Re: [qubes-users] 3.2.1 / An updated 3.2 iso?

2017-12-26 Thread fepitre
Le dimanche 24 décembre 2017 11:03:56 UTC+1, awokd a écrit :
> On Sun, December 24, 2017 9:47 am, Frédéric Pierret (fepitre) wrote:
> 
> > Hi, I have also some free time (holidays!), as I have already prepared
> > updated ISO for myself, I will give you some help on it.
> 
> Thanks! I'll ping you off list.

I suceed to build a release3.2 with Fedora 25 as dom0. It is done with some 
adjustments: xen-4.6.6 with a gmp patch, core-libvirt v3.1.0 (due to python 
version), and just a backport of some commits related to mgmt-salt, and some 
adjustments in the installer for default template Fedora 26 and Debian 9. In my 
repos I named it release3.3 (almost finish to push every minor changes). Should 
I do a complete report for let you rebuild the whole thing Marek or you would 
like to skip this release?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/230d5e29-b792-42ce-abc1-621a3856a36b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 3.2.1 / An updated 3.2 iso?

2017-12-26 Thread 'awokd' via qubes-users
On Tue, December 26, 2017 10:40 am, Frédéric Pierret (fepitre) wrote:
> Le dimanche 24 décembre 2017 11:03:56 UTC+1, awokd a écrit :
>
>> On Sun, December 24, 2017 9:47 am, Frédéric Pierret (fepitre) wrote:
>>
>>
>>> Hi, I have also some free time (holidays!), as I have already
>>> prepared updated ISO for myself, I will give you some help on it.
>>
>> Thanks! I'll ping you off list.
>>
>
> I suceed to build a release3.2 with Fedora 25 as dom0. It is done with
> some adjustments: xen-4.6.6 with a gmp patch, core-libvirt v3.1.0 (due to
> python version), and just a backport of some commits related to
> mgmt-salt, and some adjustments in the installer for default template
> Fedora 26 and Debian 9. In my repos I named it release3.3 (almost finish
> to push every minor changes). Should I do a complete report for let you
> rebuild the whole thing Marek or you would like to skip this release?

I emailed you a couple times with no reply, am I getting spam filtered at
your end?

Anyways, the build I'm working on addresses a couple other issues as well
besides changing the default templates. I didn't dare trying to upgrade
dom0. I've been doing full builds and testing the install on physical
machines, so it takes a long time! Maybe our two builds should be merged
somehow, but I'll leave that up to the professionals.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c6cebb88e397b269f261da9b14d690a0.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Password security/disposable vm security

2017-12-26 Thread Matteo
>> ...switch to cookie authentication and forget the password, that way when 
>> the zero-day
>> happens you only lose your cookie which is probably not as powerful as
>> the actual password(ie I dont think you can change your password with
>> just the cookie) plus the zero day can't "permanently" compromise
>> thunderbird cause you opened it in a disposable

yes, it can't probably change the password.
but this is useless, is again like "admin vs not".

stealing a cookie *ONCE* and you:
-can't change password
-CAN impersonate user
-CAN read all mails
in other words can do everything someone does with his mail...

and mails works in other way so...
i think that Qubes way is much better than any other thing, use it and
don't worry about some impractical scenarios.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/247e0dfe-3c2d-3a1f-fedb-d65df200feea%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 3.2.1 / An updated 3.2 iso?

2017-12-26 Thread fepitre
Le mardi 26 décembre 2017 13:36:40 UTC+1, awokd a écrit :
> On Tue, December 26, 2017 10:40 am, Frédéric Pierret (fepitre) wrote:
> > Le dimanche 24 décembre 2017 11:03:56 UTC+1, awokd a écrit :
> >
> >> On Sun, December 24, 2017 9:47 am, Frédéric Pierret (fepitre) wrote:
> >>
> >>
> >>> Hi, I have also some free time (holidays!), as I have already
> >>> prepared updated ISO for myself, I will give you some help on it.
> >>
> >> Thanks! I'll ping you off list.
> >>
> >
> > I suceed to build a release3.2 with Fedora 25 as dom0. It is done with
> > some adjustments: xen-4.6.6 with a gmp patch, core-libvirt v3.1.0 (due to
> > python version), and just a backport of some commits related to
> > mgmt-salt, and some adjustments in the installer for default template
> > Fedora 26 and Debian 9. In my repos I named it release3.3 (almost finish
> > to push every minor changes). Should I do a complete report for let you
> > rebuild the whole thing Marek or you would like to skip this release?
> 
> I emailed you a couple times with no reply, am I getting spam filtered at
> your end?

