[qubes-users] Re: Performance problems during video conference

2020-10-16 Thread John Dyne
Thanks, I could try to play with that. The problem is that the sound is 
sometimes not transmitted correctly. It is as if the network caused pauses 
in the sounds/voices. But I know from other computers that the network is 
good.

On Thursday, October 15, 2020 at 6:44:28 PM UTC+2 b17b7bdb wrote:

> We had a similar problem that we were able to fix with ALSA.  In the Dom0 
> terminal type "alsamixer" and check the Mic setting.  Ours was originally 
> set at a level of zero (negative dB gain).  Setting it to a level of 100 
> (dB gain of 12) fixed the problem for us.
>
> On 10/15/20 10:49 AM, John Dyne wrote:
> > I suffer performance problems, specially with the audio, during video
> > conferences (webex, zoom etc).
> >
> > Since the default of audio_low_latency is true, what could be the 
> problem?
> >
> >
> > --
>
>
> Sent with ProtonMail <https://protonmail.com> Secure Email.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84ee4c08-f419-430f-8715-f61fb0192daen%40googlegroups.com.


[qubes-users] Performance problems during video conference

2020-10-15 Thread John Dyne
I suffer performance problems, specially with the audio, during video 
conferences (webex, zoom etc). 

Since the default of audio_low_latency is true, what could be the problem?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24a43114-6ad0-4f45-b0cd-f0f4e1ed2e02n%40googlegroups.com.


[qubes-users] Re: Blank screen after resume if using Nvidia on Lenovo P53

2020-04-21 Thread John Doe
Hello,
I would like to add few updates:


  1.  I have created a simple script that simplifies entering some commands 
blindly from a TTY: https://pastebin.com/r0wszSLJ
  2.  I have realized that rmmod and modprobe of nouveau can help, but it has 
to be done twice and there are some other dependencies (vtcon1 and X11):

sudo systemctl stop lightdm
echo 0 | sudo tee /sys/class/vtconsole/vtcon1/bind
sudo rmmod nouveau
sudo modprobe nouveau
echo 1 | sudo tee /sys/class/vtconsole/vtcon1/bind
sudo systemctl start lightdm
# Do it once more

Also, it has some other drawbacks than having to reboot X11. It requires me to 
restart the VMs in order to be able to interact with their GUI. (This looks 
like some X11 crash.)
  3.  I have updated kernel to 5.6.4-1.qubes. When I use Nvidia, there seem to 
be no change. But when I use Intel, it does not seem to freeze now. (At least 
not yet.) But I am not sure if it really helps. It works mostly well if I don't 
need HDMI, which is probably handled by NVIDIA. There are two issues with HDMI. 
First is blank screen after resume from sleep. The second one is that it shows 
just part of the picture - cursor and sometimes bakcground are shown, but 
windows are not shown.

I conclude that even if Intel can work well, it is the harder way, because HDMI 
seems to be connected through NVIDIA. So, using just NVIDIA is likely easier, 
because it is just a single card.
  4.  I also have seen Frédéric Pierret resolving issues with Nvidia by some 
kernel patches: 
https://groups.google.com/for0um/#!topic/qubes-users/Z2S8Fhry8FU
 . Maybe using some of those kernels could help. I can either compile them 
myself or download binary releases. But how to prove that it comes from a 
member of Qubes Team?

a. Compile from sources and verify the sources. The veritication is rather easy 
(well, except that some commit is not signed), but I am not sure about the 
compilation. I was able to get vmlinux file, but I don't feel like putting the 
file path in /boot and adjusting xen.cfg while keeping the initramfs...
b. Download the binaries. Cool, but how do I check the signature? Frédéric 
seems to use a different key, so I cannot verify it.




-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/HE1PR1001MB1370EB13C70BFF56AA188400ACDB0%40HE1PR1001MB1370.EURPRD10.PROD.OUTLOOK.COM.


[qubes-users] Re: Blank screen after resume if using Nvidia on Lenovo P53

2020-04-19 Thread John Doe
Hello,
my previous message does not seem to have appeared, maybe it has been flagged 
because of some links.

Anyway, I have successfully compiled kernel by notset, but it does not seem to 
change anything for NVIDIA.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/HE1PR1001MB137098ABC894AE30295B916AACD70%40HE1PR1001MB1370.EURPRD10.PROD.OUTLOOK.COM.


[qubes-users] Blank screen after resume if using Nvidia on Lenovo P53

2020-04-14 Thread John Doe
Hello,
I have Lenovo P53 with Nvidia+Intel GPU and I have various troubles depending 
on the configuration.

First, I need to use a more recent kernel than the default one in order to make 
touchpad and trackpoint working:

Linux dom0 5.5.9-1.qubes.x86_64 #1 SMP Sun Mar 15 05:53:26 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux

With this kernel, I have some other issues that depend on the GPU I select in 
BIOS. With this kernel:

a. When I choose Intel+Nvidia combo, I get random freezes. Sometimes, the 
system works several hours, sometimes it freezes much sooner, even during the 
boot. If you have some idea how to resolve this, I am OK with using this option 
(i.e. probably just Intel all the time). But I do not want to much debug it, 
because it is pain, as the behaviour looks quite non-deterministic. Note that I 
need also HDMI to work, but I am not 100% sure about this combination.
b. When I choose just Nvidia, the system works with Nouveau driver quite well 
until I suspend it. When I resume, it deterministically (with rare exceptions) 
keeps the screen blank, even without any blacklight. HDMI-connected screen is 
also affected. It however seems that it is just the graphical output and the 
laptop works otherwise; For example, I can press Ctrl+Alt+F2 and then 
Ctrl+Alt+Del to reboot the machine.

Adding nouveau.modeset=0 to the kernel commandline changes nothing but the 
rendering performance. That is, I see a blank screen with this kernel option 
after resume. With this option, nouveau kernel module is loaded, but apparently 
not used, because I can rmmod nouveau. Anyway, running rmmod nouveau does not 
seem to change the resume behavior.

Do you have any idea how to fix that or what the cause is?


-
Hardware info:

$ cat /proc/cpuinfo  | grep 'model name' | head -n1
model name : Intel(R) Core(TM) i7-9850H CPU @ 2.60GHz
$ sudo lshw -C display
  *-display
   description: VGA compatible controller
   product: NVIDIA Corporation
   vendor: NVIDIA Corporation
   physical id: 0
   bus info: pci@:01:00.0
   version: a1
   width: 64 bits
   clock: 33MHz
   capabilities: pm msi pciexpress vga_controller bus_master cap_list rom
   configuration: driver=nouveau latency=0
   resources: irq:184 memory:ed00-edff memory:c000-cfff 
memory:d000-d1ff ioport:2000(size=128) memory:c-d



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/HE1PR1001MB137022821F070D64F33EC709ACDA0%40HE1PR1001MB1370.EURPRD10.PROD.OUTLOOK.COM.


[qubes-users] hybrid graphics laptop over m2 sata egpu good idea or not?

2020-03-05 Thread john redneck
I am owner twicked Acer Aspire. (100% Qubes OS compatibility).
So, that laptop has 32gb ram ddr4, i7-6500, 520 intel hd + nvidia 950m, 
also 1TB m2 sata samsung EVO and intel iommu support.
I can remove m2 wifi module card and replace it with m2 EGPU (for example, 
nvidia 1060 GTX PCI-E card).
Is it possible to gpu passthrouth dedicated eGPU card to debian/fedora 
AppVM or HVM?
Anyone has success or Qubes bad with gpu passthrouth on laptops?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b52cc0ee-d5dd-47e0-860c-8d3d0bcd797f%40googlegroups.com.


Re: [qubes-users] Re: I passedthrough GPU pci to win7 but can't install driver on windows

2020-01-13 Thread John Mitchell
With QEMU/KVM you can hide the VM from the driver.  I don't know how to do 
this with qubes maybe someone else can step in.  I didn't want Nvidia 
breaking my setup in a future driver update so I am using an AMD RX590 
avoiding Nvidia's shortsightedness.  And they lost a sale.

On Friday, January 10, 2020 at 10:20:28 AM UTC+1, Matthias Horn wrote:
>
> I think Nvidia have logic in the (consumer) driver to detect when it’s 
> running under XEN (and other hypervisors) and will refuse to load/install 
> in that environment.
> https://wiki.xen.org/wiki/Xen_VGA_Passthrough_Tested_Adapters
>
> Sent from my iPhone
>
> On 10 Jan 2020, at 05:15, xyzo > wrote:
>
> 
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes...@googlegroups.com .
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/fe3f992a-4749-4090-baaf-b3de26a55fb7%40googlegroups.com
>  
> 
> .
> 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/678093c9-2515-40fb-89ab-8d8d9b2f62ff%40googlegroups.com.


[qubes-users] Syncing clock with ntp

2019-12-27 Thread John Maher
I have always had a problem with my system clock losing time. My 
understanding is that the ClockVM, which is usually sys-net, runs ntp and 
and communicates the time to dom0, which communicates the time to all of 
the other VMs.

I don't know exactly what makes sys-net the ClockVM, but I noticed that it 
was not running the service clocksync (I noticed this service in sys-net of 
a different machine), so I added clocksync as a service to sys-net of the 
problem machine.

I assumed ntp would be running on sys-net, but it was not. And when I 
checked the other system (which already had clocksync as a service), I see 
that it too does not have ntp running.

I don't know how sys-net will get network time without ntp running. 

Any suggestions on how to get my clock synced with network time?

Thanks.

John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1432b667-3372-4d71-831c-f2b7cf376656%40googlegroups.com.


[qubes-users] Re: Qubes/Xen doesn't comply with IOMMU grouping rules for PCI passthru

2019-12-27 Thread John Mitchell
"This can especially be the case with consumer class machines such as 
Ryzen."

I had to lol about this since I have had many Intel systems with one 
problem or another and this is certainly not isolated to Ryzen.  I am also 
running a Ryzen system running three VMs with PCI-passthrough on one of the 
VMs with no problems.  I do not know if my motherboard is consumer grade 
(ASrock) however it does rock.  ;)

On Sunday, December 22, 2019 at 8:32:23 PM UTC+1, Claudia wrote:
>
> I'm very new to all this iommu stuff, but as I understand it, devices in 
> the same iommu group are
> supposed to be treated as a single unit, meaning if any of them are 
> assigned to a VM then they all
> must be assigned to the same VM. This is because those devices cannot be 
> isolated from each other
> -- they can communicate directly without going through the IOMMU at all, 
> for example.
>
> This not only creates obvious security holes, but can also cause 
> compatibility problems. For
> example, devices in different VMs will have different perspectives of 
> system memory. [3] Or 
> something like that. Like I said, I'm still trying to wrap my head around 
> it.
>
> Point is, the entire group is supposed to be treated as a single unit. 
> Linux/KVM enforces this, Xen
> does not, I'm not sure about any other platforms. [1]
>
> This caused a very sneaky problem on my machine. My USB controllers are in 
> the same group as my
> GPU, sound card, and SATA controller. So when sys-usb (or 
> rd.qubes.hide_all_usb) takes over those
> two USB controllers, everything stops working. [4] It was quite difficult 
> to trace. It would have
> been much easier to diagnose if grouping was enforced somewhere. I would 
> much rather have an error
> in my logs about being unable to assign USB controllers, than have my 
> whole screen freeze up with
> no indication why. (I got lucky that it just crashed; if something 
> interferes with your SATA 
> controller's address space it can cause disk corruption. [5])
>
> I don't really know who's at fault here. Qubes? Xen? AMD? Dell?
>
> Unfortunately, Qubes has no way of knowing anything about iommu grouping 
> because Xen takes over the
> IOMMU (and therefore grouping is not visible in dom0). [2] So probably the 
> only way Qubes could
> enforce grouping is by some kind of heuristic. For example, assume all 
> functions of a device are 
> grouped. Or, assume all devices on a hub are grouped. Or just disable the 
> USB Qube option on AMD 
> systems entirely, or warn the user that it may cause serious problems that 
> are hard to diagnose.
>
> As for fixing the actual problem, that is, grouping them in a more 
> sensible way so that the GPU and
> USB controllers can be isolated for example, can only be done in a 
> firmware (or microcode?) update
> by the vendor, if at all. There are some hacks for KVM to spoof the 
> grouping restrictions (which
> Xen doesn't enforce in the first place), but they don't solve the 
> underlying problem. VFIO seems
> like it could work (by emulating some IOMMU functionality in software), 
> but I don't know if it's
> supported by Xen.
>
> I'm guessing part of the reason this problem doesn't usually come up on 
> Intel systems is because of
> the Xen option iommu=no-igfx. This means that the integrated GPU is always 
> exempt from IOMMU
> control altogether, but this option is Intel-specific and has no AMD 
> equivalent. However, that 
> doesn't do anything about other devices such as sound cards or SATA 
> controllers. Intel systems
> seem to just to have better grouping usually (or, are less likely to crash 
> when grouping rules are
> violated). [6]
>
> At least that's my understanding so far. 
>
> Thoughts? Is there anything Qubes can do to do avoid splitting up IOMMU 
> groups? Is there anything
> Qubes *should* do? Should Qubes attempt to guess the IOMMU groups before 
> taking over devices?
> Should the USB Qube option be disabled on AMD systems (you can still 
> manually set up sys-usb of
> course)? Should we just blame Xen for not enforcing IOMMU groups in the 
> first place? 
>
> [1] https://lists.gt.net/xen/devel/345279#345279
> [2] 
> http://xen.1045712.n5.nabble.com/IOMMU-group-dissapear-in-XEN-td5737357.html
> [3] https://vfio.blogspot.com/2014/08/iommu-groups-inside-and-out.html
> [4] 
> https://www.mail-archive.com/qubes-users@googlegroups.com/msg31494.html
> [5] 
> http://xen.1045712.n5.nabble.com/VGA-passthrough-with-USB-passthrough-td5738340.html
> [6] 
> https://hardforum.com/threads/ryzen-and-iommu-groups-is-this-ever-going-to-get-fixed.1944064
>
> ---
>
> Dell Inspiron 5575, AMD Ryzen 5 2500U, Qubes R4.1 booted without Xen: 
>
> # lspci
> 00:00.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Raven/Raven2 Root 
> Complex
> 00:00.2 IOMMU: Advanced Micro Devices, Inc. [AMD] Raven/Raven2 IOMMU
> 00:01.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 
> 00h-1fh) PCIe Dummy Host
> Bridge
> 00:01.6 PCI bridge: Advanced Micro Devices, 

Re: [qubes-users] Thunderbird Addon for launch attachments in dispVMs

2019-10-10 Thread John Maher
Thank you Sven and Andrew.

John

On Thursday, October 3, 2019 at 7:44:10 PM UTC-4, Andrew David Wong wrote:
>
> -BEGIN PGP SIGNED MESSAGE- 
> Hash: SHA512 
>
> On 2019-10-03 4:39 PM, Sven Semmler wrote: 
> > On 10/3/19 3:05 PM, John Maher wrote: 
> >> All of a sudden Thunderbird (68.1.0) no longer has the Qubes 
> >> addon that allows the launching of attachments in dispVMs.  Did 
> >> something change that I can change back? 
> > 
> > It's Thunderbird that changed, but the issue is already fixed. 
> > Update the thunderbird-qubes package from the current-testing repo 
> > and you're back in business! 
> > 
> > /Sven 
> > 
>
> For further details, please see: 
>
> https://github.com/QubesOS/qubes-issues/issues/5318 
>
> - -- 
> Andrew David Wong (Axon) 
> Community Manager, Qubes OS 
> https://www.qubes-os.org 
>
> -BEGIN PGP SIGNATURE- 
>
> iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl2Wh7sACgkQ203TvDlQ 
> MDAbyQ/+MZGermCrWEBopfGZ78V4ld4e1fnhAmV43Gqkr1em4bu6puqgBmUZL3K+ 
> aO8RHbx4qcxNi4qdk+avbRy03DVf2u6lc7tRUsD77WMWYle55PtvGs09/+eX/igb 
> ZqPYa3Res0BKhLrvCaQVIAqrs3ql5LjjmFCNCRtNDqK93bo5zYI5cZjT2WhMl9tm 
> zBZNhzV9q/MrHTPpLcxZc1pHPU4kTVqa8TrBDxM6yrt2UnmNzxxRYGbenIFU2X0k 
> A0lcY3TgAXW9n0AOLWeTv5WYln7I8TrVN3CR7+lbXUt9pBAtS9w1LHYmGrKDK3/y 
> IkY9gxw+1JGBOzj7qtCF6tUl5yQN7HYPLhlbEkz4I2pEl62e98LeJf43wVMyyqNx 
> WCDVKUyqwrPgiJMpvw69Jo1czu/7DTeekewamZPAyN4e34ocnXMW8BqVPij9fjJn 
> S6DOc220rVH1QtAYIFGIrC0AxkJFxrTWrS1NMmefuOxW+Kjra80OCM1/McNo1sQq 
> SK2ktFSq0ZeYRIqawvKi+L0oUHIEKtRIRnzm/w+FhhewFxZLuCZuHLyjimWQnV1U 
> n6OCtlHKJnzVlM1u1fwSyefFZRWqVDaLE98U9pPoNd9KhsYTy2mP6PCNOs2Q3lES 
> S+kDvtK6PL6pMpZDaK/pz++QiZch1IRX9fTMXj3T6I5JsiGweLs= 
> =Z9xR 
> -END PGP SIGNATURE- 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/356afb82-5eda-44e1-be0e-fe2b654854a7%40googlegroups.com.


[qubes-users] Thunderbird Addon for launch attachments in dispVMs

2019-10-03 Thread John Maher
All of a sudden Thunderbird (68.1.0) no longer has the Qubes addon that 
allows the launching of attachments in dispVMs.  Did something change that 
I can change back?

Thanks.

John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a4bb496c-1997-49b9-80d2-1825fc511f61%40googlegroups.com.


[qubes-users] Re: Qubes not working on Thinkpad T480

2019-09-30 Thread John Smiley
I'm running Qubes 4.02-rc2 on a T480 right now.  Works like a charm.  Would 
love to help, but will need more detail about your install steps and 
failure mode.

On Monday, September 23, 2019 at 10:17:08 AM UTC-7, evan.la...@gmail.com 
wrote:
>
> Hi all,
>
> I recently installed Qubes Release 4.0.2-rc1 on my Thinkpad 480 and the 
> system won't boot at all.  I have had this issue with previous versions of 
> Qubes on this laptop as well.  Does anybody know of a possible fix?
>
> Thanks
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/febe8c8f-236e-4a03-b893-dc43d7d30806%40googlegroups.com.


[qubes-users] fedora-30 not updating with widget

2019-09-20 Thread john
I keep trying to update via widget it finishes but the wheel - cogwheel 
doesn't disappear, anyone else seeing this behaviour in 4.0.2


debians updated fine and the gear wheel disappears just not fedora,  
doing it via qubes manager just says nothing to update


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c447e2f7-6156-6195-e8cd-8ebcaa8e2eca%40riseup.net.


Re: [qubes-users] request : add to dom0 FFmpeg libraries and codecs h264/h265/libavcodec/libfdk_aac/libmp3lame/libopus/libvpx

2019-08-11 Thread john due
This is need for MPV and better performance for window managers users 
(dwm/2bm/i3wm and others) If you need something better than primitive 
wallpaper.
Because all configs and utilities stored at dom0.
Yes, i already has compiled FFmpeg from source on dom0 but static linking 
libraries  is a pain.
How can multimedia libraries affect security?
Dom0 already has build-toolchain for compile utlities from source but 
unfortunately not all libraries are enough

Best Regards, john due


воскресенье, 11 августа 2019 г., 14:03:22 UTC+3 пользователь Mike Keehan 
написал:
>
> On Sun, 11 Aug 2019 03:47:14 -0700 (PDT) 
> john due > wrote: 
>
> > Hello, Dear Qubes users and devs! 
> > 
> > Can you add please FFmpeg libraries and codecs to dom0 repos? 
> > Because it impossible to add RPMfusion repo to Dom0 and synchronize 
> > it with dnf/qubes-dom0-update mechanism. 
> > it required system-base-release 25 dependencies. 
> > 
> > Best Regards, john due 
> > 
>
> Why do you need ffmpeg in dom0?  Dom0 is for admin, not for running 
> applications.  This is to preserve the security of your whole system. 
>
> Mike. 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bacc9692-5bee-44ae-bac0-875cbf922853%40googlegroups.com.


