> 2019-04-18 11:20:11 -00:00: INF [qubes.db] got update: 
> "/mapped-ip/10.137.0.21/visible-ip" = "10.137.0.21"
> 2019-04-18 11:20:11 -00:00: INF [qubes.db] got update: 
> "/mapped-ip/10.137.0.21/visible-gateway" = "10.137.0.23"
[...]
> 2019-04-18 11:20:22 -00:00: INF [client_eth] who-has 10.137.0.1?
> 2019-04-18 11:20:22 -00:00: INF [client_eth] unknown address; not responding

(continued at https://github.com/mirage/qubes-mirage-firewall/issues/56)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90a21fd2-ae0b-4963-86ac-4c91155e7112%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Portable external laptop monitors?

2019-04-22 Thread Jean-Philippe Ouellet
Hello,

I'm curious if anyone has tried using any portable eternal laptop
monitors in Qubes, like the DisplayLink-powered USB ones?

Some examples of the kind of monitors I'm talking about:
- ASUS MB169B+ -- https://www.asus.com/uk/Monitors/MB169BPlus/
- ASUS ZenScreen MB16AC -- https://www.asus.com/us/Monitors/MB16AC/
- AOC E1659FWU -- http://us.aoc.com/en/products/e1659fwu

They seem appealing to me because it seems they can get power and
signal from a single USB port, and be easily thrown in a laptop bag.
These all seem to be driven by DisplayLink [1], which seems to have at
least some WIP linux support.

Of course, having your *output* devices also attached via your
ideally-untrusted USB controller opens up a whole new world of
possibilities not previously reasoned about in my threat modeling,
especially on laptops where the input devices are rather unfortunately
internally attached via only the same single USB controller, but it
would definitely be an interesting possibility to explore regardless!

Has anyone tried such devices? Anything interesting to report with
respect to Qubes support, or even just Linux support generally?

There would of course be lots of details to figure out, but I would
ultimately be interested in passing through such a device to a
only-partially-trusted USB/GUI VM which could only view/render a
subset of my graphics, thus allowing me to benefit from the extra
screen real-estate for non-sensitive work while still trying to ensure
that I could not accidentally allow a malicious monitor to e.g.
screen-scrape my vault VMs, as well as isolate dom0 from exploits in
the USB/graphics stack. There is at least some communication from a
display back to a host [2][3] (and almost certainly more that I am
unaware of), and I bet there are some interesting and unexplored
potential attack vectors for a malicious display trying to compromise
an attached host.

Regards,
Jean-Philippe

[1]: https://en.wikipedia.org/wiki/DisplayLink
[2]: https://en.wikipedia.org/wiki/Extended_Display_Identification_Data
[3]: https://en.wikipedia.org/wiki/Display_Data_Channel

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_CLNXojy%3DYu3iPOqwqanBhsrABu_Z3Vnghj%3DwPi2eg3KA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.