Oops..indeed it was in the SPAM box...(really sorry...i did not checked it on 
the webmail)

> 
> Anyways, the build I'm working on addresses a couple other issues as well
> besides changing the default templates. I didn't dare trying to upgrade
> dom0. I've been doing full builds and testing the install on physical
> machines, so it takes a long time! Maybe our two builds should be merged
> somehow, but I'll leave that up to the professionals.
Sure. Let Marek decides what ever we should adopt as strategy.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b906e776-52a2-4848-a586-ba7255da7695%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Password security/disposable vm security

2017-12-26 Thread 'Tom Zander' via qubes-users
On Tuesday, 26 December 2017 00:56:30 CET mmm...@gmail.com wrote:
> "So make sure your software is from a trusted source."
> Right but even if it is trusted at one point it can become less
> trustworthy later(infection) so I wanted to keep it perfectly "fresh" by
> using disposables.

Aha.

In Qubes you *use* AppVM based virtual machines. Those are unable to change 
software because the actual software is owned by a TemplateVM.
As such this idea of keeping it fresh is already done by normal daily usage 
of Qubes.

The disposable VM concept goes one step up by isolating changes to your 
private data (downloaded files, config, etc).

For your goal the dispVM doesn't add anything, AppVMs already do what you 
want.
 
> "Personally, I' d avoid thunderbird and anything from mozilla, but thats
> just me."
> Do they have a bad track record(I planned on researching my apps later
> =p).

Just last month they added an invisible plugin in their binary builds which 
was programmed to not show up in the 'add-on' screen and had the ability to 
alter page content.
Someone didn't actually program it well enough and the whole thing got 
leaked and after a lot of heat, a lot of bad press they eventually 
apologised.

I'm more concerned that they tried then how they failed.
It leaves a bad taste in my mouth.

Google for "looking glass" and "mozilla" if you want to know more.

-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2452051.NKi2Ta5ZWQ%40cherry.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] can I use paranoid mode from a 3.2 backup?

2017-12-26 Thread cooloutac
On Saturday, December 23, 2017 at 8:40:08 PM UTC-5, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Wed, Dec 20, 2017 at 10:35:26AM -0800, cooloutac wrote:
> > Thinking of upgrading to 4.0.
> > if I want to restore vms from 3.2, possibly compromised, system.  Can I use 
> > the paranoid restore mode in 4.0,  or would that only work from 4.0 backup.
> 
> This isn't properly documented yet. The general idea is to restore the
> backup using some dedicated VM (maybe even disposable VM), instead of
> dom0. See here: 
> https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/#sandboxed-paranoid-backup-restores
> In the section "Simple management VM demo", you can find required steps
> to setup qrexec policy to allow such operation.
> 
> Our previous tests weren't very successful:
> https://github.com/QubesOS/qubes-issues/issues/2986
> 
> But things have improved since then and hopefully(*) it works now.
> 
> (*) which reminds me to add automated test for this case of backup
> too...
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> 
> iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlo/BXEACgkQ24/THMrX
> 1yzWLAf+M3aaE2f654BE0K1GKeMQvKn9Aj2ZeWeGQJGyWSY2Or2yP56mqQ83sb71
> Pl/fdV0f+PX2PkZbvezHawni+kuTLJ7I7B6njrfbOZvjNNozP/P8e9AuRRa4G9Jw
> RgNY88BF5UmOU/ZK6RnDeLi9DSiQZI1olNmsNn3emrvu6Y2gilt0vmxCAa7mfKYd
> 7sk/Xt0oyH/q260kZwdNysu66gULnq1x3lwtGrhpWD0Zui/StKZ56yHicX5liau+
> foap465e1gwhtuIkO50KAqAZHYrWWmh1yMUeoqfouUDBe0wYZ1MPyzSTEILkKsYx
> 3NasV/1rPOhGNnPMkFKRy+FNyK2RQQ==
> =ty+y
> -END PGP SIGNATURE-

tks when I get a chance I'll give it a shot.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9cae2caa-2385-4c3e-80a9-6adbaff45154%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Duplicate MAC address error

2017-12-26 Thread cooloutac

wonder if your system runs low on ram?  Could also try using system without 
iommu and see if it still happens.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/69bbf1b5-c559-42d4-a8f6-e4f956d70c08%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: how to clone template (fedora?), and print from cloned template in disposable vm? printer configuration

2017-12-26 Thread cooloutac
On Saturday, December 23, 2017 at 5:45:47 PM UTC-5, jerry wrote:
> 

https://www.qubes-os.org/doc/dom0-tools/qvm-clone/

then install printer in the cloned template, using your printer models linux 
instructions.  You can download the drivers using a disposable vm then transfer 
them to the template or temporarily allow net access to the conled template to 
install drivers.