[qubes-users] request : add to dom0 FFmpeg libraries and codecs h264/h265/libavcodec/libfdk_aac/libmp3lame/libopus/libvpx

2019-08-11 Thread john due
Hello, Dear Qubes users and devs!

Can you add please FFmpeg libraries and codecs to dom0 repos?
Because it impossible to add RPMfusion repo to Dom0 and synchronize it with 
dnf/qubes-dom0-update mechanism.
it required system-base-release 25 dependencies.

Best Regards, john due

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bf2d1828-9648-4f86-a40a-e5b9643dde64%40googlegroups.com.


[qubes-users] History and future of secure virtualized environments

2019-08-03 Thread John Smiley
https://www.platformsecuritysummit.com/2018/speaker/pratt/

A bit off topic but one of the most informative 30 minutes I’ve spent in a 
while and thought I would share. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c8927e6c-a38a-434a-a833-eb3e32f04d0b%40googlegroups.com.


[qubes-users] Argo vs current inter-domain secure communications methods

2019-08-03 Thread John Smiley
I’m curious what the Qubes dev community thinks of the Argo inter-domain comms 
introduced in 4.12. Is it worth considering as a replacement for the current 
methods used by Qubes?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cc701af3-5374-4540-a998-d35f432018ea%40googlegroups.com.


[qubes-users] Re: Aorus Devices

2019-06-16 Thread John Smiley
You may want to provide some details such as model name or at least chipset and 
what matters most to you in terms of what you want from Qubes

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f36c3c2-72a3-4046-8dfb-9582cefd5222%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Aorus Devices

2019-06-16 Thread John Smiley
I’ve used Quebes with an Aorus Gaming 3, which is an X299 board.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cb6337b0-e653-43aa-b66c-44c4ea46b02b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Does Qubes-OS 4.0.1 have support for KDE or GNOME desktop environment?

2019-06-15 Thread john s.

On 6/15/19 12:50 AM, Chris Laprise wrote:

On 6/14/19 6:00 PM, Jon deps wrote:

On 6/5/19 8:00 PM, Chris Laprise wrote:

On 6/2/19 3:41 AM, Finn wrote:

I've installed Qubes-OS 4.0.1 and it's XFCE desktop environment but I
would rather prefer either KDE or GNOME desktop environment. I found
this document[1] where mentioned that Qubes-OS is migrating towards
GNOME but at the time of installation only XFCE (neither KDE nor GNOME)
is available. I was wondering, is there a way I can use my preferred
desktop environment? Or, I have to wait for GNOME until migration is 
not

fully completed because it seems currently there is no support for KDE.


[1]: https://www.qubes-os.org/doc/usability-ux/


KDE does have support AFAIK, although its no long the default. If you 
can get used to the blank-space network icon, then I recommend KDE as 
there are many pluses.


I don't believe Qubes is actually going to migrate to Gnome. There 
was an aborted attempt and Gnome 3's paradigm (tablet touch UI, 
melded WM/app widgets) doesn't seem compatible with Qubes' concept.





seems to want about 4 times  the dom0  RAM   and still  buggy  am 
getting all these  flashing  windows bar and applications menu  hit 
and miss giving dom0 memory boost 800 MiB and minimal qubes memory 400 
MiB or so ,  so gave up



btw,  is there any documentation on recommended RAM for  dom0  using XFCE

I'd like to put back the  Default memory settings  but  don't know 
what they are


What GPU does your system have? I'm running KDE comfortably in only 
1.5GB dom0 memory, and my graphics are Intel HD integrated.


I don't recall the exact procedure to set dom0 memory. It begins with 
changing GRUB_CMDLINE_XEN_DEFAULT in /etc/default/grub and then you run 
a command to update it.





so your 1.5GB  of dom0  memory  is  NOT  the  dom0 "memory boost" in the 
Qubes Global Settings?  which I'm assuming is akin to  "maxmem"  for 
other VMs ?



I also have intel integrated graphics,  maybe kabylake generation


at minimal qube memory 1564  and  dom0 memory boost  5138  I am 
still finding it unusable   the  app menus  don't appear ,  I keep 
fighting the taskbar widgets  which then somehow  I make appear on the 
desktop not the  taskbar,  then  can't get them back on the taskbar, 
etc,  which maybe a / the KDE learning curve . nice to see something 
less austere  using Qubes, that I might be able to understand   but


if it requires me to change something in Grub  and not just the  Global 
Settings  ...maybe time to give up  :)




--
A895 0C7C A244 8E2E FD77 A3DB 180B 7D4D D158 F8B6

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9a72bbf-f2ef-d0a6-c011-fabb1f66eadd%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Adding a Firefox add-on error to -dvm ?

2019-05-15 Thread john s.

On 5/10/19 1:17 AM, awokd wrote:

deb https://deb.debian.org/debian stretch-updates main contrib non-free


thanksforthereply,


hmm just curious

in /etc/apt/sources.list there is this

deb https://deb.debian.org/debian-security stretch/updates main contrib 
non-free






but that is not the same as
deb https://deb.debian.org/debian stretch-updates main contrib non-free


??


your solution worked  am just curious if my sources.list  was not 
correct  somehow ?




--
A895 0C7C A244 8E2E FD77 A3DB 180B 7D4D D158 F8B6

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0784d91-79a9-1e18-ef5a-eb3aca1d03b2%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes on Huawei Matebook Pro

2019-05-14 Thread John Jonathan
On Tuesday, May 14, 2019 at 1:44:23 PM UTC+2, awokd wrote:
> 
> > Hello, I am unable to install Qubes on my new Huawei Matebook Pro.
> > 
> > I have obviously disabled secure boot in the BIOS.
> > Booting from USB stick stops at the initrd stage. I modified
> > slightly the Anaconda partition, by changing the file EFI/BOOT/Boot64.cfg 
> > according to an older suggestion here, changing the default qubes-verbose 
> > entry for efi to
> > 
> > efi=no-rs
> > 
> > but that did not do the trick for me, the installation still halts at the 
> > initrd stage. Is there anything else I should/could do/try? The very same 
> > stick boots perfectly on an old Toshiba.
> > 
> Try 
> https://www.qubes-os.org/doc/uefi-troubleshooting/#installation-freezes-before-getting-to-anaconda-qubes-40
>  
> instead of or in addition to no-rs.

Yes, thank you, it did take both things for me to work, i.e., both efi=no-rs 
and the two options suggested in the link you posted. 

Now the only thing which does not seem to work is the touchpad, but apart from 
this it is installing just fine.

Thanks a lot!!! 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ff409f1d-a7de-488c-aa5b-832f45b2a047%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installing software.. deb-9 lists qubes-r4.list

2019-04-16 Thread john s.

On 3/23/19 6:31 PM, Jon deps wrote:

On 3/19/19 4:59 PM, Steven Walker wrote:
I am still pretty new to Qubes. I have managed to create a new qube, 
but I want to install some software for use with this qube. I have 
read that it has to be installed to the template and not the actual 
qube. As the template has no actual network connection, how do I go 
about this?


Using 4.0.1, Fedora 29

Any help greatly appeciated.

Steve



pretty sure, there are different ways to skin the cat, though


the Templates are designed to obtain access indirectly, that is what the 
  "salt" stuff is they talk about it seems by default to be setup to 
use  sys-whonix-14  to  install updates  , somewhat magically


you can actually change the netvm without shutting down the templates

generally it's bad form  to give  the templates direct access,  though 
may you might want to once in while  in order  to troubleshoot something 
, etc  .testing it the morning ,  you should be able to install non 
updates without  Direct  access




for me  Templates  aren't  worth backing up  , I'm not worried about my 
system  melting down  much . and anyway  its going to be best to 
fresh install , which is easy-ist  in Qubes, which is one of the 
beauties of the technology 


hence, I clone for other reasons

one word of advice  is  keep a paper list of  custom  packages you 
install so when it goes to Fedora-30  you install fresh and then add 
back fresh packages ,  your files  will persist,



my problem  what few files I have end up spread out over  10 App Qubes






If  I do this :

echo "deb [arch=amd64] https://updates.signal.org/desktop/apt xenial 
main" | sudo tee -a /etc/apt/sources.list.d/signal-xenial.list

deb [arch=amd64] https://updates.signal.org/desktop/apt xenial main




then I do NOT need to add anything  to 
/etc/apt/sources.list.d/qubes-r4.list   ??


nor

/etc/apt/sources.list   ??


for Debian-9  stretch ?


ty


--
A895 0C7C A244 8E2E FD77 A3DB 180B 7D4D D158 F8B6

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7c1cf21a-9580-88ce-ec92-49310b99efaa%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: I found a good working alternative to pci video passthrough for owners of separate windows gaming PC w/ modern nvidia video card

2019-04-11 Thread John Mitchell
On Thursday, April 11, 2019 at 9:21:22 PM UTC+2, jrsm...@gmail.com wrote:



> That makes sense.  I was thinking along the lines of 3K-4K with all of the 
> eye candy dialed to Ultra.

You could with a higher end video card.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9915ccd8-6041-4f6b-b79a-8c567665ddd8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: I found a good working alternative to pci video passthrough for owners of separate windows gaming PC w/ modern nvidia video card

2019-04-11 Thread John Mitchell
On Thursday, April 11, 2019 at 7:31:49 PM UTC+2, jrsm...@gmail.com wrote:
> So do I. I just boot Windows for that though. I’m a very curious sort and 
> genuinely don’t understand if you’re playing AAA games at high rez and frame 
> rates. You’ll never get the performance for this use case out of a 
> virtualized environment that you get with native Windows.

The performance loss depends on the system.  Some only lose 5%, I think I lose 
a little more however I still have average 50 FPS at 1080p on a RX590 and 
expect that will improve when the QEMU patches in the pipeline are applied.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/661c74c9-2487-46e5-8aeb-4156341eec32%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: I found a good working alternative to pci video passthrough for owners of separate windows gaming PC w/ modern nvidia video card

2019-04-11 Thread John Mitchell
On Thursday, April 11, 2019 at 6:19:22 AM UTC+2, jrsm...@gmail.com wrote:


> 
> I guess I'm missing a major point.  Why would one want to game on Qubes?

Some of us like to have fun!  ;)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e36a3878-9552-47b5-a815-80fe19e031da%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: PS/2 Keyboard and Mouse via USB?

2019-04-10 Thread John Smiley
So if you have 4 or more USB controllers isolating one for its exclusive
use for kb and mouse is safer than PS/2?

If so that eliminates one of the two main reasons I had for buying a new
mobo for Qubes.  The other is that the new one has a hardware TPM and the
one w/o PS/2 only has a firmware TPM, which isn’t recognized by Qubes or
Ubuntu 18.10

On Wed, Apr 10, 2019 at 3:28 AM unman  wrote:

> On Wed, Apr 10, 2019 at 10:09:54AM +1000, haaber wrote:
> > > On 4/10/19 9:50 AM, jrsmi...@gmail.com wrote:
> > > > The PS/2 keyboard leaking to ground risk seems like it would only
> > > > apply if an attacker had physical access. Is that right or is there a
> > > > way it could be exploited remotely?
> > > >
> > > In principle that can be measured far away, with little hw cost Read
> you
> > > here
> > >
> > >
> https://www.blackhat.com/presentations/bh-usa-09/BARISANI/BHUSA09-Barisani-Keystrokes-SLIDES.pdf
> > >
> > >
> > > you also see that they use a 150 ohm resistance between refence ground
> > > and the ground wire that the computer connects to. That may help as a
> > > setup to measure at home. Distance?  Scheier writes (in July 2009):
> "The
> > > attack has been demonstrated to work at a distance of up to 15m, but
> > > refinement may mean it could work over much longer distances."
> > >
> > Sorry, I forgot to add: countermeasures could be: (1) a low-pass filter
> > to remove frequencies > 200Hz and (2)  white noise injection in the
> > "cleaned" (by step 1) ground wire PS/2 frequency range 10-20 kHz. If you
> > like to solder a bit ... maybe look at "Avalanche Breakdown Diodes" ?
> >
>
> Or use a ground lifter or work off disconnected UPS as needed.
>
> --
> You received this message because you are subscribed to a topic in the
> Google Groups "qubes-users" group.
> To unsubscribe from this topic, visit
> https://groups.google.com/d/topic/qubes-users/uNmSPbt-9L0/unsubscribe.
> To unsubscribe from this group and all its topics, send an email to
> qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/20190410102757.dbkavoizsjjt4mm5%40thirdeyesecurity.org
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAMCsksHJbOP88CWb9F3%3DjSsOG19rZ_CTDjtak9VGGCwSMZ%3DwNA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How risky is GPU pass-through?

2019-04-09 Thread John Mitchell
Hey throwaway42,

Thank you for the information!  I wish I had this 6 months ago when I began 
planning my personal VM server.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24eef0f7-9c1f-41b9-8ae8-f30443b5a254%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How risky is GPU pass-through?

2019-04-09 Thread John Mitchell
On Tuesday, April 9, 2019 at 2:53:25 PM UTC+2, unman wrote:


 
> Do you run Qubes? On what hardware?

I wanted to use Qubes however I didn't feel that my usage case would be 
supported here so I opted for Xubuntu running QEMU and Virtual Machine Manager. 
 I have it working, responding here from a VM.  I've been following Qubes since 
version 1, just not using because of the many security features.

AMD Ryzen 2700X, 8 cores, 16 threads
32 GB ram
GeForce GT 1030 (desktop GPU)
Radeon RX 590 (gaming GPU, pass through, also working)

The gaming GPU is blocked in the kernel from the host OS (Xubuntu) with virtio. 
 I suppose virtio could be a security risk.  The host OS is restricted to 4 GB 
(hugepages) and one core (two threads).  I have RAID 10 running on the host 
CPU.  KVM shares the host memory however it has one core for itself for 
iothreads, etc.   The rest is available for VMs.  Neither of the two CPUs for 
the host and KVM have ever maxed usage for longer than half a second.

I was planning to use bcache to speed up the RAID although I may skip that 
since I am not feeling a need for speed.  RAID 10 is plenty fast when the 
drives are not spun down.  I have SMART monitoring setup too along with temp 
and fan monitoring.  The host runs from an SSD.  Next month I will add a backup 
solution.

I have some bloat in the host that I need to clean up.  Overall it is a solid 
setup, certainly not as secure as Qubes.  However I don't believe I would have 
this working with Qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e24653c0-a5a9-42a7-b736-d3b9c154aad9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How risky is GPU pass-through?

2019-04-08 Thread John Mitchell
On Monday, April 8, 2019 at 8:32:09 PM UTC+2, tai...@gmx.com wrote:
> On 02/25/2019 04:02 PM, John Mitchell wrote:
> > If I may ask what OS do you use for the host?
> >
> 
> Devuan, it is debian without systemd.
> 
> I compile most of the related packages though like libvirtd, qemu etc
> cause the ones from the distro are way too outdated to support what I need.
> 
> You should get a new non-gmail email btw.

Thank you for the reply.

I know Google (facebook, etc.) owns me.  :(  And most of the rest of us.

Anyway I moved on to Xubuntu.  It provides enough security for my needs and the 
GPU pass through is working.  Also there is a patch coming for QEMU that should 
bump the performance so I am satisfied with my setup.  I'll continue to keep an 
eye on qubes hoping one day the PCI pass through catches up.  I realize Qubes 
is way ahead on the security side though.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ceedb06-1524-4f59-808f-314c88dd1e76%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: "Qubes Devices" widget not working anymore

2019-04-05 Thread john . e . maher
On Friday, April 5, 2019 at 10:34:21 AM UTC-4, Lorenzo Lamas wrote:
> On Friday, April 5, 2019 at 3:15:44 PM UTC+2, john@gmail.com wrote:
> > On Thursday, April 4, 2019 at 3:53:49 PM UTC-4, Lorenzo Lamas wrote:
> > > Try updating to qubes-desktop-linux-manager 4.0.17 in current-testing.
> > 
> > Thanks, Lorenzo. It is fixed now, however, I believe I made the mistake of 
> > enabling the repo rather than just installing the package from the repo. 
> > Nothing terrible happened, but now every time a new VM is started there's a 
> > loud "pop" from my speakers, and it's uneffected by the volume control 
> > within Qubes. Not terrible, but it means every time I open a disposable VM 
> > there's a loud pop (I'll turn down my speakers).
> > 
> > If you or anyone has any suggestions regarding that that would be fantastic.
> > 
> > Thanks.
> > John
> 
> You could try rolling back the update:
> "You could look at 'sudo dnf history' in dom0 to identify the last
> update, then roll back to the prior one:
> 
> sudo dnf rollback 
> 
> So if the update that caused the problem is transaction 150, specify 149
> on the command line."
> 
> And then install only qubes-desktop-linux-manager from current-testing: "sudo 
> qubes-dom0-update --enablerepo=qubes-dom0-current-testing 
> qubes-desktop-linux-manager". You may need to add "--best --allowerasing" to 
> that.

Again, thank you for this. Unfortunately, rolling back presents me with an 
error message that "A transaction connot be undone" and mentions "No package 
qubes-manager-0:4.0.28-1.fc25.noarch available."

I'm going to just live with it, and learn my lesson. Thanks again.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ddea6cd-e1d2-49e0-ba75-dbf29df93ed3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: "Qubes Devices" widget not working anymore

2019-04-05 Thread john . e . maher
On Thursday, April 4, 2019 at 3:53:49 PM UTC-4, Lorenzo Lamas wrote:
> Try updating to qubes-desktop-linux-manager 4.0.17 in current-testing.

Thanks, Lorenzo. It is fixed now, however, I believe I made the mistake of 
enabling the repo rather than just installing the package from the repo. 
Nothing terrible happened, but now every time a new VM is started there's a 
loud "pop" from my speakers, and it's uneffected by the volume control within 
Qubes. Not terrible, but it means every time I open a disposable VM there's a 
loud pop (I'll turn down my speakers).

If you or anyone has any suggestions regarding that that would be fantastic.

Thanks.
John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/664655de-4f4b-45b4-86ac-ef87168f9181%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] "Qubes Devices" widget not working anymore

2019-04-04 Thread john . e . maher
For no apparent reason, when I plug a USB flash drive into my computer (Qubes 
4.0) the Qubes Devices widget in the upper right no longer displays the device. 
When I plug in the flash drive the system presents multiple black popups 
indicating the drive is available, but nothing shows in Qubes Devices.

I'm using a USB qube called sys-usb, and this function used to work perfectly. 

Any suggestions would be greatly appreciated.

Thanks.
John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2eca73b-e7f3-4a4a-ac32-9dca7552e664%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] running application without packages ?

2019-03-29 Thread john s.

So, if I have a .tar.gz  which I unzip  and inside there is a executable.

there is nothing to install in a template, and when I close the AppVM 
that contains the executable,  should I expect that when I open that 
AppVM again,


that I should still be able to use the executable?


or is Qubes designed so that only executables installed in the Templates 
should persist to be executable


and hence, if there is no package, then I can't use the software except 
temporarily




--
A895 0C7C A244 8E2E FD77 A3DB 180B 7D4D D158 F8B6

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9b86fa20-6905-7ff1-126a-421247036c73%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: all new kernels are unusable with amdgpu - Sapphire Nitro + RX590

2019-03-24 Thread John Mitchell
I don't know if this will be helpful since I am using Xubuntu 18.10 with kernel 
5.0.1 with a RX590 card.  So the problem is likely with the kernel build since 
the older kernels do not properly reset the RX590.  Here is a video walking 
through getting everything to work with Xubuntu, perhaps you can extrapolate 
some useful information.

https://www.youtube.com/watch?v=qK5ra2eed7w

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aeb264d2-5ead-4fc2-9929-92d735b7a52e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes - Critique (long)

2019-03-19 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 3/18/19 10:40 PM, jrsmi...@gmail.com wrote:
> “The install appeared successful. I was able to add Chromium to an
> appVM. When I started the appVM and launched Chromium from the
> menu... nothing! No window, no error message. I tried a number of
> times (the reason for just re-trying will be mentioned below). ”
> 
> This stood out for me and was not addressed by others, so I’ll ask
> the obvious question. Did you install the software in the appVM as
> you stated or did you install in the template VM the appVM was
> based on?  For most installed software, it needs to be installed in
> the Template VM for it to be there after the appVM is bounced.
> Installing in the appVM causes the install to be lost on the next
> reboot of that appVM since it gets its installed software from the
> Template. I usually clone the distro templates and install my stuff
> there and then create appVMs with my copies. That way I can be sure
> that the distro templates remain upgradable via QM.
> 
In the template. Used the Qubes Manager to "add" Chromium to the
appVM's menu.
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlyQ+fEACgkQjWN9/rQY
sRxddgf+N2OOb0ktEzhJzi1PvwYw12Ui6KKyhBucowacBqekRAWoiDYnMNyPlbS0
xnoZrc0gFEo++HXmmduuyrodD66chkntvdBhYmJ/n4bb1XmzOCaInBeLxghvI1xX
rNMRHFMJTBL56syTmK8gRa5yvujMr9JCAig+q7AP4wrZo3xdfUZUIhZnF0wC2XNC
Z2M0+Gotlbm2PBfpuAEGIK49Z9q1n1UuUP9WLVoHkVJoJ+jr/tJ2wLsC+QyfCYKr
dAtHHVgiv0RKNw7bxtq3M8iSE9CnXqqtP830yHuTbVrZ+m+zJMP/rfGFDiEp9ZAK
yZ4rR1Qi0E0jA5hkOs1k3lx4ZqOgLw==
=CWNi
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4014dfa6-fda9-53f6-b043-f79ce8db7d1e%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes - Critique (long)

2019-03-16 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 3/16/19 6:35 PM, js...@bitmessage.ch wrote:
> 
>> [Question] So, what do other Qubes users do to protect their
>> families in case they die/get killed, get imprisoned, go
>> missing?
> 
> In addition to (very) occasional full backups using default qubes
> tools, i also backup important data to an external hard drive with
> a luks encrypted partition, so it can be easily accessed outside of
> qubes if needed.
> 
But that still needs someone (spouse, child, executor of your estate) to
have access to a key phrase (if that is the right term). What about
bank account numbers, etc. If you use KeePassX 2 or similar, what about
access to it?

Do you have the necessary passwords written down with instructions,
sealed in an envelope and stored in a safety deposit box? Something
else?

We tend to keep more and more financial, legal and medical information
on our personal computers rather than keeping paper copies (I am an old
guy but my wife and I keep everything in electronic form unless
required by law to keep a paper copy -- so I expect the "younger" crowd
probably tends to do so as well).

We keep at least two backups of such data -- copies to our shared file
server and backups to external drives.

One of our children has the master password to our password vaults --
there is a non-negligible possibility that both of us could be badly
hurt (or killed) in the same accident (e.g. plane or car crash).

Anyway, with our emphasis on Qubes and security, I was curious about
this other aspect of people's affairs. Do you have all your important
data locked down in Qubes so *only* you can get at it?

John
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlyNmBMACgkQjWN9/rQY
sRyUAwgAggvJpp6yKTRGfsM+W3EmkAb/nS/reESCCFbyifgFgqr5b2IWclFzZyAi
Nra9Q3KiuCaj4rS4YduTE0HcEsFKNoj9fY/mkS+EalriIhyw4DWMeoupZ/q4Nun1
7pbLiPKDhJAccLo1ZNEsQQYpgGnUhUMeR3hFhdawgerss9TASt8lInmnfTNrp9ei
uv5l7LOc/sAgy0yEvqYqxJFKIA70xgThK/SWHcqwQx02TX5LCAPXAtM4VFNAw08U
BbL+wNUp8c/FcZ2dELtH2iy2Hyraj11b2UCDh7QXv/Uih6358hqkfIT+PZWpyVJq
DpLe09Ef5FuWltS4HGVqvDJl+4kjKg==
=urg+
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dd6ac889-070c-cc83-6cc7-a5d1733cd78a%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes - Critique (long)

2019-03-16 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 3/16/19 7:42 AM, Mike Keehan wrote:

> 
> As for Flash, it is a pain.  Our BBC still uses it extensively, so
> I have to manually download it occasionally and copy the library
> file into the appVMs .mozilla directory when necessary.
> 
Hi Mike,

What a coincidence!  I live in Canada, but use the BBC website on a
daily basis for news and interesting articles. It is really the
only reason I need Flash.

Cheers,
John
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlyNAl0ACgkQjWN9/rQY
sRwJNAf7BWyeG2BfTKJTSFFjTafLrv384+foZ3D1SVEQ587GSaGr8xReuxa8pbaw
Vz4qb0+BnMgr7jQ9audWijZWmhwJGx/IuLmUxbrKfQ2s6RhvvKCeBWox9oWrsT5p
Lh9J8Ek3QCNStSFNPhIqUT3dXLouYeQ3LQCzXbNafV4HTMyvMzmNkkGKZnWmdnIm
45TiHzx1jiRLH30VjgtSgD55QEyGzi6bMPjIK/n9IdQrgmN/evvvF7PSWsQiE3au
C6SyH9RBhfPAzHYY6gopbUcbr2R7sYUugIlu6cA25O0av5vzX+wxxV0ZrwIqvAOq
w5HuvElorhVHTAbEjR22brJZVtnZBA==
=J3rz
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c259349c-4dfd-c777-5fc3-5b22736aef8a%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes - Critique (long)

2019-03-15 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

*A Critique of Qubes*

Before discussing Qubes, I want to give you a bit of background about
me. I do not want to tell my life-story, I doubt anyone is interested.
However, I want you to know "where I am coming from" and what I want
from Qubes. I am keeping in mind that what I want is just that and
Qubes may not be intended to satisfy, or interest in satisfying my
wants and needs -- that is, I may simply be part of the wrong
demographic.

* Retired roughly 2 decades
* 73 years old
* Degree in Computer Science
* Started out programming mainframes in Assembly Language (machine
  code)
* Later, large-scale software development (various roles) -- R & D,
  telecoms and mission-critical apps (those involved in health-care are
  regulated)
* Proprietary H/W and OSes, then various Unixes.

I am not paranoid over privacy and security, but I recognize there are
many individuals who, rightfully, fear for their privacy and anonymity
- -- their livelihood and even their lives may depend on it.

Wants:

* Reliability -- do not fail on me or, if something goes wrong, fail
  gracefully.
* Reasonable security -- more than is provided by the more standard
  Linux distributions (I am a fan of Linux Mint).
* Reasonable privacy (I hope that is not an oxymoron); though perhaps
  it is too late in the game for me (though I have never been a fan of
  social media, or anything Google)
* No need to spend large amounts of time tinkering with my basic
  personal computer setup.
* Ease of use and administration, including software installation.
* GUI for virtually everything unless there is a really, really, really
  good reason to use a CLI. Do not get me wrong, I am comfortable with
  CLI's, but I do not want to spend my time researching various Linux
  administration tools. Consider me lazy if you wish.
* No need to build my own tools to use Qubes (I do some website and
  server- side development to keep the neurons firing -- I can do all
  the programming I want in that environment).

Basically, my personal computer(s) is a tool. If I write some software
on it, that software will be for some other purpose and not to
complement the OS.

- -

Critique:

I started using Qubes for my main computer about two months ago. I had
previously experimented with release 3.2 and 4.0 on my HP laptop and
ran into various problems -- discussed by many users ad nausium in
qubes-users. I got a nice little desktop computer for Christmas (from
my wife :-) -- an Intel NUC7i7 (32 GB RAM, 512 GB SSD).

So I started from the beginning. Installing Qubes 4.0.1 was relatively
straightforward, although it did require researching the use of a USB
mouse and keyboard.

Basic configuration was no worse than any Linux distribution I have
played with. Software installation was not as straightforward. I was
forced into using the CLI (I do have two proprietary programs: VueScan
and Bcompare). Installing other software can be problematic. I
installed Chromium. The install appeared successful. I was able to add
Chromium to an appVM. When I started the appVM and launched Chromium
from the menu... nothing! No window, no error message. I tried a number
of times (the reason for just re-trying will be mentioned below).

Issues...

* When launching a program from the Qubes menu, particularly if the
  target   appVM has to be started, the program often fails to be
  launched. This happens very frequently with the Text Editor.

  This is annoying as one waits a bit in case one is simply being
  impatient, or at least I do, so as not to launch two copies of the
  program by accident.

* When a USB device is attached to an appVM, there is an appropriate
  notification. When it is detached, there is a notification that the
  device is being detached, but no notification to indicate that it has
  been successfully detached  so how long should one wait before
  unplugging it?

* Ignoring whonix (I do not use it... yet), there are two template VMs
  in the vanilla Qubes 4.0.1 installation: Fedora and Debian. However,
  they have not been treated equally, with Debian being the loser. The
  Qubes documentation indicates that Fedora was favoured for security
  reasons.

  Since I had been using Linux distributions based, directly or
  indirectly, on Debian, when I first set up Qubes, I created my appVMs
  based on Debian. That  was painful as I then had to install a lot of
  basic software.

  When I re-read the documentation, I realized the security reasons,
  so I switched all my appVMs (except one!) back to Fedora. It was not
  painful, but I would have rather have spent the time doing something
  else.

  The kicker came when Firefox stopped playing Flash content in my
  untrusted appVM, complaining that I needed an up to date version of
  Flash. I installed the most recent version, but that did not solve
  the problem. The problem is/ was something to do with 

Re: [qubes-users] Re: thunderbird address book corrupted

2019-03-01 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/28/19 12:39 PM, Jon deps wrote:
> On 2/25/19 7:07 AM, Foppe de Haan wrote:
>> On Sunday, February 24, 2019 at 10:04:30 PM UTC+1, Jon deps
>> wrote:
>>> Hello, I realize it's not exactly a qubes thing. but, does
>>> anybody else unable to save any new entries in thunderbird 
>>> address book
>> 
>> try updating tb, looks like it's a bug in 60.5.
>> 
> 
> thanks, well I just use whatever Fedora-29  provides which at the
> moment is 60.5.1
> 
> where did you see the bug report ?
> 
> it seems to have been this way for many months,  can't create new 
> contact, can add any new info to existing entries,  I tried
> removing the .mab  files  in .thunderbird and making a new "book"
> but still can't add any entries ...
> 

I resolved the problem using the Thunderbird CardBook plug-in. Follow
the installation instructions as they provide useful information about
switching from the built-in address book.

It is more standards compliant (easier import/export options) and the
UI is better (in my opinion). You can try it for a while before
committing to CardBook (I only took a couple of days; my wife took a
couple of weeks).

Cheers,
John
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlx5iJsACgkQjWN9/rQY
sRxaqwf+JEZx4zWRO525YPuI2Pj+HB/Ix72WpvIFE0OHgatmjLapzdQWhbyNWhqf
jMraQClp/PnApbQm268TFPeNHvaJDWMzrdtSJi7S8YXHzzil+8Ma1wI9twrHwljT
illhec4EzDl3+v8Ra8EGPQD1OpMtk7b0lBv76NQsvtllOTcQ9AhTfsKRwIZ4ze1H
/6ryKsbnK3kpuZaRAD19a+KPfdXF4VYYxSsNrVeSdkIiQpTxjg4P3e+IiXJzwpvS
csGu9MbTt52w4jOiS43+C6nD0aXtelpPzA53XZ8/5CTtt02TVQMkNsGxwuBhoX3r
AG5RP2hnbf1EF8p/rkD69nTSBRMUlw==
=yy+X
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fdd38ed8-2b0b-92b0-29cf-739506799454%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] why mail-list?

2019-02-25 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/25/19 2:44 PM, taii...@gmx.com wrote:
> If you are not smart enough to use a mailinglist you are not smart 
> enough to use linux.
> 
> Catering to the lowest common denominator is an impossible task 
> that shouldn't be tried as it always comes at the expense of 
> everyone else.
> 
> ML's are the most secure and best method of communication even 
> better if they aren't hosted by the evil spyware google.
> 
> I provide many of the answers here and I refuse to use reddit or 
> anything else that requires javascript or what not - reddit also 
> engages in censorship and the owners stealth-edit the posts of 
> others and endorse politically motivated moderation tactics. Yet 
> another "used to be cool" type of place now played out and all the 
> original users have migrated to other places like voat where
> speech is still free.
> 

This reply is not aimed at the Taiidan, it is a disagreement with all
people who make, what on the surface are logical arguments without
thinking through the logic carefully.

I get frustrated when people use specious arguments to make a point.
Any argument of the form "If you are not smart enough to  you are
not smart enough to " is generally wrong. A simple example of the
lack of implication is "If you are not smart enough to use a
sophisticated camera, you are not smart enough to write sophisticated
programs."

Also being smart enough to do something does not equate to wanting to do
that something.

Making the leap to "catering to the lowest common denominator" is simply
insulting. I can use mailing lists, but I prefer, if possible, not
to do so. qubes-users is, in fact, the only mailing list I use.
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlx0ZYgACgkQjWN9/rQY
sRxA9wgA04mQyE2MrJ3bDKNV8x4FsNlPP10446fkgki4vbzzFsHeTKIE1Zgyg8ue
hZ6HEK1Vrcl7WjywfWtuT99jSj+Cusi4k9H3v4DUn/5Ipybt69h8msN6Cse2jqq9
phVPxpbaAahIWODbMGF9H7+CwysA1n7OUp7GFtmrM8UbcyRwL7j4lp5Yq4jCHti1
SUEWaicDGN/D8GbM26oXkzYtS/RySWLAAmveqSIgMAGlVxplQ6SjD/zUav8akUYY
Xv5nGrokipWtIMtD9Zbt4cjkrfM1UtUNYskEtB4NEOpgG+d/0w5yU8mWYRFpTOrh
3U8mGy/QOHpySs0XVQPEK5iNiGwU/A==
=chxQ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/71a096a3-bf25-35b9-ae58-690975041478%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How risky is GPU pass-through?

2019-02-25 Thread John Mitchell
If I may ask what OS do you use for the host?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51068e18-48c0-47b5-899a-aba95943dd6b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Whonix Yes or No

2019-02-20 Thread John Smiley
Thanks for all you responses and thoughts. You have presented multiple
thoughtfull easy ways to think about this in plain English while politely
pointing out the flaws on the originally posed scenario. Although there
were several no’s and I understand their choice, my answer is Yes.

On Sun, Feb 17, 2019 at 4:24 PM Xaver  wrote:

>
>
>
> Sent with ProtonMail Secure Email.
>
> ‐‐‐ Original Message ‐‐‐
> On Sunday, February 17, 2019 9:49 PM,  wrote:
>
> > Reading through the post questioning the trustworthiness of Whonix, I
> can't tell whether we can continue trusting/using Whonix or not. Can
> someone (preferably in a position to speak for QubesOS), please state, in a
> straightforward and unambiguous manner, spell this out for us?
>
> (Fedora, Xen, Qubes) According the OP of that thread, if any developer
> from the aforementioned projects lived in Australia, or any other country
> that could force a person to backdoor software would effectively destroy
> the credibility/trustworthiness of Qubes.
>
> (Debian, Tor, Mozilla)  According the OP of that thread, if any developer
> from the aforementioned projects lived in Australia, or any other country
> that could force a person to backdoor software would effectively destroy
> the credibility/trustworthiness of Whonix / Tails.
>
> ...
>
> Should I keep going or do you get the point? To be straight, Nothing has
> changed except for the realization that you maybe never trusted the project
> in the first place. What if it was a Qubes that was singled out from
> countless other projects? Or TAILS or Tor or Debian or Fedora or even Linus
> Torvalds? Is your "trust" so easily swayed?
>
> >
> >
> --
> >
> > You received this message because you are subscribed to the Google
> Groups "qubes-users" group.
> > To unsubscribe from this group and stop receiving emails from it, send
> an email to qubes-users+unsubscr...@googlegroups.com.
> > To post to this group, send email to qubes-users@googlegroups.com.
> > To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/2f35c1b7-bcdf-40f7-963d-3d29e2692b2a%40googlegroups.com
> .
> > For more options, visit https://groups.google.com/d/optout.
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAMCsksGivZ208G6LBtnTzjNevYJoqYjjFoprE-fb41i57yfxAQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] not enough memory to start domain "xyz"

2019-02-16 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/16/19 11:56 AM, evo wrote:
> By the way, how can i check up how much RAM i have in the whole 
> laptop? (I forgot it :D )

Surely if you go into BIOS set-up during power-up, you can see how
much RAM the computer has.

- --
John
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlxoW8oACgkQjWN9/rQY
sRxmBwf/XcETgyfvdT2Db0wYcimjtQ/jknCMXQCF3O/zlkdq5N3X2Fbhu2s3AwwY
8+0tPzVVbwy6Zd2pNz6n0We3toFt6OdjxqYuv7CrehxsryVNGEpTWWwo9ImHGxRI
9V9bUDaVYfVZiOB6YGpTQlnX8Vp+US6J0CtInp52fnPJRygYk1R+PUNFxQj3tSav
+t61+FflGd7jwDzb5vkAawDOTw6gPLHtlmOOmjXqNe+mQf2O/+eRMvCiR/c6xbr0
CSXlte112dkImAR8UEe6yP9DTX3GsgLZ5E7kO13hNJG+CfLSVsiN5T+fjbHpqdAM
R4swYYKzkMz9KrMLQhEgwIJsiZSXJg==
=me23
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bbf019f8-7b8b-f689-3ac5-68f256eb895d%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: why mail-list?

2019-02-06 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/6/19 1:52 PM, kit...@tutanota.com wrote:
> Yeah, good buddy, we are all making the same assumptions.  Knowing
> about the extent the Five Eyes will go to gather your personal
> information makes two points; one is that if they do it, they must
> have a right to do it, and two, because they are, we must fight
> against it 24/7.  You are very wise in not keeping records.  I
> couldn't agree more.
> 
> So then I must ask you, how do you feel about your name being kept,
> as part of your international dossier, associated with the mailing
> list?
> 

Actually, I do not mind people knowing my name or roughly where I live
(Newfoundland and Labrador, Canada). I do not mind people knowing I am
a 73-year old male.

What does bother me is a concept I came across, decades ago when I
first starting working on mainframe computers and before The Internet
was publicly accessible. It was the subject of a book called
"Databanks in a Free Society" (I remember the title, but not the name
of the author).

Privacy in my Grandparents age (possibly your Great-Grandparents) was
not ensured because of the lack of access to information. One could
travel to a person's city and look up information about who owned what
property and what price they bought it for, search the registry of
births and deaths, etc. and eventually, often at great cost, put
together a pretty detailed dossier on a person. Part of that was
because it required a lot of investigation — it might even be
difficult to determine where a person was born (not just the city, but
even the state or country).

That great cost gave people a degree of privacy, as did the difficulty
of confirming or disproving a random individual's identity.

Then, starting around 1948, computers were developed enough and made
available to anyone with the money to buy one (i.e. large enough
businesses like insurance companies, large banks,... that could afford
a mainframe computer and the facilities to house it). And, of course,
governments started to store records on computer media (often reels of
tape).

The premise of the book was that it was "now" possible for large
corporations and, especially the various divisions of a government, to
exchange, correlate, merge and massage disparate lots of information
and build up dossiers on people cheaply enough to make it practical to
do so. So, how would those "Databanks" be used in "a Free Society"?
What about an individual's right to privacy?

Of course, we are well past that stage. Information on people is
almost trivially gathered, correlated and massaged. Because of that,
our expectation of privacy (and anonymity) has been shattered.

We can only maintain a fraction of the privacy that my grandparents
had. And, it has become harder for individuals to maintain even a
modicum of privacy, never mind "live off the grid".

Finally, to answer your question: I do not mind my name being
associated with this mailing list.

What I do worry about is my identity being "stolen"; that is, someone
(or some people) being able to impersonate me in a convincing way. I
worry about people being able to access my bank accounts fraudulently
or incur debts that appear to be my debts. About someone destroying or
stealing records I have on my computer that, once upon a time, were
paper records...