Set your diposable vm to use the new template as its netvm.  
https://www.qubes-os.org/doc/dom0-tools/qvm-prefs/   

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bfbecd46-ef10-4acf-8061-f4aa2154f47f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Dumping BIOS

2017-12-26 Thread cooloutac
On Friday, December 15, 2017 at 8:25:53 PM UTC-5, tai...@gmx.com wrote:
> On 12/15/2017 12:54 PM, Matteo wrote:
> 
> >> I disagree when you say nooone is going to backdoor your bios.   I think 
> >> its very common nowadays.
> Actually no it isn't - unless you have managed to ruffle the feathers of 
> a state actor such as the FSB or MSS.
> 
> I have never heard of a real proven BIOS hack of anyone even a serious 
> military intelligence target let alone a common law abiding citizen who 
> simply managed to piss off some guy in a chat-room or what not, I am 
> sure it has been done many times but despite being active in the 
> firmware modification community I haven't heard about it.
> > as far as i know there is computrace that is an anti theft system that
> > gain persistence over the os by dropping an exe that windows will load
> > at boot time but this works only over fat32 and ntfs (not encrypted).
> > i heard also about lenovo doing the same thing for ads or whatever. and
> > after people got angry they released a bios patch to opt-out.
> > but i wouldn't say "very common".
> Computrace uses a windows utility to do this not direct code injection 
> so using linux or simply disabling it in your vendor BIOS would solve 
> the issue of an out-dated problematic exe being forcibly loaded.
> 
> If you wish for better security you can use a coreboot board with open 
> source silicon init (not purism, get the libre RYF kcma-d8 or the lenovo 
> g505s laptop for instance) otherwise while you can use an external flash 
> clip to read back the BIOS and make sure it hasn't been modified you 
> still would be vulnerable to manufacturer security problems, ME etc.

I would get the same responses from people in the 90s.  Can't believe its still 
parroted in 2017 when we see so many real life examples and poc's. Bios devs 
claim bios's are more safer now, but I think they are less safe.   Its why I'm 
a big fan of ITL, they keep it real.

   You forget all the hacking teams out there getting their data pilfered by 15 
year olds. Or the story about intel's backdoor that has been there for years 
and years, who knows how many people knew.  Its also holiday season right now.  
Satans claws are coming to town and everything is on sale for everyone lol

I think part of the problem is old school mentalities like yours have a hard 
time not only admitting that a bios can be infected in the first place,  but 
also that it can be infected remotely.

Its also very hard to admit to something like this,  because what can we really 
do against it?   I still remember the look on everyones face on the panel of 
the Logan CIJ Symposium 2016 when Joanna said maybe there is no point if we 
can't trust companies or developers or the hardware is backdoored.   



Doesn't purism use secure boot on their latest model?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5d814b0f-85ff-49e2-9b52-18b9022cf20e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Lenovo G505S Coreboot

2017-12-26 Thread Blooorp
Le mardi 26 décembre 2017 00:05:28 UTC+1, tai...@gmx.com a écrit :
> On 12/25/2017 12:16 PM, Blooorp wrote:
> 
> > Le lundi 25 décembre 2017 16:27:11 UTC+1, awokd a écrit :
> >> On Mon, December 25, 2017 3:07 pm, Blooorp wrote:
> >>> "Devices/Add a VGA BIOS image (don't specify location or IDs, let it
> >>> auto-populate) "
> >>>
> >>> make: *** No rule to make target 'vgabios.bin', needed by
> >>> 'build/coreboot.pre'. Stop.
> >>>
> >>>
> >>> Looks like it didn't work, should I put the location and ID of the one I
> >>> extracted from the stock bios?
> >> I think I copied mine to the top level coreboot folder as "vgabios.bin"
> >> and let it find it there.
> >>
> >> Email me directly if it's still not working and I can help, we're off
> >> topic from qubes-users now...
> > Everything works now, my mistake was using the wrong vgabios.bin, the stock 
> > bios contains the ones for each version of the laptop but I didn't know 
> > that so I took the first that I found, with device ID 6663.
> > The one I then searched for and that worked, thanks to awokd, was with 
> > device ID 990b, appropriate for the G505s with integrated graphics and not 
> > discrete card.
> >
> Don't forget about that microcode update - it is mandatory both for for 
> security and IOMMU.
> 
> Use the patch that awoke made, a true service to the community - the 
> lenovo g505s is now properly working and is the best laptop for qubes as 
> it supports an open source init version of coreboot without ME/PSP 
> unlike purisms laptops with the not really disabled ME and entirely 
> blobbed silicon init via intel FSP.