Does sharing my name and a few bits of personal information make it
easier for someone to do the above? Probably. But I do not want to
live as a recluse.
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlxbUcwACgkQjWN9/rQY
sRwaNAf/Roj69lCiMg5JNUp/6K+ibPK+QxkG3nx//vz0Cpbduom/h3Q7zL7jumpv
yD3IQGcPJhkbffteg5F6jkx57ZCW4ms2QUy/goUyyiG+0X9gGupEB2Y/5Xc+dQUg
iOb99fxU7Et+wXITY56OfImhCiBEypG2/bTNZ65DO6zJr7BH8pluFmuIucK68ALW
Ydx9/uQabDkhbvinq9Y21Kwk8ngR4RQAsu2GHNaZ8cbWErm2u7PDxF4oDBVKddN+
o/cLjjRZg2VtRAETlUHSGXbi+mrmtVWina+NG75RNzPDe7GHQmBrnVFATnLMJozz
Q+IHIRaFHjkyLSOdataZjPLM1PaIbg==
=Td9w
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4143bd5c-3a9e-3b67-8589-15197a4dc9c0%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: why mail-list?

2019-02-06 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/6/19 10:36 AM, unman wrote:
> On Wed, Feb 06, 2019 at 10:15:54AM -0600, John Goold wrote: On
> 2/6/19 1:12 AM, 'awokd' via qubes-users wrote:
>>>> kitchm via Forum:
>>>> 
> ...
>>>>> It is currently illegal by federal law to clear your
>>>>> browser history.
>>>> 
>>>> Cite?
> 
> What one does with one's browser history, even assuming one's
> browser has a browser history, is clearly not governed by law,
> except perhaps in countries like China and Russion.
> 
> Actually, it may be governed by law in the US, but not in Russia. 
> The  FBI have interpreted Sarbanes-Oxley as creating a felony
> offence where one deletes browser history where there was 
> reasonable expectation of investigation. It has been used against
> Matanov, a friend of the Boston bombers, and David Kernell, who
> hacked Sarah Palin's email. The EFF have highlighted this
> interpretation of Sarbanes Oxley as egregious, but no doubt the
> authorities deem it necessary.
> 
> Note that it is NOT illegal in the US to clear your browser
> history: but it may prove a felony offence to do so. In the two
> cases cited there were reasonable grounds to suppose that a federal
> investigation would take place.
> 

I think it should go without saying that anyone that violates a court
order issued against them is committing an offense.

Hmmm... So, in the U.S., if you are in a position that there was "a
reasonable expectation of investigation", any attempt to maintain your
privacy may be construed (at least by the FBI) to be a felony offence?
 Wow! Egregious seems to be an understatement.

It seems a bit surreal. A person was not expecting to be the target of
a government/justice system investigation, but someone or some group
say the person should have expected to be investigated... I can see
this happening in a non-democratic regime, but it seems unreal in a
nation professing to be at the forefront of democracy.

Anyway, I do not have to worry about this as I do not allow my browser
to keep track of my browsing history (unless the browser is doing so
surreptitiously). So I have no browser history to delete. However, I
suppose if I became the subject of an investigation, any of my
attempts (all mild) to maintain my privacy would be interpreted as
nefarious.

Anyway, as you implied, I was making assumptions based on my
expectations of living in a democracy.

It's an interesting discussion.
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlxbLJIACgkQjWN9/rQY
sRxbAgf/bBRwIhE+EQ7FVHig6psIg+DDl15Jx8s/13mEjAvKlc45hgxjaShJAQvn
n/nakGzdmzWwrgMAqeOzINGRMdfFaavVxck0+NL0hvVJJ/EONl8hYYloy5k+nUvA
1BoCgUk8LlLRNFSEvtltQod5GDkLAnaXPdxau4sY9u8YL60L3wnjJ8PPpa+lp8/G
0c8iwlwMSn8Yp4t8pJ7Rl7R7ikByY+v1BOt9R6x9zVmHi9SY00BjCKkLegJ5dhVE
MGSA4BA43LsVvyNilQQ/AFMyUCVPo753rYvMjd0ED1hZJqpCJeXpjtBBS8Yg6enj
FIY5+pkFU/X+p3wiSRdhMGnZKYh/Hw==
=xIVp
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1d2f305d-c7d4-d43a-33a6-d227515920ce%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: why mail-list?

2019-02-06 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2/6/19 1:12 AM, 'awokd' via qubes-users wrote:
> kitchm via Forum:
> 
...
>> It is currently illegal by federal law to clear your browser 
>> history.
> 
> Cite?

What one does with one's browser history, even assuming one's browser
has a browser history, is clearly not governed by law, except perhaps
in countries like China and Russion.
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlxbCDgACgkQjWN9/rQY
sRwFfQf+MRGgCma20R/XDSkO0X94ul0kb8p/GfUBQbw7/bbdNKXtawkUtzGqe44I
IExLLsikRRTdHGIMvHVpBXNjQGm2Qh6MdL4v+cd/CN2vtj5Yh2ifk5OF5xt5hb0A
EX+8EYoo5GoF+2urI3IU6NTKBL0tCDiKIcjVIMuxg9ah0mo1QTO5+ewlX5AGlyLS
c2dVDHB3svCIKQ9xrHZxcNLL3WKL6lrOwP/oGuM6NLGJtnBDbS7ihkJA1GMu7m5H
3hHQFq7vb8/6vNf6L8jqC3MPDbp/zXXwCk1UjLofnbUX+ExVDKPZF43qI8yMiGwN
UkdsgfCZfIQjh1jKGDXhJ2/xyhySvw==
=zjDq
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/19e32b12-d3f7-a5ca-3009-21744df7414a%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: diff files across appvms

2019-01-30 Thread john . e . maher
On Wednesday, January 30, 2019 at 11:06:19 AM UTC-5, John Goold wrote:
> On Tuesday, January 22, 2019 at 3:23:54 PM UTC-6, john.e...@gmail.com wrote:
> > Is it possible to compare (diff) files across appvms. Or (and), is it 
> > possible to pass arguments to an appvm through a dom0 terminal. 
> > 
> > Basically, I want to check if a Keepassxc file in my vault is different 
> > than a Keepassxc file in my appvm. 
> > 
> > Thanks for any ideas.
> > 
> > John
> 
> Would it not be simpler, and safer, to create the hash in your vault VM and 
> then copy it to the global clipboard. Then switch to your appVM, open gedit 
> (or editor of your choice) and paste the hash there.
> 
> Finally create the hash in your appVM and compare the two.
> 
> That is the basic method I have been using to compare things across VMs. In 
> particular, generate whatever you need in the more secure VM and pass the 
> result to the less secure VM for the comparison step.

Good advice, John. Thanks.

> 
> I avoid doing anything except VM management in dom0. I think that is the way 
> one is supposed to use Qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eaf1d479-d1c6-4ece-b6c1-6792c58a57fe%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: diff files across appvms

2019-01-30 Thread John Goold
On Tuesday, January 22, 2019 at 3:23:54 PM UTC-6, john.e...@gmail.com wrote:
> Is it possible to compare (diff) files across appvms. Or (and), is it 
> possible to pass arguments to an appvm through a dom0 terminal. 
> 
> Basically, I want to check if a Keepassxc file in my vault is different than 
> a Keepassxc file in my appvm. 
> 
> Thanks for any ideas.
> 
> John

Would it not be simpler, and safer, to create the hash in your vault VM and 
then copy it to the global clipboard. Then switch to your appVM, open gedit (or 
editor of your choice) and paste the hash there.

Finally create the hash in your appVM and compare the two.

That is the basic method I have been using to compare things across VMs. In 
particular, generate whatever you need in the more secure VM and pass the 
result to the less secure VM for the comparison step.

I avoid doing anything except VM management in dom0. I think that is the way 
one is supposed to use Qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f075ffbf-85fd-4546-a3ff-b77dfda67abe%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: automatic start dropbox in VM

2019-01-30 Thread John Goold
On Sunday, September 21, 2014 at 1:49:05 PM UTC-5, Jos den Bekker wrote:
> I would like to have dropbox start automatically when I start my work VM. How 
> best do I do that? Install a new service? Or is there a startup script to 
> which I can add the appropriate command?
> Thanks for any feedback.

I simply put a symbolic link to dropbox.desktop in ~/.config/autostart

Works perfectly. I also have links to slack.desktop and thunderbird.desktop.

The .desktop files are located in /usr/share/applications/

Cheers,
John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/46faf3fa-572d-48e9-b745-f1963a68c276%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Cannot add new user to Thunderbird address book

2019-01-28 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/25/19 2:52 PM, John Goold wrote:
> There is only one issue in my complete transition to a Qubes
> system. This is the first.
> 
> When I attempt to add a "New Contact" to Thunderbird's address
> book, the "OK" button will change to show it is selected, but does
> not do anything. The same happens when I attempt to update an
> existing contact.
> 
> Qubes 4.0.1; Thunderbird 60.4.0 (64-bit)
> 
> Note: My migration involved copying
> ~/.thunderbird//abook.mab from my laptop and replacing the
> one in my "personal" qube. I checked its permissions and it is
> writable.
> 
> All my existing contacts show up and are usable. I am at a bit of a
> loss .
> 
> 

After wasting too much time trying to work out where the problem was
(it does not seem to make any sense), I installed the "Card Book"
add-on. It seems to work flawlessly (I have only been using it for a
couple of days) and has a bit nicer user interface.

John
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlxPgVIACgkQjWN9/rQY
sRw47ggAoruyMwG+qkS1rPbhKMjk/E3TutF3XLF88mfC3nrWlljvyaiIstNGKF8A
V0qp9KI/eOuAB6DdGhIKZAekp6AWHM/sECaGPJ7FF3irIoyOdYyFBEbCxmn4ktJT
nODuvpTl5XciX8EwKy08nbsFS+6DIh/oZ/xbZfBLP4kiulaQJQKsqNTlNYNTElI5
UZcgjJY9G8fDjdVU3cHEJBtN0YIwuEjN/8nymZyK93RVJvA08txiyZEkSr71t/6C
GmwokVdgs9LnV/asfvmBnS/8tHb2n5b/YzWU1djPfcE0/rbhw63JSbGZcWLuKouh
MaTS7QcrWu7G9jAySWTkUaKL0j27lA==
=xPKj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ae5ae8e-0ffc-f5e0-a45f-f5a94ff8adfc%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: QSB #46: APT update mechanism vulnerability

2019-01-26 Thread John S.Recdep
On 1/26/19 6:41 PM, Aly Abdellatif wrote:
> @John S.cde
> 
> 1. Go into sys-firewall and delete rpms available in 
> /var/lib/qubes/dom0-updates/packages
> 
> and then in dom0 use sudo qubes-dom0-update qubes-template-whonix-gw-14
> --enablerepo=qubes*testing --clean   
> 
> 

there is nothing in that dir/  (in sys-firewall) nor  in sys-net
/packagesbut  it seems removing them from /var/lib/qubes/updates/rpm
  fixed   the diskquota  error 



on an interesting note folks over at other distros  like  linuxmint seem
wholly unconcerned with reinstall and seem certainthat just
upgrading apt is all that is necessary



when I mentioned that recent comment  in this thread  about  "stolen
keys"  I am asked for a reference for this, and accused of FUD   :)

I am not a SA, so that comment would be very serious if true correct ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9886bfcb-7e87-85b6-c8c2-46eb6a7d5499%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: QSB #46: APT update mechanism vulnerability

2019-01-26 Thread John S.Recdep
On 1/26/19 9:30 AM, Aly Abdellatif wrote:
> @John S redcap
> 
> Go into the updateVM and delete unneeded rpms :
> /var/lib/qubes/dom0-updates/packages
> 
> If you didnt change your updateVM, it will be in sys-firewall
> 
> And then add  - - clean in your qubes-dom0-update 
> Command
> 


hmm, this is a /var/lib/qubes/updates/rpm/directory with 4 rpm in it
(2 whonix-gw one is the 2018, one the 2019, 1 deb-9 2019 and 1 whonix-ws
 2018)

(there is no /var/lib/qubes/dom0-updatesjust  /updatesin this
4.0-> 4.1 install)


suppose that is the one,  not sure what you mean  by  sys-firewall being
"it"

so something like
sudo qubes-dom0-update qubes-template-whonix-gw-14
--enablerepo=qubes*testing --clean ??

after deleting the 4 template rpms in /rpm  ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7b32a9e8-4b82-88ba-48ad-56dec611c6a3%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: QSB #46: APT update mechanism vulnerability

2019-01-25 Thread John S.Recdep
On 1/26/19 5:22 AM, John S.Recdep wrote:
> 
> When I remove the whonix templates I get about 12 errors complaining
> about /var/lib/qubes/vm-templates/whonix-ws-14/app.tempicons
>   /vm-whitelisted-appmenus.list
> 
> etc
> 
> no such file or directory
> 
> 
> I suppose just another one of those  mystery errors to ignore ?
> 



sh**t now I am getting the correct whonix 2019 started but it fails with
 "Disk quota exceeded"dnf clean packages  0 files removed   so what
now  please

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/760d0277-ca5b-0c63-b58d-5ce08cc4890b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: QSB #46: APT update mechanism vulnerability

2019-01-25 Thread John S.Recdep
somewhere in this large thread it probably states there is an error in
the original whonix install invocation right ?

if one just uses community-testing they end up with 2018 version

so use the --enablerepo=qubes*testing   instead  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/04b3d0f9-034a-1675-c41b-7a5f070b9bd8%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: QSB #46: APT update mechanism vulnerability

2019-01-25 Thread John S.Recdep


When I remove the whonix templates I get about 12 errors complaining
about /var/lib/qubes/vm-templates/whonix-ws-14/app.tempicons
  /vm-whitelisted-appmenus.list

etc

no such file or directory


I suppose just another one of those  mystery errors to ignore ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc4a2f0f-b966-0339-f88f-9e1b2112c6f0%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread john s.


>>
>> Tasket,
>>
>> Does this mean that a upgrade to testing  is as good as   uninstalling -
>> re-installing templates ?
> 
> Yes. Everything in the template's root and private volumes is wiped
> before the new package is added.
> 
> However we found out this doesn't work for Whonix if your updatevm is
> set to sys-whonix. For debian-9 its fine.


.but, otherwise Marek's original Patch howto  remains  OK  for
whonix-14  Q4.0 ?


>> I guess your cloning debian-9-nonpatch'd just in case the upgrade fails
>> , which you'd rather do  than  reinstall  fresh clean
>> debian-9-new-apt-version?
> 
> Its less hassle to qvm-clone to a backup, then run the upgrade.

less hassle meaning than new Templates , ?because one would not then
need to add back any useradded packagesor  both ?






-- 
A895 0C7C A244 8E2E FD77 A3DB 180B 7D4D D158 F8B6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/46e7687e-99ed-b513-df07-7321ac5fbd9a%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Cannot add new user to Thunderbird address book

2019-01-25 Thread John Goold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

There is only one issue in my complete transition to a Qubes system.
This is the first.

When I attempt to add a "New Contact" to Thunderbird's address book,
the "OK" button will change to show it is selected, but does not do
anything. The same happens when I attempt to update an existing contact.

Qubes 4.0.1; Thunderbird 60.4.0 (64-bit)

Note: My migration involved copying ~/.thunderbird//abook.mab
from my laptop and replacing the one in my "personal" qube. I checked
its permissions and it is writable.

All my existing contacts show up and are usable. I am at a bit of a loss
.

- --
John
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEe8Wcf7Po7bts2Rl4jWN9/rQYsRwFAlxLdxoACgkQjWN9/rQY
sRyFwgf/Wj+axAr0SirQCvnZB+hsobtkBPvKabxGbhPx4xQwYKsK//ChsDtQvTAx
oBYxc7DjRO3APyZdFJYVSNCRVjKNwAXbSfGQ2Xm0wa9yCdx3KYtsMJMabgYqpvzK
ddmnIXKTTxScHwVe4CB262APau+0BP8XZxhTm0x2UPAS+rGy8TSXmJRwhcluCTZr
Ex0aqZ8dd3gJVPAvxi0b/o2NYtOk4xHdl268DI/2xC8KpyRWolP/RY+0/1rksyU6
SwKapLByvorzy4K8n2bk6XBb6qh6W0/hnqI9FhY9LapsjRzndSMTktdvVXuaxeF9
IKGGADERdSoRrqQGdlr3w2Ne3Su1Lw==
=mq0q
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8e48194b-9e58-ba39-ff65-720cc5e48e15%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread John S.Recdep
On 1/23/19 9:52 PM, Chris Laprise wrote:
> On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote:
> 
>> Patching
>> =
>>
>> If you are a Qubes user, you should remove all APT-based (including
>> Debian and Whonix) TemplateVMs and StandaloneVMs, then install fresh
>> ones. You can do this by performing the following steps on each such
>> TemplateVM:
> 
> 
> A shortened update procedure for debian-9:
> 
> 1. If your "debian-9" template is customized or contains data, you may
> wish to back it up with qvm-clone first...
> 
> [dom0]$ qvm-clone debian-9 d9-backup
> 
> 2. Run the upgrade command...
> 
> [dom0]$ sudo qubes-dom0-update qubes-template-debian-9 \
> --enablerepo=qubes*testing --action=upgrade
> 
> This will display package info as it begins downloading. The package
> version-date should begin with "4.0.1-20190123" or later.
> 
> 3. Shutdown all VMs so the upgrade can take effect...
> 
> [dom0]$ qvm-shutdown --all --wait --timeout=30
> 
> This method also works with whonix-gw-14 and whonix-ws-14 templates.
> 

Tasket,

Does this mean that a upgrade to testing  is as good as   uninstalling -
re-installing templates ?

I guess your cloning debian-9-nonpatch'd just in case the upgrade fails
, which you'd rather do  than  reinstall  fresh clean
debian-9-new-apt-version?


btw, somewhere in this thread I think I saw  howto  find which debian-9
 useradded  packages  were installed,  but maybe someone could confirm
how please

rec

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b1fca1c4-4c8f-9dfc-b79c-906904141b65%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: clock nightmare

2019-01-25 Thread John S.Recdep
On 1/24/19 6:11 AM, haaber wrote:
> Hello, could someone please help me out of the clock nightmare? dom0
> keeps setting itself at -1day, and helpless sys-whonix follows, which
> disturbs tor, the time stamp of this email ETC.
> Concrete question: in which timezone should live  respectively dom0  and
> whonix-* ? How/Where do I configure TZ without messing all up? Thank
> you, Bernhard
> 

I know this may not be the solution you want, but I ended up just
changing sys-net template to debian-9   , then all was well

I did the change to the  private/  dir  but so far haven't tested it fwiw

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9cec4c99-7f58-76c4-19a3-cb12d3d1d4fc%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-23 Thread John S.Recdep
On 1/23/19 9:08 PM, gone wrote:
> unfortunately the reboot brought no change. Still the
> 201812091508 version.
> 


this is for Fedora, is there something akin to this for  Debian ?


--
What you can do to get the differences between two templates:

1) run "dnf list installed > packagelist1.txt
Do the same in the other VM

2) compare both lists:
grep -Fxv -f packagelist1.txt packagelist2.txt



The problem with that is that it outputs version numbers, which isnt
particularly helpful.
dnf repoquery --qf "%{name}" --userinstalled
Will give you just the names.
--

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6924c217-3eb9-0cb6-1560-b626bbccdcb8%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] diff files across appvms

2019-01-23 Thread john . e . maher
On Wednesday, January 23, 2019 at 11:04:40 AM UTC-5, unman wrote:
> On Wed, Jan 23, 2019 at 07:19:14AM -0800, john.e.ma...@gmail.com wrote:
> > On Wednesday, January 23, 2019 at 9:54:50 AM UTC-5, unman wrote:
> > > On Wed, Jan 23, 2019 at 05:38:42AM -0800, john.e.ma...@gmail.com wrote:
> > > > On Tuesday, January 22, 2019 at 8:18:48 PM UTC-5, unman wrote:
> > > > > On Tue, Jan 22, 2019 at 01:23:54PM -0800,  wrote:
> > > > > > Is it possible to compare (diff) files across appvms. Or (and), is 
> > > > > > it possible to pass arguments to an appvm through a dom0 terminal. 
> > > > > > 
> > > > > > Basically, I want to check if a Keepassxc file in my vault is 
> > > > > > different than a Keepassxc file in my appvm. 
> > > > > > 
> > > > > > Thanks for any ideas.
> > > > > > 
> > > > > > John
> > > > > > 
> > > > > 
> > > > > You can do this using qvm-run-vm or by using qvm-run in dom0.
> > > > > Look at the policy file in /etc/qubes-rpc/policy/qubes.VMShell and the
> > > > > warning.
> > > > > 
> > > > > If all you want to do is see if the files differ, then you can just
> > > > > generate hashes: from vault -
> > > > > qvm-run-vm appvm 'md5sum db.kdbx'
> > > > > Compare that with local hash.
> > > > > 
> > > > > I dont think you can diff the files themselves.
> > > > 
> > > > unman, I don't have qvm-run (perhaps that's for 3.2?), and running hash 
> > > > command example you gave (modified to point to a file that exists in 
> > > > the appvm) produced no output. Specifically:
> > > > 
> > > > $ qvm-run vault 'md5sum file.kdbx'
> > > > Running 'md5sum file.kdbx' on vault
> > > > 
> > > > But no output. Any ideas?
> > > > 
> > > > Thanks.
> > > > John
> > > > 
> > > 
> > > In qubes, you should have qvm-run-vm tool. In dom0, qvm-run. The
> > > capabilities (and controls) are different.
> > > 
> > > You are trying to run in dom0 - to get output there you need to use;:
> > > qvm-run -p vault 'md5sum file.kdbx'
> > > The '-p' allows for stdio from the running program to be passed to dom0
> > > - be aware of the potential risks. Otherwise the command is run (and
> > > stdio kept) in the target qube.
> > > 
> > > In qubes, you use qvm-run-vm - you must have considered
> > > /etc/qubes-rpc/policy/qubes.VMShell
> > > So, from vault run "qvm-run-vm appvm 'md5sum file.kdbx'", and the output
> > > of that command run on appvm will appear in vault, and you will be able
> > > to make the comparison.
> > 
> > unman, thank you for this. I understand the difference now, and using 
> > qvm-run -p in dom0 works fine. I cannot get qvm-run-vm to work, because I'm 
> > presented with "Request refused". I don't understand the significance of 
> > /etc/qubes-rpc/policy/qubes.VMShell, but I don't actually have a directory 
> > called policy, so that file path is /etc/qubes-rpc/qubes.VMShell.
> > 
> > I can make this work using dom0, but I suspect (but don't know for sure) 
> > that that is unwise.
> > 
> > John
> 
> It's not ideal because you are parsing the output of an (unknown) command
> run in a qube in dom0.
> 
> You are getting the "request refused" because you have not set a policy
> rule allowing vault to run commands in appvm.
> I dont have /etc/qubes-rpc/qubes.VMShell, and I do have
> /etc/qubes-rpc/policy.
> I've just checked this on a number of boxes, including a clean 4.0 image
> and they all have the same.
> It occurs to me that you are looking in the qube, and not in dom0 - can
> you check this? You need to set the policy in dom0, and it will be
> applied in individual qubes.

unman, thank you for being so generous with your time. I appreciate the 
education. Yes, I was looking in appvms. I'm starting to understand better what 
needs to be done. I'll see how far I get.

John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/692340e7-1194-4788-9db2-71bf5de11551%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: vault color (black?) & window decorations

2019-01-23 Thread John Goold
On Monday, October 15, 2018 at 7:38:56 AM UTC-5, Brendan Hoar wrote:
> Hi folks,
> 
> Regarding the default R4 color scheme...
> 
> ...does anyone else find that the default color for vault (black?) makes it 
> nearly impossible to see the window titles and/or windows controls (close, 
> maximize, minimize)? 
> 
> Why does that color scheme set the window title (and controls) to dark 
> text/controls on a dark background?
> 
> Thanks,
> Brendan

Yes, it makes it nearly impossible to see the window titles, etc.; however:

* Similar to others, I simply used a different colour for qubes that were 
assigned black (I had purple unused, so I chose it). I haven't changed all of 
them yet, but…

* The window with the focus is highlit in the panel at the top of the screen. 
Since it only uses the appVM's assigned colour for the icon, the title is easy 
to read. A window that does not have the focus, including ones assigned black, 
are readable (though the title is a mid-grey, so not a strong contrast).

* The window with the focus can be minimized either by pressing Alt+F9 or by 
clicking on its tab in the panel at the top of the screen.

It might be annoying, but in my opinion, it is a long way from being a 
show-stopper.

Cheers

*

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ff804052-90ae-4c4c-a3d2-d66e8c9770e8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Firefox Account SyncVM

2019-01-23 Thread John Goold
On Thursday, January 17, 2019 at 12:20:32 PM UTC-6, R A F wrote:
> Hi Everyone,
> 
> I'm trying to find a way to sync firefox bookmarks but I do not want to use 
> firefox account. So my question to all of you is:
> Does anyone knows if there is a possible way to create local account that 
> will be hosted on standalone VM so I could connect all Firefox Apps to 
> connect to that source ans sync bookmarks, plugins, etc. The whole point here 
> is to keep all bookmarks in safe place that same way some people keep their 
> passwords keys etc.
> Maybe if there is no such a solution someone could start new project? I would 
> do that myself, but currently do not have advanced coding skills :-(
> 
> Thanks for all replays 
> BR
> Raf

After re-reading the thread, I realized I was over simplifying your question — 
sorry.

However, after reading your original question more carefully, I am left 
wondering what exactly it is you wish to accomplish (again, sorry if I am being 
dim-witted).

It sounds like you are discussing a single computer running Qubes. It is not 
clear to me whether you want to synchronize bookmarks among instances of 
Firefox running on different appVMs (doing so would appear to compromise 
security as discussed elsewhere) or whether you just want to be able to back-up 
your bookmarks (possibly from multiple appVMs).

Having just recently made the transition to Qubes, I had to migrate my data 
which included my bookmarks. I did not use Firefox's Sync., to do this, but 
simply backed up my bookmarks from my laptop computer. I then transferred the 
backup to my new desktop, Qubes computer. I copied them to the appVMs that I 
would be running Firefox on. After restoring the bookmarks, I deleted any 
non-relevant bookmarks from each appVM. For example, I deleted all but the 
banking/financial bookmarks from the "finances" appVM (and deleted those from 
every other appVM).

I also made sure that remembering history, passwords, etc., was turned off for 
Firefox on every appVM. Also, which probably goes without saying, I turned off 
all reporting back to Mozilla.

I have also decided on my backup strategy being to use Qubes backup to backup 
VMs (including template VMs) to an external USB drive (accepting there may be 
some slight USB-related exposure).

So, the bottom line is, what do you really want to do?

If it is just back-ups, then use either Firefox's bookmarks backup/restore or 
backup the relevant Qubes (or both).

If you really want to synchronize bookmarks among your appVMs, I think you 
would be needlessly jeopardizing your security with no real gain. Personally I 
would recommend against doing this.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62803c17-0634-47b8-af61-4fad72c654f6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] diff files across appvms

2019-01-23 Thread john . e . maher
On Wednesday, January 23, 2019 at 9:54:50 AM UTC-5, unman wrote:
> On Wed, Jan 23, 2019 at 05:38:42AM -0800, john.e.ma...@gmail.com wrote:
> > On Tuesday, January 22, 2019 at 8:18:48 PM UTC-5, unman wrote:
> > > On Tue, Jan 22, 2019 at 01:23:54PM -0800,  wrote:
> > > > Is it possible to compare (diff) files across appvms. Or (and), is it 
> > > > possible to pass arguments to an appvm through a dom0 terminal. 
> > > > 
> > > > Basically, I want to check if a Keepassxc file in my vault is different 
> > > > than a Keepassxc file in my appvm. 
> > > > 
> > > > Thanks for any ideas.
> > > > 
> > > > John
> > > > 
> > > 
> > > You can do this using qvm-run-vm or by using qvm-run in dom0.
> > > Look at the policy file in /etc/qubes-rpc/policy/qubes.VMShell and the
> > > warning.
> > > 
> > > If all you want to do is see if the files differ, then you can just
> > > generate hashes: from vault -
> > > qvm-run-vm appvm 'md5sum db.kdbx'
> > > Compare that with local hash.
> > > 
> > > I dont think you can diff the files themselves.
> > 
> > unman, I don't have qvm-run (perhaps that's for 3.2?), and running hash 
> > command example you gave (modified to point to a file that exists in the 
> > appvm) produced no output. Specifically:
> > 
> > $ qvm-run vault 'md5sum file.kdbx'
> > Running 'md5sum file.kdbx' on vault
> > 
> > But no output. Any ideas?
> > 
> > Thanks.
> > John
> > 
> 
> In qubes, you should have qvm-run-vm tool. In dom0, qvm-run. The
> capabilities (and controls) are different.
> 
> You are trying to run in dom0 - to get output there you need to use;:
> qvm-run -p vault 'md5sum file.kdbx'
> The '-p' allows for stdio from the running program to be passed to dom0
> - be aware of the potential risks. Otherwise the command is run (and
> stdio kept) in the target qube.
> 
> In qubes, you use qvm-run-vm - you must have considered
> /etc/qubes-rpc/policy/qubes.VMShell
> So, from vault run "qvm-run-vm appvm 'md5sum file.kdbx'", and the output
> of that command run on appvm will appear in vault, and you will be able
> to make the comparison.

unman, thank you for this. I understand the difference now, and using qvm-run 
-p in dom0 works fine. I cannot get qvm-run-vm to work, because I'm presented 
with "Request refused". I don't understand the significance of 
/etc/qubes-rpc/policy/qubes.VMShell, but I don't actually have a directory 
called policy, so that file path is /etc/qubes-rpc/qubes.VMShell.

I can make this work using dom0, but I suspect (but don't know for sure) that 
that is unwise.

John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bb75e360-3e6e-469b-8203-6cc515e2aee9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] diff files across appvms

2019-01-23 Thread john . e . maher
On Tuesday, January 22, 2019 at 8:18:48 PM UTC-5, unman wrote:
> On Tue, Jan 22, 2019 at 01:23:54PM -0800,  wrote:
> > Is it possible to compare (diff) files across appvms. Or (and), is it 
> > possible to pass arguments to an appvm through a dom0 terminal. 
> > 
> > Basically, I want to check if a Keepassxc file in my vault is different 
> > than a Keepassxc file in my appvm. 
> > 
> > Thanks for any ideas.
> > 
> > John
> > 
> 
> You can do this using qvm-run-vm or by using qvm-run in dom0.
> Look at the policy file in /etc/qubes-rpc/policy/qubes.VMShell and the
> warning.
> 
> If all you want to do is see if the files differ, then you can just
> generate hashes: from vault -
> qvm-run-vm appvm 'md5sum db.kdbx'
> Compare that with local hash.
> 
> I dont think you can diff the files themselves.

unman, I don't have qvm-run (perhaps that's for 3.2?), and running hash command 
example you gave (modified to point to a file that exists in the appvm) 
produced no output. Specifically:

$ qvm-run vault 'md5sum file.kdbx'
Running 'md5sum file.kdbx' on vault

But no output. Any ideas?

Thanks.
John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d7be12dc-3ec5-4529-8400-398589dea367%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] diff files across appvms

2019-01-22 Thread john . e . maher
Is it possible to compare (diff) files across appvms. Or (and), is it possible 
to pass arguments to an appvm through a dom0 terminal. 

Basically, I want to check if a Keepassxc file in my vault is different than a 
Keepassxc file in my appvm. 

Thanks for any ideas.

John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50094190-5e76-443d-be47-a1b06865eba0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Firefox Account SyncVM

2019-01-22 Thread John Goold
On Monday, January 21, 2019 at 11:57:26 AM UTC-6, R A F wrote:
> I understand your point here but what if I simply do not want to sync my 
> bookmarks, history etc with the cloud. What if I do not want to share those 
> bookmarks between AppVMs. But what if I need to sync this offline inside 
> AppVM that I use in specific domain? The problem here is that in many cases 
> users are forgetting to backup their goodies and not everyone want to sync 
> all this with cloud account. I'm not expert in that area and trying to find 
> out if anyone know it this type of sync is even possible.
> 
> Thanks Guys.
> Raf

You could set up a local file server of your own, such as “ownCloud” 
https://owncloud.org/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed148422-4a70-4236-b464-6974e5e74005%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Firefox Account SyncVM

2019-01-22 Thread John Goold
On Monday, January 21, 2019 at 11:57:26 AM UTC-6, R A F wrote:
> I understand your point here but what if I simply do not want to sync my 
> bookmarks, history etc with the cloud. What if I do not want to share those 
> bookmarks between AppVMs. But what if I need to sync this offline inside 
> AppVM that I use in specific domain? The problem here is that in many cases 
> users are forgetting to backup their goodies and not everyone want to sync 
> all this with cloud account. I'm not expert in that area and trying to find 
> out if anyone know it this type of sync is even possible.
> 
> Thanks Guys.
> Raf

If you are using Firefox synchronization, then you can selectively 
enable/disable sync., in each qube. So disable (or do not enable it in the 
first place) in all of your domains EXCEPT the one and only one you want to use 
it in for "backup".  Oh, and ONLY set Firefox to synchronize bookmarks (no 
history, passwords, etc.).

Particularly if you are treating that domain as untrusted, I do not see what 
the problem is. Or am I missing the point of your wanting to synchronize 
bookmarks in that one domain?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a6117a63-1e24-44aa-91ac-6d4afc4c654c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: USB Keyboard

2019-01-20 Thread John Goold
On Sunday, January 20, 2019 at 4:16:12 PM UTC-6, kit...@tutanota.com wrote:
> Upon reading the system requirements and recommendations, I read the 
> statement "A non-USB keyboard or multiple USB controllers".  Please explain 
> the reasoning there.  Thank you.
> 
> 
> 
> 
> 
> -- 
> 
>  Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
> 
>  https://tutanota.com

>From a newbie to Qubes: There are security issues with USB devices. Normally 
>the keyboard (and mouse) will be attached to dom0 and then shared among the 
>various VMs as they are part of the desktop environment. Since any USB device 
>on the same USB controller can cause a problem, using a USB keyboard is not 
>truly safe. If you actually have multiple USB controllers (I do not), then you 
>can dedicate one USB controller to the keyboard and mouse and it is less of a 
>problem.

Basically, individual devices on a single USB controller cannot be securely 
isolated from each other. …At least that is my understanding.

There are also other issues. I am aware of them as I am using a desktop 
computer (Intel NUC7i7BNH) and USB is the only way to attach a keyboard (and 
mouse); though, in theory, I could attach a Bluetooth keyboard (as I have with 
my laptop computer running straight Linux Mint).

If you are going to attempt using a USB keyboard, I recommend searching the 
threads, PAYING PARTICULAR attention to the issues involving encrypting your 
disk.

By the way, just to make you aware, the posting guidelines indicate one should 
(must?) not include advertising in one's signature.

Cheers and good luck.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3c77b995-70e3-4195-b4ba-807682d7acc8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: USB Keyboard

2019-01-20 Thread John S.Recdep
On 1/20/19 10:16 PM, kitchm-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org wrote:
> Upon reading the system requirements and recommendations, I read the 
> statement "A non-USB keyboard or multiple USB controllers".  Please explain 
> the reasoning there.  Thank you.
> 
> 
so, what level did you want an explanation?  I assume your aware of the
risk of putting a USB thumbdrive/flashdrive  into your  computer?

if so, that is basically the  simple  answer

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a2eeb61-e1dc-93c9-b81b-1235d8f36b5e%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Enigmail - Split-GPG keyring access problem

2019-01-20 Thread John Goold
On Sunday, January 20, 2019 at 9:45:35 AM UTC-6, Mathew wrote:
> Le samedi 19 janvier 2019 21:33:07 UTC+1, John Goold a écrit :
> > Once I had Qubes up and running with Thunderbird and enough basics to be 
> > able, more or less, use it as my main computing platform, I setup Split GPG 
> > and installed the Enigmail extension. At first it appeared to work fine as 
> > I was able to send signed email messages with my public key attached. 
> > However, it soon stopped working. I am now trying to resolve this issue.
> > 
> > So far I have been unsuccessful, so am appealing for assistance/pointers. 
> > That means providing rather a lot of information, but if you would bear 
> > with me, I would be grateful. By the way, Screenshot in an appVM 
> > (Fedora-29) just gives me a white rectangle when I view the saved image :-( 
> >  That is why I have typed in almost all the information below (in most 
> > cases I could not use copy-and-paste).
> > 
> > System
> > 
> > Qubes R4.0.1 with all updates applied.
> > Thunderbird 60.3.1
> > All Split-GPG parts installed (or it would not have worked in the first 
> > place)
> > 
> > The Problem
> > 
> > When I click Ctrl+Enter (to send the message), I get a pop up dialog 
> > request from the vault appVM, "Do you allow VM 'personal' to access your 
> > GPG keys..." I click "Yes" and there is a momentary notification that the 
> > keyring is being accessed (is there any way to make the notification 
> > persist longer than the 1 or 2 seconds it pops up for as it is almost 
> > impossible to both notice it and actually read it?). As best I could read 
> > it, it said: "Keyring access from domain personal".
> > 
> > Then the following dialog box pops up:
> > 
> > [personal] Enigmail Information
> > 
> > Send operation aborted.
> > 
> > The configured key ID "0x6EC..." cannot be found on your keyring.
> > 
> > 
> > Configuration
> > 
> > Here are some configuration files:
> > 
> > [dom0] /etc/qubes-rpc/policy/qubes.Gpg  (why the capital G?)
> > 
> > personal vault allow
> > $anyvm  $anyvm  ask
> > 
> > 
> > [personal] /tw/config/gpg-split-domain
> > 
> > vault
> > 
> > 
> > [vault] ~/.bash_profile
> > 
> > # .bash_profile
> > 
> > # Get the aliases and functions
> > if [ -f ~/.bashrc ]; then
> > . ~/.bashrc
> > fi
> > 
> > # User specific environment and startup programs
> > QUBES_GPG_AUTOACCEPT=86400
> > 
> > 
> > Note: The above appears to have no effect on the request for permission 
> > which still states the default 300 seconds (and appears to honour the 300 
> > seconds).
> > 
> > Other Debugging
> > 
> > [vault] terminal
> > 
> > 
> > [user@vault ~]$ gpg --list-secret-keys
> > /home/user/.gnupg/pubring.gpg
> > -
> > sec   rsa2048 2019-01-11 [SCEA]
> >   0E98...   6837
> > uid [ultimate] John R. Goold 
> > ssb   rsa2048 2019-01-11 [SEA]
> > 
> > [user@vault ~]$
> > 
> > 
> > What is bizarre is that if I use "gpg --list-keys", the output is 
> > identical, which makes very little sense to me. I tried gpg2 but it gives 
> > the same result (not surprising as I deleted gpg and created gpg as a 
> > symbolic link to gpg2 (this was in an attempt to guess why things were 
> > going wrong).
> > 
> > [personal] terminal
> > 
> > 
> > [user@personal ~]$ qubes-gpg-client -K
> > /home/user/.gnupg/pubring.gpg
> > -
> > sec   rsa2048 2019-01-11 [SCEA]
> >   0E98..  6837
> > uid   [ultimate] John R. Goold 
> > ssb   rsa2048 2019-01-11 [SEA]
> > 
> > [user@personal ~]$
> > 
> > 
> > Note: After issuing the qubes-gpg-client command, there was a pop-dialog 
> > box asking for permission.
> > 
> > Following the advice in a thread in the qubes-users forum, I launched 
> > Thunderbird, deactivated and then deleted Enigmail. I then used Software in 
> > the template VM to install Enigmail. That did not change the result when 
> > attempting to send mail.
> > 
> > The only other t

Re: [qubes-users] Re: dom0 clock keeps resetting to wrong time again

2019-01-20 Thread john s.
On 1/20/19 12:06 AM, Andrew David Wong wrote:
> On 19/01/2019 5.08 PM, John S.Recdep wrote:
>> On 1/14/19 9:55 PM, John S.Recdep wrote:
>>> On 1/14/19 10:10 AM, John S.Recdep wrote:
>>>> Hello,
>>>>
>>>> I believe my Bios time is UTC
>>>>
>>>> qubes-prefs shows my clockvm  as sys-net
>>>>
>>>> I have been trying to use sudo date --set <"localtime TZ">  to
>>>> get my dom0 correct.  Which it does but within 30-60  it is
>>>> changing to another TZ I don't recognize
>>>>
>>>> I have also tried  qvm-sync-clock  ,  and tried a qubes group
>>>> search as I remember fighting this out many times   with whonix
>>>> issues , however
>>>>
>>>> I am at a loss what to do further to problem-solve fix this  , 
>>>> appreciate your help
>>>>
>>>>
>>>> maybe I can switch the template for sys-net back to fedora-28
>>>> instead of -29  . ?
>>>>
>>>
>>> 1-14-19
>>>
>>> changing the clockvm to fed-28 and rerunning qvm-sync-clock did
>>> nothing BUT*  changing sys-net to debian-9  and qvm-sync-clock
>>> fixed it   sigh
>>>
>>> case anyone else gets this issue again ; prolly will fix
>>> whonixcheck complaints if any as well
>>>
>>> 'solved'
>>>
> 
>> Must be related to this 
>> https://github.com/QubesOS/qubes-issues/issues/3983
> 
>> for myself it's not the  minimal fedora-29 its the regular one ;
>> and it appears if fedora-29 is having time issues  that  that may
>> be why my thunderbird appvm based on it,  is also  timestamping the
>> messages wrong ?
> 
> 
> Try the workaround mentioned in the comments on that issue, if you
> haven't already. It's worked for me so far.
> 
> 


well if you mean:

in the Fedora-29 template doing

sudo chmod 700 /var/lib/private


[user@fedora-29 ~]$ sudo ls -l /var/lib/private/
total 4
drwxr-xr-x 2 root root 4096 Dec  9 15:37 systemd
[user@fedora-29 ~]$ sudo chmod 700 /var/lib/private/
[user@fedora-29 ~]$ sudo ls -l /var/lib/private/
total 4
drwxr-xr-x 2 root root 4096 Dec  9 15:37 systemd


doesn't seem to change any permissions on the systemd  directory  so
. doesn't seem like that is going to fix anything ?  maybe I'm
missing something basic?








-- 
A895 0C7C A244 8E2E FD77 A3DB 180B 7D4D D158 F8B6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3598c18a-de8e-1ac6-9e38-b1ef78920773%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] Re: dom0 clock keeps resetting to wrong time again

2019-01-19 Thread John S.Recdep
On 1/14/19 9:55 PM, John S.Recdep wrote:
> On 1/14/19 10:10 AM, John S.Recdep wrote:
>> Hello,
>>
>> I believe my Bios time is UTC
>>
>> qubes-prefs shows my clockvm  as sys-net
>>
>> I have been trying to use sudo date --set <"localtime TZ">  to get my
>> dom0 correct.  Which it does but within 30-60  it is changing to another
>> TZ I don't recognize
>>
>> I have also tried  qvm-sync-clock  ,  and tried a qubes group search as
>> I remember fighting this out many times   with whonix  issues , however
>>
>> I am at a loss what to do further to problem-solve fix this  ,
>> appreciate your help
>>
>>
>> maybe I can switch the template for sys-net back to fedora-28 instead of
>> -29  . ?
>>
> 
> 1-14-19
> 
> changing the clockvm to fed-28 and rerunning qvm-sync-clock did nothing
> BUT*  changing sys-net to debian-9  and qvm-sync-clock  fixed it   sigh
> 
> case anyone else gets this issue again ; prolly will fix whonixcheck
> complaints if any as well
> 
> 'solved'
> 

Must be related to this
https://github.com/QubesOS/qubes-issues/issues/3983

for myself it's not the  minimal fedora-29 its the regular one ; and it
appears if fedora-29 is having time issues  that  that may be why my
thunderbird appvm based on it,  is also  timestamping the messages wrong ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0af706cf-9095-b6af-20b3-cb4ae592cc96%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Enigmail - Split-GPG keyring access problem

2019-01-19 Thread John Goold
Once I had Qubes up and running with Thunderbird and enough basics to be able, 
more or less, use it as my main computing platform, I setup Split GPG and 
installed the Enigmail extension. At first it appeared to work fine as I was 
able to send signed email messages with my public key attached. However, it 
soon stopped working. I am now trying to resolve this issue.

So far I have been unsuccessful, so am appealing for assistance/pointers. That 
means providing rather a lot of information, but if you would bear with me, I 
would be grateful. By the way, Screenshot in an appVM (Fedora-29) just gives me 
a white rectangle when I view the saved image :-(  That is why I have typed in 
almost all the information below (in most cases I could not use copy-and-paste).

System

Qubes R4.0.1 with all updates applied.
Thunderbird 60.3.1
All Split-GPG parts installed (or it would not have worked in the first place)

The Problem

When I click Ctrl+Enter (to send the message), I get a pop up dialog request 
from the vault appVM, "Do you allow VM 'personal' to access your GPG keys..." I 
click "Yes" and there is a momentary notification that the keyring is being 
accessed (is there any way to make the notification persist longer than the 1 
or 2 seconds it pops up for as it is almost impossible to both notice it and 
actually read it?). As best I could read it, it said: "Keyring access from 
domain personal".

Then the following dialog box pops up:

[personal] Enigmail Information

Send operation aborted.

The configured key ID "0x6EC..." cannot be found on your keyring.


Configuration

Here are some configuration files:

[dom0] /etc/qubes-rpc/policy/qubes.Gpg  (why the capital G?)

personal vault allow
$anyvm  $anyvm  ask


[personal] /tw/config/gpg-split-domain

vault


[vault] ~/.bash_profile

# .bash_profile

# Get the aliases and functions
if [ -f ~/.bashrc ]; then
. ~/.bashrc
fi

# User specific environment and startup programs
QUBES_GPG_AUTOACCEPT=86400


Note: The above appears to have no effect on the request for permission which 
still states the default 300 seconds (and appears to honour the 300 seconds).

Other Debugging

[vault] terminal


[user@vault ~]$ gpg --list-secret-keys
/home/user/.gnupg/pubring.gpg
-
sec   rsa2048 2019-01-11 [SCEA]
  0E98...   6837
uid [ultimate] John R. Goold 
ssb   rsa2048 2019-01-11 [SEA]

[user@vault ~]$


What is bizarre is that if I use "gpg --list-keys", the output is identical, 
which makes very little sense to me. I tried gpg2 but it gives the same result 
(not surprising as I deleted gpg and created gpg as a symbolic link to gpg2 
(this was in an attempt to guess why things were going wrong).

[personal] terminal


[user@personal ~]$ qubes-gpg-client -K
/home/user/.gnupg/pubring.gpg
-
sec   rsa2048 2019-01-11 [SCEA]
  0E98..  6837
uid   [ultimate] John R. Goold 
ssb   rsa2048 2019-01-11 [SEA]

[user@personal ~]$


Note: After issuing the qubes-gpg-client command, there was a pop-dialog box 
asking for permission.

Following the advice in a thread in the qubes-users forum, I launched 
Thunderbird, deactivated and then deleted Enigmail. I then used Software in the 
template VM to install Enigmail. That did not change the result when attempting 
to send mail.

The only other thing of significance is that I changed the template VM for my 
personal (and personal-projects) VM from Debian to Fedora for consistency. 
However, that change did not coincide with the Enigmail/Split-GPG problem.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c7c9b8a4-22b8-478d-b780-b9a5f64ae7bf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Thank You & How to "Give Back"?

2019-01-17 Thread John Goold
On Thursday, January 17, 2019 at 1:58:16 AM UTC-6, Ivan Mitev wrote:
> Hey John,
> 
> On 1/16/19 8:20 PM, John Goold wrote:
> > I want to say thank you to those members of Qubes Users who have had the 
> > patience to answer my questions and solve my problems getting Qubes up and 
> > running. I have been particularly pleased that this is a forum where there 
> > are few, if any, unhelpful responses to questions and few 
> > questions/requests for help where the asker has not tried to find the 
> > answer in this forum or in the documentation.
> 
> Thank you. As a long time user of Qubes OS I don't see how I could do
> without it so I'm happy to help the community here. Kind of "giving
> back" as you say. I'm sure it applies to the other users who helped you
> as well.
> 
> > While I have a computer background, my entire career was spend in the 
> > software/research environment, I do not have a background in PC/Linux 
> > internals (though decades ago I did acquire some Unix sys-admin knowledge). 
> > That means I came to Qubes without the the in-depth security knowledge that 
> > the more knowledgeable of you have — my knowledge is more superficial.
> > 
> > Having provided that background, I was trying to think of a way of "giving 
> > back" to this community.
> > 
> > Would a "Setting up a Semi-Secure Personal Computing Environment Using 
> > Qubes" document be a useful addition (albeit, with a more succinct title!)?
> > 
> > It would be aimed at computer users who want a more secure environment, but 
> > are willing to live with some security exposures (ones that hopefully have 
> > an exceedingly low probability of being exploited against an "average Joe") 
> > — for example, using a USB mouse and keyboard. Clearly one needs to have 
> > some degree of computer literacy to tackle switching to Qubes, but I think 
> > a step-by-step migration guide might be useful and fewer people might give 
> > up.
> > 
> > In it, I could briefly describe the "Hardware Issues" which are already 
> > well documented (hence "briefly" as they applied to me) and then get into 
> > the issues of choosing which qubes to set up, the issues of dealing with a 
> > desktop computer that only has USB mouse/keyboard capability, various 
> > user-interface issues and, perhaps more importantly, migrating data from 
> > another OS (in my case Linux Mint) to the Qubes environment.
> 
> In my opinion such document may be helpful as a blog post - but the
> problem would be visibility (only through search engines). Maybe a
> better way would be to improve the official qubes docs where you found
> things to be lacking details/clarity [1]. Some people find it easy to
> deal with the official docs, others don't. In the latter case you could
> float ideas/pull requests in the unofficial "qubes community" project
> [2] and folks there (including myself) would help you format them for
> submission to the official docs.
> 
> Writing docs can be time consuming though, so in any case spending a bit
> of time helping other people on the ML is already a nice way of "giving
> back" !
> 
> 
> [1] https://www.qubes-os.org/doc/doc-guidelines/#how-to-contribute
> [2] https://qubes-community.github.io/

Having written many technical documents over my career, I understand the 
time-consuming nature of the task. This is especially true if one cannot just 
write and publish a document, but needs to have it reviewed (and re-reviewed…).

I am willing to make that commitment. First let me do some more reading (and 
finish setting up my Qubes installation — still some odds and ends to do). Then 
I will get back to you (or via the Qubes Community link you kindly provided).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/376b3e92-c461-4975-842a-9e53ac8d9cf1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Renaming .desktop file side-effect

2019-01-16 Thread John Goold
I encountered an "interesting" phenomenon which could be a defect (bug) or 
expected behaviour (an odd "feature"). If a defect, it could be in the file 
manager under Debian (Nautilus?).

If I attempt to rename a file in ~/local/share/applications/ when I save the 
change, ".desktop" is appended to the file name. This occurs even if the name 
entered in the rename dialog already has a .desktop extension.

An example: I copied dropbox.desktop from /usr/share/applications to 
~/local/share/applications (to use as a template). Renaming it by just changing 
"dropbox" to "vuescan" resulted in vuescan.desktop.desktop.

It took me a few minutes to realize what was happening :-(  The easy workaround 
was to remove the .desktop file extension when renaming as it would 
automatically get appended.

Surely this is unexpected behaviour? Does anyone know if this is a "feature" 
and will it pop-up when attempting to rename files in other directories?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17365c91-8367-4fa5-97e1-9337fda5314c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Thank You & How to "Give Back"?

2019-01-16 Thread John Goold
I want to say thank you to those members of Qubes Users who have had the 
patience to answer my questions and solve my problems getting Qubes up and 
running. I have been particularly pleased that this is a forum where there are 
few, if any, unhelpful responses to questions and few questions/requests for 
help where the asker has not tried to find the answer in this forum or in the 
documentation.

While I have a computer background, my entire career was spend in the 
software/research environment, I do not have a background in PC/Linux internals 
(though decades ago I did acquire some Unix sys-admin knowledge). That means I 
came to Qubes without the the in-depth security knowledge that the more 
knowledgeable of you have — my knowledge is more superficial.

Having provided that background, I was trying to think of a way of "giving 
back" to this community.

Would a "Setting up a Semi-Secure Personal Computing Environment Using Qubes" 
document be a useful addition (albeit, with a more succinct title!)?

It would be aimed at computer users who want a more secure environment, but are 
willing to live with some security exposures (ones that hopefully have an 
exceedingly low probability of being exploited against an "average Joe") — for 
example, using a USB mouse and keyboard. Clearly one needs to have some degree 
of computer literacy to tackle switching to Qubes, but I think a step-by-step 
migration guide might be useful and fewer people might give up.

In it, I could briefly describe the "Hardware Issues" which are already well 
documented (hence "briefly" as they applied to me) and then get into the issues 
of choosing which qubes to set up, the issues of dealing with a desktop 
computer that only has USB mouse/keyboard capability, various user-interface 
issues and, perhaps more importantly, migrating data from another OS (in my 
case Linux Mint) to the Qubes environment.

By the way, I have Thunderbird set up with Enigmail and have my keys set up 
using Split GPG. I will be switching tho using the mailing list for 
submissions. Oh, and I am now using Qubes as my full-time computing environment 
:-)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/634fcb34-f983-4146-82ce-69e24839491d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Keyboard and mouse issue (R 4.0.1)

2019-01-16 Thread John Goold
On Wednesday, January 16, 2019 at 1:14:45 AM UTC-6, Ivan Mitev wrote:
> On 1/15/19 11:04 PM, John Goold wrote:
> > On Tuesday, January 15, 2019 at 9:08:48 AM UTC-6, Ivan Mitev wrote:
> >> On 1/15/19 2:42 PM, unman wrote:
> >>> On Tue, Jan 15, 2019 at 09:26:31AM +0200, Ivan Mitev wrote:
> >>>>
> >>>>
> >>>> On 1/15/19 3:36 AM, jrg.desk...@gmail.com wrote:
> >>>>> KEYBOARD
> >>>>>
> >>>>> How do I set the "compose" key on the keyboard? I have run several 
> >>>>> Linux distributions (base on Debian/Ubuntu) for several years and have 
> >>>>> had no problems setting a compose key so that I could enter 
> >>>>> diacriticals and symbols like the em-dash and the Spanish upside down 
> >>>>> exclamation and question marks.
> >>>>
> >>>> IIRC there's no gui setting in XFCE for setting a compose key. I don't
> >>>> use such key myself but I guess you can edit dom0's
> >>>> /etc/X11/xorg.conf.d/00-keyboard.conf and add XkbOptions there (eg.
> >>>> Option "XkbOptions" "compose:menu"). Run `grep "compose:"
> >>>> /usr/share/X11/xkb/rules/base.lst` to find what keys you can use.
> >>>>
> >>>
> >>> The default key combo is Shift+AltGR - enabled by default in X
> >>> You can also set XkbOptions compose: in /etc/default/keyboard
> >>
> >> I thought that /etc/default/keyboard was only for debian and
> >> derivatives. Are you sure it works for fedora ?
> > 
> > First things first :-)  When trying out keyboard changes, I wanted them to 
> > apply globally (they work just fine when I use setxkbmap..., thanks) and so 
> > made a change in dom0. Since the test change did not seem to work, I 
> > thought I would try a complete reboot (imagining that when dom0 starts up, 
> > it reads its configuration files and then doesn't reread them after that).
> 
> Indeed, tweaking X conf files will require a reboot in Qubes OS. With a
> standard distribution you'd log off, kill/restart the X server, and log
> in again, but if you do so in Qubes OS your VM apps won't be displayed
> anymore (not sure if it's a bug or a feature - I never log off anyway so
> it doesn't bother me).
> 
> 
> > What a surprise -- my mouse reverted to being left-handed! I have no idea 
> > why (other than the reboot) or why it reverted to right-handed (other than 
> > the sys-usb VM being set up). Any way, the problem has "gone away".
> 
> Magic :)
> 
> 
> > Now for the keyboard changes. As I indicated, I wanted to turn off the Caps 
> > Lock key and set a "compose" key.
> > 
> > I launched a dom0 terminal and sudo'ed to root. Then I edited the file 
> > "/etc/X11/xorg.conf.d/00-keyboard.conf" and added the XkbOptions line. It 
> > now reads:
> > 
> > Section "InputClass"
> > Identifier "system-keyboard"
> > MatchIsKeyboard "on"
> > Option "XkbLayout" "us"
> > Option "XkbOptions" "caps:none"
> > EndSection
> > 
> > After rebooting, the Caps Lock key is now off in all Qubes :-)  However, I 
> > am not sure of the syntax of this file and do not want to make an error in 
> > the file in case it makes my keyboard inactive.
> > 
> > Can I change that last Option line to:
> > 
> > Option "XkbOptions" "caps:none compose:menu"
> > 
> > or do need to use a comma to separate the two options (could not find this 
> > information in the Wikipedia article) OR, possibly use:
> > 
> > Option "XkbOptions" "caps:none"
> > Option "XkbOptions" "compose:menu"
> > 
> 
> You'll have to use commas - eg.
> 
> Option "XkbOptions" "caps:none,compose:menu"
> 
> In case you mess up your X config and X won't start you should see a
> text login prompt instead the graphical login; you can login and fix
> conf files from there like you did from a terminal in dom0.

Perfect! Now my keyboard settings really are global and, as such things should 
be, set in one place.

Thank you for all the help you have been giving me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4913ca1-6443-4d2a-bacc-bd38b4a7ff99%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Keyboard and mouse issue (R 4.0.1)

2019-01-15 Thread John Goold
On Tuesday, January 15, 2019 at 9:08:48 AM UTC-6, Ivan Mitev wrote:
> On 1/15/19 2:42 PM, unman wrote:
> > On Tue, Jan 15, 2019 at 09:26:31AM +0200, Ivan Mitev wrote:
> >>
> >>
> >> On 1/15/19 3:36 AM, jrg.desk...@gmail.com wrote:
> >>> KEYBOARD
> >>>
> >>> How do I set the "compose" key on the keyboard? I have run several Linux 
> >>> distributions (base on Debian/Ubuntu) for several years and have had no 
> >>> problems setting a compose key so that I could enter diacriticals and 
> >>> symbols like the em-dash and the Spanish upside down exclamation and 
> >>> question marks.
> >>
> >> IIRC there's no gui setting in XFCE for setting a compose key. I don't
> >> use such key myself but I guess you can edit dom0's
> >> /etc/X11/xorg.conf.d/00-keyboard.conf and add XkbOptions there (eg.
> >> Option "XkbOptions" "compose:menu"). Run `grep "compose:"
> >> /usr/share/X11/xkb/rules/base.lst` to find what keys you can use.
> >>
> > 
> > The default key combo is Shift+AltGR - enabled by default in X
> > You can also set XkbOptions compose: in /etc/default/keyboard
> 
> I thought that /etc/default/keyboard was only for debian and
> derivatives. Are you sure it works for fedora ?

First things first :-)  When trying out keyboard changes, I wanted them to 
apply globally (they work just fine when I use setxkbmap..., thanks) and so 
made a change in dom0. Since the test change did not seem to work, I thought I 
would try a complete reboot (imagining that when dom0 starts up, it reads its 
configuration files and then doesn't reread them after that).

What a surprise -- my mouse reverted to being left-handed! I have no idea why 
(other than the reboot) or why it reverted to right-handed (other than the 
sys-usb VM being set up). Any way, the problem has "gone away".

Now for the keyboard changes. As I indicated, I wanted to turn off the Caps 
Lock key and set a "compose" key.

I launched a dom0 terminal and sudo'ed to root. Then I edited the file 
"/etc/X11/xorg.conf.d/00-keyboard.conf" and added the XkbOptions line. It now 
reads:

Section "InputClass"
Identifier "system-keyboard"
MatchIsKeyboard "on"
Option "XkbLayout" "us"
Option "XkbOptions" "caps:none"
EndSection

After rebooting, the Caps Lock key is now off in all Qubes :-)  However, I am 
not sure of the syntax of this file and do not want to make an error in the 
file in case it makes my keyboard inactive.

Can I change that last Option line to:

Option "XkbOptions" "caps:none compose:menu"

or do need to use a comma to separate the two options (could not find this 
information in the Wikipedia article) OR, possibly use:

Option "XkbOptions" "caps:none"
Option "XkbOptions" "compose:menu"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9620fddf-1d52-4168-85cd-55fd79a46487%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to autostart a program in an appVM?

2019-01-15 Thread John Goold
On Tuesday, January 15, 2019 at 12:31:00 AM UTC-6, Ivan Mitev wrote:
> On 1/15/19 3:46 AM, jrg.desk...@gmail.com wrote:
> > I am sure almost everyone has one or more appVMs in which they autostart 
> > programs. That is, how do I set things up so that when a particular appVM 
> > is automatically launched at boot time (or I manually start it), one or 
> > more programs get started automatically? For example, in my "personal" 
> > Qube, I want Thunderbird, Slack (the collaboration tool) and Dropbox to 
> > start automatically.
> > 
> > This is another thing I did under "straight" Linux, that I cannot see how 
> > to do under Qubes. I did the RTFM and attempted to find something relevant 
> > in the qubes-users forum -- no luck (or I missed seeing anything).
> 
> You'll have to use .desktop files (as per the freedesktop "standard" [1])
> 
> For a given VM create (or copy/symlink) the .desktop file of the
> application you want to autostart in $HOME/.config/autostart/
> 
> Eg. to start thunderbird:
> 
> mkdir -p $HOME/.config/autostart/ # in case it doesn't exist yet
> 
> ln -s /usr/share/applications/mozilla-thunderbird.desktop \
>$HOME/.config/autostart/
> 
> You can of course create custom .desktop files to (auto)run arbitrary stuff.
> 
> As a side note the system-wide folder (that you'd customize in your
> templateVMs) is /etc/xdg/autostart.
> 
> 
> [1] https://specifications.freedesktop.org/desktop-entry-spec/latest/

@Ivan: Thanks, that worked just fine. I vaguely remember messing with .desktop 
files before my Linux distributions included GUI settings that handled 
autostart.

By the way, how do I "Mark as complete"?

@Alex: Thanks for responding. If I do not have to add programs for one-off 
tasks, I would rather not do so. But I will keep your suggestion in mind.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fccec703-dab2-4498-82e1-e082048167e1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: dom0 downloads, but does not update packages

2019-01-14 Thread John S.Recdep
On 1/14/19 6:07 PM, Ivan Mitev wrote:
> 
> 
> On 1/14/19 5:14 PM, meindatenschrott-re5jqeeqqe8avxtiumw...@public.gmane.org 
> wrote:
>> Had the same issue, just do "sudo dnf reinstall anaconda-core anaconda-gui 
>> ..." in dom0 and you're good to go. At least, that's what worked for me :-)
> 
> It worked for me, thanks !
> 
> Still wondering what caused that problem in the first place...
> 

mine magically disappeared  ; not sure if this had anything to do with
my fedora-29 sys-net  clock  issue  .. lol

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f871a42-afb6-340c-6b94-57402eff38ed%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: dom0 clock keeps resetting to wrong time again

2019-01-14 Thread John S.Recdep
On 1/14/19 10:10 AM, John S.Recdep wrote:
> Hello,
> 
> I believe my Bios time is UTC
> 
> qubes-prefs shows my clockvm  as sys-net
> 
> I have been trying to use sudo date --set <"localtime TZ">  to get my
> dom0 correct.  Which it does but within 30-60  it is changing to another
> TZ I don't recognize
> 
> I have also tried  qvm-sync-clock  ,  and tried a qubes group search as
> I remember fighting this out many times   with whonix  issues , however
> 
> I am at a loss what to do further to problem-solve fix this  ,
> appreciate your help
> 
> 
> maybe I can switch the template for sys-net back to fedora-28 instead of
> -29  . ?
> 

1-14-19

changing the clockvm to fed-28 and rerunning qvm-sync-clock did nothing
BUT*  changing sys-net to debian-9  and qvm-sync-clock  fixed it   sigh

case anyone else gets this issue again ; prolly will fix whonixcheck
complaints if any as well

'solved'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/78758e3e-d21c-83c0-a1c4-29ee767f1d5d%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] dom0 clock keeps resetting to wrong time again

2019-01-14 Thread John S.Recdep
Hello,

I believe my Bios time is UTC

qubes-prefs shows my clockvm  as sys-net

I have been trying to use sudo date --set <"localtime TZ">  to get my
dom0 correct.  Which it does but within 30-60  it is changing to another
TZ I don't recognize

I have also tried  qvm-sync-clock  ,  and tried a qubes group search as
I remember fighting this out many times   with whonix  issues , however

I am at a loss what to do further to problem-solve fix this  ,
appreciate your help


maybe I can switch the template for sys-net back to fedora-28 instead of
-29  . ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d55807e7-39de-1845-810c-9fe9102c226b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: sys-whonix-14 updates issues

2019-01-13 Thread John S.Recdep
On 1/13/19 6:24 AM, John S.Recdep wrote:
> On 1/13/19 8:01 AM, Mathew wrote:
>> Hello,
>>
>> Just to know if there is a solution for whonix-gw/whonix-ws updates ?
>> Noted that I can update/upgrade sys-whonix-14 without any problems ! I have 
>> to do it again after rebooting though.
>>
>> $ sudo apt-get-update-plus dist-upgrade
>> WARNING: Execution of /usr/bin/apt-get prevented by /etc/uwt.d/40_qubes.conf 
>> because no torified Qubes updates proxy found.
>>
>> Please make sure Whonix-Gateway (commonly called sys-whonix) is running.
>>
>> - If you are using Qubes R3.2: The NetVM of this TemplateVM should be set to 
>> Whonix-Gateway (commonly called sys-whonix).
>>
>> - If you are using Qubes R4 or higher: Check your _dom0_ 
>> /etc/qubes-rpc/policy/qubes.UpdatesProxy settings.
>>
>> _At the very top_ of that file.
>>
>> Should have the following syntax:
>> Name-Of-Whonix-TemplateVM $default 
>> allow,target=Whonix-Gateway-TemplateBased-ProxyVM
>>
>> Example entry for Whonix-Gateway TemplateVM:
>> whonix-gw-14 $default allow,target=sys-whonix
>>
>> Example entry for Whonix-Workstation TemplateVM:
>> whonix-ws-14 $default allow,target=sys-whonix
>>
>> Try running in Whonix-Gateway (commonly called sys-whonix):
>> sudo systemctl restart qubes-whonix-torified-updates-proxy-check
>>
>> If this warning message is transient, it can be safely ignored.
>>
>> Thanks !
>>
>> Regards,
>> Mathew
>>
> 
> 
> what is this all about, your telling people who may be having problems
> what to do, but your not having a problem? am confused
> 
> because I am unable to sudo apt-get update whonix-gw-14  which I am
> trying to do because it's complaining again about time issues, and the
> pop up suggestion doesn't fix the problemsigh
> 
user@host:~$ sudo apt-get update
Ign:1 http://deb.whonix.org stretch InRelease


Ign:2 http://security.debian.org stretch/updates InRelease


Ign:3 http://deb.qubes-os.org/r4.0/vm stretch InRelease

Ign:4 http://ftp.us.debian.org/debian stretch InRelease

Err:5 http://deb.whonix.org stretch Release


  500  Unable to connect
Err:6 http://ftp.us.debian.org/debian stretch Release


  500  Unable to connect
Err:7 http://security.debian.org stretch/updates Release

  500  Unable to connect
Err:8 http://deb.qubes-os.org/r4.0/vm stretch Release

  500  Unable to connect
Ign:9
tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion
stretch InRelease
Ign:10 tor+http://vwakviie2ienjx6t.onion/debian stretch InRelease
Ign:11 tor+http://sgvtcaew4bxjd7ln.onion stretch/updates InRelease
Err:12 tor+http://sgvtcaew4bxjd7ln.onion stretch/updates Release
  Connection failed
Err:13
tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion
stretch Release
  Connection failed
Err:14 tor+http://vwakviie2ienjx6t.onion/debian stretch Release
  Connection failed
Reading package lists... Done
E: The repository 'http://deb.whonix.org stretch Release' does no longer
have a Release file.
N: Updating from such a repository can't be done securely, and is
therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user
configuration details.
E: The repository 'http://ftp.us.debian.org/debian stretch Release' does
no longer have a Release file.
N: Updating from such a repository can't be done securely, and is
therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user
configuration details.
E: The repository 'http://security.debian.org stretch/updates Release'
does no longer have a Release file.
N: Updating from such a repository can't be done securely, and is
therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user
configuration details.
E: The repository 'http://deb.qubes-os.org/r4.0/vm stretch Release' does
no longer have a Release file.
N: Updating from such a repository can't be done securely, and is
therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user
configuration details.
E: The repository 'tor+http://sgvtcaew4bxjd7ln.onion stretch/updates
Release' does no longer have a Release file.
N: Updating from such a repository can't be done securely, and is
therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user
configuration details.
E: The repository
'tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion
stretch Release' does no longer have a Release file.
N: Updating from such a repository can't be done securely, and is
therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user
configuration details.
E: The repository 'tor+http://vwakviie2ienjx6t.onion/debian stretch
Release' does 

[qubes-users] Re: sys-whonix-14 updates issues

2019-01-13 Thread John S.Recdep
On 1/13/19 8:01 AM, Mathew wrote:
> Hello,
> 
> Just to know if there is a solution for whonix-gw/whonix-ws updates ?
> Noted that I can update/upgrade sys-whonix-14 without any problems ! I have 
> to do it again after rebooting though.
> 
> $ sudo apt-get-update-plus dist-upgrade
> WARNING: Execution of /usr/bin/apt-get prevented by /etc/uwt.d/40_qubes.conf 
> because no torified Qubes updates proxy found.
> 
> Please make sure Whonix-Gateway (commonly called sys-whonix) is running.
> 
> - If you are using Qubes R3.2: The NetVM of this TemplateVM should be set to 
> Whonix-Gateway (commonly called sys-whonix).
> 
> - If you are using Qubes R4 or higher: Check your _dom0_ 
> /etc/qubes-rpc/policy/qubes.UpdatesProxy settings.
> 
> _At the very top_ of that file.
> 
> Should have the following syntax:
> Name-Of-Whonix-TemplateVM $default 
> allow,target=Whonix-Gateway-TemplateBased-ProxyVM
> 
> Example entry for Whonix-Gateway TemplateVM:
> whonix-gw-14 $default allow,target=sys-whonix
> 
> Example entry for Whonix-Workstation TemplateVM:
> whonix-ws-14 $default allow,target=sys-whonix
> 
> Try running in Whonix-Gateway (commonly called sys-whonix):
> sudo systemctl restart qubes-whonix-torified-updates-proxy-check
> 
> If this warning message is transient, it can be safely ignored.
> 
> Thanks !
> 
> Regards,
> Mathew
> 


what is this all about, your telling people who may be having problems
what to do, but your not having a problem? am confused

because I am unable to sudo apt-get update whonix-gw-14  which I am
trying to do because it's complaining again about time issues, and the
pop up suggestion doesn't fix the problemsigh

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0b86093-4b26-6e0d-2164-440e595a831b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: dom0 downloads, but does not update packages

2019-01-13 Thread John S.Recdep
On 1/13/19 11:04 AM, pixel fairy wrote:
> heres the output of qubes-dom0-update. it just stops after downloading. done 
> this for at least a week. 
> 
> Fedora 25 - x86_64  913 kB/s |  50 MB 00:56   
>  
> Qubes Dom0 Repository (updates) 686 kB/s | 8.0 MB 00:11   
>  
> determining the fastest mirror (15 hosts).. done..5 kB/s | 2.7 kB 00:00 
> ETA
> Qubes Templates repository  1.7 kB/s |  10 kB 00:06   
>  
> Last metadata expiration check: 0:00:01 ago on Sun Jan 13 12:53:10 2019.
> Dependencies resolved.
> 
>  Package  Arch   Version   Repository  
> Size
> 
> Reinstalling:
>  anaconda-corex86_64 1000:25.20.9-14.fc25  qubes-dom0-current 1.5 
> M
>  anaconda-gui x86_64 1000:25.20.9-14.fc25  qubes-dom0-current 386 
> k
>  anaconda-tui x86_64 1000:25.20.9-14.fc25  qubes-dom0-current 186 
> k
>  anaconda-widgets x86_64 1000:25.20.9-14.fc25  qubes-dom0-current 119 
> k
>  python3-blivet   noarch 2:2.1.6-5.fc25qubes-dom0-current 1.0 
> M
>  python3-kickstartnoarch 1000:2.32-4.fc25  qubes-dom0-current 370 
> k
>  qubes-anaconda-addon noarch 4.0.9-1.fc25  qubes-dom0-current  34 
> k
>  xorg-x11-drv-ati x86_64 18.0.1-1.fc25 qubes-dom0-current 168 
> k
>  xorg-x11-drv-intel   x86_64 2.99.917-32.20171025.fc25 qubes-dom0-current 696 
> k
> 
> Transaction Summary
> 
> 
> Total download size: 4.4 M
> Installed size: 4.4 M
> DNF will only download packages for the transaction.
> Downloading Packages:
> (1/9): anaconda-tui-25.20.9-14.fc25.x86_64.rpm  136 kB/s | 186 kB 00:01   
>  
> (2/9): anaconda-widgets-25.20.9-14.fc25.x86_64. 709 kB/s | 119 kB 00:00   
>  
> (3/9): anaconda-gui-25.20.9-14.fc25.x86_64.rpm  231 kB/s | 386 kB 00:01   
>  
> (4/9): python3-blivet-2.1.6-5.fc25.noarch.rpm   914 kB/s | 1.0 MB 00:01   
>  
> (5/9): python3-kickstart-2.32-4.fc25.noarch.rpm 367 kB/s | 370 kB 00:01   
>  
> (6/9): qubes-anaconda-addon-4.0.9-1.fc25.noarch 585 kB/s |  34 kB 00:00   
>  
> (7/9): anaconda-core-25.20.9-14.fc25.x86_64.rpm 543 kB/s | 1.5 MB 00:02   
>  
> (8/9): xorg-x11-drv-ati-18.0.1-1.fc25.x86_64.rp 512 kB/s | 168 kB 00:00   
>  
> (9/9): xorg-x11-drv-intel-2.99.917-32.20171025. 1.1 MB/s | 696 kB 00:00   
>  
> 
> Total   860 kB/s | 4.4 MB 00:05   
>   
> Complete!
> The downloaded packages were saved in cache until the next successful 
> transaction.
> You can remove cached packages by executing 'dnf clean packages'.
> Qubes OS Repository for Dom0   27 MB/s |  37 kB 00:00 
>
> 


ya I've got same thing except mine is just the two python  packages,  I
posted here, but no one  seems to have  answered  my query

this persists through reboot of the 4.0.1  system


now I am having whonix-14-gw  unable to update as well, though, doubtful
they are related

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/679cffec-1703-5c38-acf5-a54c34c8a9b8%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Using a Desktop Computer with Qubes (R 4.0.1)

2019-01-13 Thread John Goold
On Sunday, 13 January 2019 17:56:10 UTC-3:30, John Goold  wrote:
> On Sunday, 13 January 2019 15:50:13 UTC-3:30, 799  wrote:
> > Hello John,
> > 
> > 
> > welcome to Qubes ;-)
> > 
> > 
> > 
> > On Sun, 13 Jan 2019 at 18:49, John Goold  wrote:
> > 
> > This leads to my first issue:
> > 
> > I seem unable to attach my scanner (it is a ScanSnap ix800 which is not a 
> > printer/scanner/copier, just a scanner) to an appVM. It does not appear in 
> > the Dom0 devices menu. If I plug in a USB drive, the drive shows up in the 
> > menu.
> > 
> > Is there a straightforward way to attach the scanner to an appVM (it will 
> > not be a server, but will always be the same appVM, "personal")?
> > 
> > 
> > 
> > I am not sure if I have understand you correctly, have you chosen to 
> > install a sys-usb-qube?
> > If you didn't you can also do  this after the installation.
> > If you chose not to use sys-usb, you could try to pass through one of the 
> > usb-controllers to the AppVM to which you connect the scanner to.
> > I have never used an Intel NUC before, but in case that you can run a Qube 
> > like sys-usb I suggest doing so.
> > You can then run the following command from dom0:
> > 
> > 
> > qvm-usb
> > 
> > 
> > then attach the scanner to the AppVM
> > qvm-usb attach  sys-usb:NR-NR
> >  
> > 2. I like to listen to a classical music radio station (CBC Music) and, 
> > when it is broadcasting other "stuff", streaming classical music from their 
> > website.
> > 
> > I can play YouTube videos, including hearing the audio, but the above does 
> > not work (the website page gets stuck loading/waiting for an audio stream).
> > 
> > 
> > 
> > Can you send me the link of the radio station you're trying to listen to?
> > I'll give it a try to listen to it in my multimedia AppVM which is based on 
> > my howto here:
> > https://www.qubes-os.org/doc/multimedia/
> > 
> > 
> > - O
> 
> Just discovered that there is only one USB controller (but 4 USB connector 
> sockets). So when I tried to attach the USB controller to the appVM (had to 
> set it to HVM), I lost the mouse and keyboard :-(
> 
> I have got the impression from reading the documentation and posts to this 
> forum that if I have disk encryption enabled, that I cannot create a sys-usb 
> VM without losing the mouse+keyboard (and possibly not being able to enter 
> the pass-phrase when powering up.
> 
> The radio station is:   https://www.cbc.ca/listen/live/cbcmusic
> 
> The streaming music is: https://www.cbcmusic.ca/music-streams
> 
> Thank you for responding...

@799 I followed your multi-media templateVM how-to document. I installed VLC 
(haven't tried it yet) and Google Chrome.

I do not know if it was the library that was added, but I can now listen to the 
radio and streaming music.

I prefer Banshee to play my music which is all ripped from physical CDs I have 
bought over the decades (the sites I mentioned are the only ones I stream). 
However, I will check out VLC and see if it can handle my music library (it is 
organized differently than the organizations normally supported by music 
players, which is why I prefer Banshee -- I organized it using Banshee).

VLC definitely works (tried "opening a folder"). I will have to learn how to 
navigate my library with it.

THANK YOU.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3726ec26-c686-4a3a-ae11-33f09bf6a925%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Using a Desktop Computer with Qubes (R 4.0.1)

2019-01-13 Thread John Goold
On Sunday, 13 January 2019 15:50:13 UTC-3:30, 799  wrote:
> Hello John,
> 
> 
> welcome to Qubes ;-)
> 
> 
> 
> On Sun, 13 Jan 2019 at 18:49, John Goold  wrote:
> 
> This leads to my first issue:
> 
> I seem unable to attach my scanner (it is a ScanSnap ix800 which is not a 
> printer/scanner/copier, just a scanner) to an appVM. It does not appear in 
> the Dom0 devices menu. If I plug in a USB drive, the drive shows up in the 
> menu.
> 
> Is there a straightforward way to attach the scanner to an appVM (it will not 
> be a server, but will always be the same appVM, "personal")?
> 
> 
> 
> I am not sure if I have understand you correctly, have you chosen to install 
> a sys-usb-qube?
> If you didn't you can also do  this after the installation.
> If you chose not to use sys-usb, you could try to pass through one of the 
> usb-controllers to the AppVM to which you connect the scanner to.
> I have never used an Intel NUC before, but in case that you can run a Qube 
> like sys-usb I suggest doing so.
> You can then run the following command from dom0:
> 
> 
> qvm-usb
> 
> 
> then attach the scanner to the AppVM
> qvm-usb attach  sys-usb:NR-NR
>  
> 2. I like to listen to a classical music radio station (CBC Music) and, when 
> it is broadcasting other "stuff", streaming classical music from their 
> website.
> 
> I can play YouTube videos, including hearing the audio, but the above does 
> not work (the website page gets stuck loading/waiting for an audio stream).
> 
> 
> 
> Can you send me the link of the radio station you're trying to listen to?
> I'll give it a try to listen to it in my multimedia AppVM which is based on 
> my howto here:
> https://www.qubes-os.org/doc/multimedia/
> 
> 
> - O

Just discovered that there is only one USB controller (but 4 USB connector 
sockets). So when I tried to attach the USB controller to the appVM (had to set 
it to HVM), I lost the mouse and keyboard :-(

I have got the impression from reading the documentation and posts to this 
forum that if I have disk encryption enabled, that I cannot create a sys-usb VM 
without losing the mouse+keyboard (and possibly not being able to enter the 
pass-phrase when powering up.

The radio station is:   https://www.cbc.ca/listen/live/cbcmusic

The streaming music is: https://www.cbcmusic.ca/music-streams

Thank you for responding...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed93da87-501b-4c02-b5ba-7548d65a9619%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Using a Desktop Computer with Qubes (R 4.0.1)

2019-01-13 Thread John Goold
I am one of those Qubes newbies. I do have a "computer" background, having 
started out on Mainframe computers — I have been retired for over 20 years; 
however, I now use my computer as a tool (though I do some website development 
to keep the neurons firing). I do not need a highly locked down computer, but 
do want to use whatever security improvements I can reasonably get with Qubes 
without the set-up and maintenance becoming a full-time job. I also prefer to 
using a GUI when possible (spent decades using terminals).
___

Normally I would post each issue as a separate post to a forum such as this; 
however, these are all related to the "Subject" and my getting started. I 
always try searching for similar issues before posting, but (here) have not 
found solutions (either here or in the documentation).


1. The NUC is an Intel desktop computer with a nice small foot-print (Intel 
NUC7i7 BNH with 512 GB SSD and 32GB RAM). The only mouse and keyboard that 
works are USB (there is no PS/1 port) — possibly bluetooth devices would work 
but I do not want to get into the issues involved (I do use an Apple bluetooth 
keyboard with Linux Mint on my HP laptop).

My disk is encrypted and the installation nicely reminded me of the warnings in 
this forum about setting up sys-usb — so sys-usb is a non-starter. This leads 
to my first issue:

I seem unable to attach my scanner (it is a ScanSnap ix800 which is not a 
printer/scanner/copier, just a scanner) to an appVM. It does not appear in the 
Dom0 devices menu. If I plug in a USB drive, the drive shows up in the menu.

Is there a straightforward way to attach the scanner to an appVM (it will not 
be a server, but will always be the same appVM, "personal")?

2. I like to listen to a classical music radio station (CBC Music) and, when it 
is broadcasting other "stuff", streaming classical music from their website.

I can play YouTube videos, including hearing the audio, but the above does not 
work (the website page gets stuck loading/waiting for an audio stream).

I imagine this has something to do with proxy settings. Is this correct? I have 
created an appVM ("entertainment") specifically to handle playing music, so I 
am not worried about it getting compromised because I use less secure settings 
for it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b599cb54-08f0-4703-a375-d67458823c1e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: 4.0.1-RC2 Boot loop after install

2019-01-13 Thread John Goold
On Thursday, 27 December 2018 20:49:14 UTC-3:30, John Goold  wrote:
> On Thursday, 27 December 2018 16:24:23 UTC-3:30, Marek Marczykowski-Górecki  
> wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> > 
> > On Wed, Dec 26, 2018 at 09:24:01AM -0800, John Goold wrote:
> > > On Thursday, 20 December 2018 22:02:00 UTC-3:30, John Goold  wrote:
> > > > Attached is screenshot, taken under my current OS, showing OS and 
> > > > hardware info.
> > > > 
> > > > After spending much too much time trying to track the problem down 
> > > > (using the 4.0, 4.0.1-RC1 and 4.0.1-RC2 ISOs) I discovered why getting 
> > > > the installer to run was failing...
> > > > 
> > > > I had to unplug my external monitor (connected via an HDMI port).
> > > > 
> > > > I was then able to boot the install DVD and install to an external USB 
> > > > (SSD) drive (Seagate 2 TB). The install completed (supposedly 
> > > > successfully), but attempts to boot from the USB drive fail.
> > > > 
> > > > The boot process starts, with text being displayed starting in the top 
> > > > left corner of the screen. It progresses to a point, then the screen 
> > > > goes black and my computer starts to reboot.
> > > > 
> > > > I have searched the mailing list and have failed to find a solution 
> > > > (hours spent doing this). A lot of people seem to end up in boot-loops, 
> > > > using various hardware.
> > > > 
> > > > The attached file shows the hardware. The following information about 
> > > > the BIOS/Firmware may be relevant:
> > > > 
> > > > * Legacy Boot is enabled
> > > > * Virtualization Technology is enabled
> > > > 
> > > > During the install I setup a user account. I did not enable disk 
> > > > encryption (I will leave that until after I can get Qubes to boot).
> > > > 
> > > > Comment: This boot-loop problem (or similar boot-loop problems) seems 
> > > > to be a major issue with installing Qubes 4.x. Each time I come across 
> > > > a posting about it, there seem to be different suggestions (some of 
> > > > which work on the particular hardware involved) and some of which do 
> > > > not.
> > > > 
> > > > I believe that I tried R3.1 about a year or so ago and that it booted 
> > > > alright. I cannot remember why I did not follow through on adopting 
> > > > Qubes (if I could not get my external monitor working, that would be a 
> > > > deal-breaker).
> > > > 
> > > > Suggestions would be appreciated. I will provide any additional 
> > > > information I am capable of.
> > > 
> > > This thread is getting verbose, so I have replied to the original post 
> > > and will attempt a brief summary of the rest of the thread (for context):
> > > 
> > > Determining what is happening would be facilitated by seeing any entries 
> > > in log files (assuming the boot got far enough to log anything).
> > > 
> > > That means checking files on the USB drive used as the target of the 
> > > install and which causes the boot-loop when attempting to boot.
> > > 
> > > Since the boot is failing, I cannot look at the log files under the 
> > > booted Qubes OS, so instead I attempted to look for the log files when 
> > > booted into another OS (Linux Mint 19.1).
> > > 
> > > Qubes is using LVM to handle allocating disk space (presumably to 
> > > facilitate being able to add additional physical disks to an existing 
> > > Qubes install). There appeared, at first glance to be 3 Logical volumes:
> > > 
> > > pool00
> > > root
> > > swap
> > > 
> > > Linux Mint mounted the LV "swap" automatically, but not the other two. 
> > > The other two appear not to be "activated" and mount attempts failed. 
> > > Attempts to "activate" the LVs fail.
> > > 
> > > After searching the Net for information on LVM, I came across an article 
> > > that helped me understand the Qubes setup better…
> > > 
> > > There is one Logical Volume Group called "qubes_dom0".
> > > Within that there is a Logical Volume, "swap", that is detected and 
> > > mounted automatically by my Linux Mint installation.
> > > Additionally, there is a "Thin Pool" allocated that uses up the re

[qubes-users] Re: Cannot Update Fedora-29 and Debian-9 on 4.0.1

2019-01-11 Thread John S.Recdep
On 1/11/19 8:08 AM,
scoobyscrappy-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:
> Hello,
> 
> I am a new user to Qubes and I like it very much.
> 
> I am on 4.0.1 and I am unable to update the Fedora-29 and Debian-9 templates. 
>  Below are the errors for both:
> 
> Fedora-29:
> 
> Fedora Modular 29 - x86_64
> Error: Failed to synchronize cache for repo 'fedora-modular'
> Done.
> 
> Debian-9 (snippet):
> 
> Err:3 http://deb.qubes-os.org/r4.0/vm stretch Release
>   500 Unable to connect
> Err:6 https://deb.debian.org/debian stretch Release
>   Received HTTP code 500 from proxy after CONNECT
> Err:7 https://deb.debian.org/debian-security stretch/updates Release
>   Received HTTP code 500 from proxy after CONNECT
> Err:8 https://deb.debian.org/debian jessie-backports Release
>   Received HTTP code 500 from proxy after CONNECT
> E: The repository 'http://deb.qubes-os.org/r4.0/vm stretch Release' does no 
> longer have a Release file.
> E: The repository 'https://deb.debian.org/debian stretch Release' does no 
> longer have a Release file.
> E: The repository 'https://deb.debian.org/debian-security stretch/updates 
> Release' does no longer have a Release file.
> E: The repository 'https://deb.debian.org/debian jessie-backports Release' 
> does no longer have a Release file.
> 
> TIA
> 

try doing it via a terminal in the templates

$sudo dnf update

$sudo apt-get update
sudo apt-get dist-upgrade

fwiw for myself, the qubes manager fails or is so slow I only use it to
make appvms or change/add applications  lately


so I guess this is a new install of yours?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cd0a9206-336a-3512-7124-b42d1607d69b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: dom0 update: sys-whonix: command failed with code: 1

2019-01-10 Thread John S.Recdep
On 1/8/19 9:19 AM, John S.Recdep wrote:
> On 1/2/19 8:20 AM, John S.Recdep wrote:
>> On 1/1/19 12:29 PM, qubes-fan-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org 
>> wrote:
>>> Hi, during dom0 update I get following output:
>>>
>>> $ sudo qubes-dom0-update
>>> Using sys-whonix as UpdateVM to download updates fro dom0; this may take 
>>> some time...
>>> sys-whonix: command failed with code: 1
>>> No new updates available
>>> Qubes OS Repository for Dom0  23 MB/s | 52 kB
>>>
>>> The update than goes as normal. What does that mean and is there any action 
>>> needed from my side?
>>>
>>
>> ditto here except mine is sys-net  code:1
>>
>> fwiw
>>
> 
> 
> Is this also in testing  or  can someone help / advise a fix to this ?
> my updatevm per qubes-prefs is sys-net   but I always thought that other
> file had it set up to use  sys-whonix-14
> 
> haven't had any issues with previous  qubes updates
> 
> I am running
> $sudo qubes-dom0-update  and getting
> 
> 
> 
> Using sys-net as UpdateVM to download updates
> 
> sys-net: command failed with code: 1
> 
> 
> Last metadata expiration check: 0:09:40 ago on Tue Jan  8 08:59:27 2019.
> 
> Dependencies resolved.
> 
> 
> 
>  Package  Arch  Version Repository
>Size
> 
> 
> 
> Reinstalling:
> 
>  python3-blivet   noarch2:2.1.6-5.fc25  qubes-dom0-current
>   1.0 M
> 
>  python3-kickstartnoarch1000:2.32-4.fc25qubes-dom0-current
>   370 k
> 
> 
> 
> Transaction Summary
> 
> 
> 
> 
> 
> Total size: 1.3 M
> 
> Installed size: 1.3 M
> 
> DNF will only download packages for the transaction.
> 
> Downloading Packages:
> 
> [SKIPPED] python3-blivet-2.1.6-5.fc25.noarch.rpm: Already downloaded
> 
> 
> [SKIPPED] python3-kickstart-2.32-4.fc25.noarch.rpm: Already downloaded
> 
> 
> Complete!
> 
> The downloaded packages were saved in cache until the next successful
> transaction.
> 
> You can remove cached packages by executing 'dnf clean packages'.
> 
> 


Sorry what exactly does this mean ?  After reboot, it now says it is
reinstalling   the two python packages and "saved in cache until "

no code 1 message, but I've never seen this before when running


sudo qubes-dom0-update



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ef644b45-d17b-0e91-4ec5-1d9974c42b86%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: dom0 update: sys-whonix: command failed with code: 1

2019-01-08 Thread John S.Recdep
On 1/2/19 8:20 AM, John S.Recdep wrote:
> On 1/1/19 12:29 PM, qubes-fan-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org 
> wrote:
>> Hi, during dom0 update I get following output:
>>
>> $ sudo qubes-dom0-update
>> Using sys-whonix as UpdateVM to download updates fro dom0; this may take 
>> some time...
>> sys-whonix: command failed with code: 1
>> No new updates available
>> Qubes OS Repository for Dom0  23 MB/s | 52 kB
>>
>> The update than goes as normal. What does that mean and is there any action 
>> needed from my side?
>>
> 
> ditto here except mine is sys-net  code:1
> 
> fwiw
> 


Is this also in testing  or  can someone help / advise a fix to this ?
my updatevm per qubes-prefs is sys-net   but I always thought that other
file had it set up to use  sys-whonix-14

haven't had any issues with previous  qubes updates

I am running
$sudo qubes-dom0-update  and getting



Using sys-net as UpdateVM to download updates

sys-net: command failed with code: 1


Last metadata expiration check: 0:09:40 ago on Tue Jan  8 08:59:27 2019.

Dependencies resolved.



 Package  Arch  Version Repository
   Size



Reinstalling:

 python3-blivet   noarch2:2.1.6-5.fc25  qubes-dom0-current
  1.0 M

 python3-kickstartnoarch1000:2.32-4.fc25qubes-dom0-current
  370 k



Transaction Summary





Total size: 1.3 M

Installed size: 1.3 M

DNF will only download packages for the transaction.

Downloading Packages:

[SKIPPED] python3-blivet-2.1.6-5.fc25.noarch.rpm: Already downloaded


[SKIPPED] python3-kickstart-2.32-4.fc25.noarch.rpm: Already downloaded


Complete!

The downloaded packages were saved in cache until the next successful
transaction.

You can remove cached packages by executing 'dnf clean packages'.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ca9a4033-183d-dee5-28d4-d0f0d92d4bda%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: fed29 templates/upgrade

2019-01-05 Thread John S.Recdep
On 1/4/19 2:34 AM, unman wrote:
> dnf repoquery --qf "%{name}" --userinstalled

this works then using the grep command

of interesting note is that of the few packages found is pulseaudio-qubes

which I think I accidentally autoremoved and had to reinstall so maybe
it got a new name or package name, but doesn't mean I must install it
again in fed-29 template

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7bf1bd60-986f-2823-e963-1d0b5dfd8427%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: fed29 templates/upgrade

2019-01-05 Thread John S.Recdep
On 1/5/19 12:26 AM, 799 wrote:
> Hello,
> 
> Am Sa., 5. Jan. 2019, 05:01 hat John S.Recdep 
> 
> geschrieben:
> 
>> [...]
>> BTW all: no luck with the suggested methods of determining what extra
>> packages I may have installed in the fedora-28 Template . but I'll
>> just live with the fresh fedora-29 template
> 
> 
> I had the same problem and that's why I am setting up my templates only via
> scripts which I can run from dom0.
> This improves speed to rebuild templates and also I know exactly what I
> have installed.
> 
> What you can do to get the differences between two templates:
> 
> 1) run "dnf list installed > packagelist1.txt
> Do the same in the other VM
> 
> 2) compare both lists:
> grep -Fxv -f packagelist1.txt packagelist2.txt
> 
> - O
> 

I'm running this in fed-28 terminal and fed-29 template terminal ; mv
file2 to the other template  but your grep cmd is just showing a list of
all packages, maybe because of the version update numerical changes ...
guess I can look back at previous post of how to remove the version
change numbers, if it might matter

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/46304afe-f53d-1c09-6849-d0edd4cfeb1a%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: fed29 templates/upgrade

2019-01-04 Thread John S.Recdep
On 1/4/19 5:00 PM, Andrew David Wong wrote:
> On 1/4/19 1:13 PM, John S.Recdep wrote:
>> On 1/4/19 1:37 AM, Andrew David Wong wrote:
>>> On 1/3/19 11:31 PM, John S.Recdep wrote:
>>>> On 1/3/19 2:51 PM,
>>>> 22rip-2xk3N/kkaK1Wk0Htik3J/w...@public.gmane.org wrote:
>>>>> Thanks 799...I learned something!
>>>>>
>>>>> Similar to 799 but less hardcore...I always download a fresh 
>>>>> template(vs upgrade). In my case I ran with a full/fresh 
>>>>> Fedora-29 after the Fedora-28 hplip issues, and added any
>>>>> new software from fresh:
>>>>>
>>>>> https://www.qubes-os.org/doc/templates/
>>>>>
>>>
>>>
>>>> hmm, ok let's say I just use the new fresh 29 template, is
>>>> there some way that I can know what non-stock software I
>>>> installed on my Fedora-28 template, as I can't remember all
>>>> that I may have installed 
>>>
>>>
>>> This is more of a Fedora question than a Qubes question. As far
>>> as I know, there isn't a clean way to do this. Following Marek's
>>> advice from years ago, I just keep a list of the packages that I
>>> install in each of my templates.
>>>
>>>
>>>> So, no advice on upgrading from my 28 template at this time? I
>>>> find it strange that the template is in the dom0 updates
>>>> available, but I see no notice  in the news section on qubes
>>>> website nor here ..
>>>
>>>
>>> See:
>>>
>>> https://github.com/QubesOS/qubes-issues/issues/4223
>>>
>>> and
>>>
>>> https://github.com/QubesOS/qubes-doc/pull/739
> 
>> So, Andrew does this mean that although the Fedora-29 Template is 
>> available via sudo qubes-dom0-update  that it still has issues and
>> hence it is not officially advisable to use it ? ( whether via
>> 'fresh' d/l nor 'upgrades' ? )
> 
>> Forgive me, am just a layman, not sure what I would expect to
>> interpret from the github links (perhaps the fact that there are
>> any issues provides the answer?)
> 
>> My repos are just the default qubes 4.0+ versions
> 
> 
> Well, you said you found it strange that there was no documentation or
> announcement for the Fedora 29 template. These links show why: the
> documentation is still being worked on, and the necessary steps prior to
> the announcement have not yet been completed. (In fact, at the time of
> this writing, the issue still indicates that the template has not yet
> migrated to the stable repo, which appears to be false.)
> 
> In order to avoid this sort of confusion in the future, perhaps we
> should refrain from migrating new templates to the stable repo until
> documentation and an announcement are ready to be published, then do
> it all simultaneously. What do you think, Marek?
> 
> 

OK understood, thx for the clarification.


BTW all: no luck with the suggested methods of determining what extra
packages I may have installed in the fedora-28 Template . but I'll
just live with the fresh fedora-29 template

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ecccbac3-75a7-31d0-c181-db9e172e6a72%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: fed29 templates/upgrade

2019-01-04 Thread John S.Recdep
On 1/4/19 1:37 AM, Andrew David Wong wrote:
> On 1/3/19 11:31 PM, John S.Recdep wrote:
>> On 1/3/19 2:51 PM, 22rip-2xk3N/kkaK1Wk0Htik3J/w...@public.gmane.org
>> wrote:
>>> Thanks 799...I learned something!
>>>
>>> Similar to 799 but less hardcore...I always download a fresh
>>> template(vs upgrade). In my case I ran with a full/fresh
>>> Fedora-29 after the Fedora-28 hplip issues, and added any new
>>> software from fresh:
>>>
>>> https://www.qubes-os.org/doc/templates/
>>>
> 
> 
>> hmm, ok let's say I just use the new fresh 29 template, is there
>> some way that I can know what non-stock software I installed on my
>> Fedora-28 template, as I can't remember all that I may have
>> installed 
> 
> 
> This is more of a Fedora question than a Qubes question. As far as I
> know, there isn't a clean way to do this. Following Marek's advice
> from years ago, I just keep a list of the packages that I install in
> each of my templates.
> 
> 
>> So, no advice on upgrading from my 28 template at this time? I find
>> it strange that the template is in the dom0 updates available, but
>> I see no notice  in the news section on qubes website nor here
>> ..
> 
> 
> See:
> 
> https://github.com/QubesOS/qubes-issues/issues/4223
> 
> and
> 
> https://github.com/QubesOS/qubes-doc/pull/739

So, Andrew does this mean that although the Fedora-29 Template is
available via sudo qubes-dom0-update  that it still has issues and hence
it is not officially advisable to use it ? ( whether via 'fresh' d/l nor
'upgrades' ? )

Forgive me, am just a layman, not sure what I would expect to interpret
from the github links (perhaps the fact that there are any issues
provides the answer?)

My repos are just the default qubes 4.0+ versions



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a7ea5b94-5d94-0b0e-7125-8f66092507ba%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: fed29 templates/upgrade

2019-01-03 Thread John S.Recdep
On 1/3/19 2:51 PM, 22rip-2xk3N/kkaK1Wk0Htik3J/w...@public.gmane.org wrote:
> Thanks 799...I learned something!
> 
> Similar to 799 but less hardcore...I always download a fresh template(vs 
> upgrade). In my case I ran with a full/fresh Fedora-29 after the Fedora-28 
> hplip issues, and added any new software from fresh:
> 
> https://www.qubes-os.org/doc/templates/
> 


hmm, ok let's say I just use the new fresh 29 template, is there some
way that I can know what non-stock software I installed on my Fedora-28
template, as I can't remember all that I may have installed 


So, no advice on upgrading from my 28 template at this time? I find it
strange that the template is in the dom0 updates available, but I see no
 notice  in the news section on qubes website nor here ..


Seems like this happened with 28 release as well

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c2b28fdf-7ae8-e7cc-216d-6f70977aef12%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] fed29 templates/upgrade

2019-01-03 Thread John S.Recdep
Hello, since there are now templates available with dom0 for fedora-29
does that mean one could also upgrade from 28->29   safely in a
similar/same way  as say from 26->27 27->28  etc

please advise


PS: could you plz remind me what the qvm command was to determine which
templates are available via  sudo dom0 update?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/afb3ab54-44fd-60c6-51a8-7d48aa23f419%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


  1   2   3   4   >