Didn't forget about it, he did some awesome work :)

I took my time to choose the right laptop to get into Qubes, really feels that 
I made the right choice !
But now, I need to make Qubes work on it, I'm collecting the issues haha

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2a17389-fa86-4ef1-be57-26eab8feb169%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: how to use "Rescue a Qubes system" or save my data, won't boot

2017-12-26 Thread cooloutac
On Friday, December 15, 2017 at 12:08:55 PM UTC-5, jer...@disroot.org wrote:
> I first used a konsole, using the guide on qubes's site "Using and Managing 
> USB Devices"
> 1. Enable sys-usb
> 
> using the command sudo qubesctl top.enable qvm.sys-usb
> 2. Apply the configuration:
> using the command sudo qubesctl state.highstate
> 
> then it froze, restarted system, and when in passphrase entering the 
> encryption code, keyboard didn't work, but when i press a button it 
> highlights the num button, and if i hold any button on keyboard the num 
> highlight is turned on, when i release the light is off...
> 
> i reinstalled qubes choosing manual partition (not the automatic), i'm 
> un-sure if i deleted or damaged my data.. (see note below)
> now it still doesn't boot qubes, keyboard works on passphrase encryption of 
> disk, but when it's loaded, it gets stuck, if i click alt+tab it counts some 
> numbers and says unlimited.
> 
> note: i still think i have the data, maybe, i have something like 
> luks-23232-f-sdf-saf-sad-sa-ds and also dom0-root-00 something (not accurate 
> name)

You would have had to edit grub and remove the hide all line to be able to 
enter passphrase.   https://www.qubes-os.org/doc/usb/

WHat you can do for keyboard if you have a ps2 port is use a usb to ps2 
adapter.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bac55e60-05be-4508-9ba2-e0c95c3a61a6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] how to forward webcam to a VM?

2017-12-26 Thread cooloutac
On Friday, December 15, 2017 at 2:19:40 PM UTC-5, evo wrote:
> Am 15.12.2017 um 20:11 schrieb awokd:
> > On Fri, December 15, 2017 11:13 am, evo wrote:
> > 
> >> so i've tried it, but i get this error by starting webcam-vm after adding
> >> the usb-device to it: "libxenlight could not create a new domain
> >> "webcam-vm"
> >>
> >>
> >> if i try it one more time, i get: UnicodeDecodeError: ascii codec can't
> >> decode byte 0xc3 in position 34: ordinal not in range(128).
> >>
> >> i've tried all three usb devices that are shown on sys-usb
> > 
> > You are running Qubes 3.2? Not sure what's going on then, that usually
> > fixes it for me...
> > 
> > 
> 
> 
> yes, the last version of qubes (3.2) :-/

shot in the dark.   what if you use a usb 2.0 port instead of 3.0?  or vice 
versa?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1be7e5bc-1f1d-46e7-9489-a7b12ac1a9f7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Duplicate MAC address error

2017-12-26 Thread Kushal Das
On Tue, Dec 26, 2017 at 8:18 PM, cooloutac  wrote:
>
> wonder if your system runs low on ram?  Could also try using system without 
> iommu and see if it still happens.
>
I have 32GB here on a T470. I hope that is okay :)

Kushal
-- 
Staff, Freedom of the Press Foundation
CPython Core Developer
Director, Python Software Foundation
https://kushaldas.in

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAAzeMbxejFzUDSswmTA4mXGtKEuMztFV%3DayYVrZ3Okg_9e601A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Intel NUC7i5BNH

2017-12-26 Thread Eric Scoles
WiFi fails after sleep.
UEFI disabled / legacy enabled.
Graphic install failed to load for Qubes 3.2; 4.0 rc3 installed without
apparent issue.

Have not tested Thunderbolt.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAE7XU-biEhONt0Nzat%3DOCRzL5eq%3DB0pavDnYr1e2Jd9RkuUQFQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Intel_Corporation-NUC7i5BNH-20171226-140508.cpio.gz
Description: GNU Zip compressed data


Qubes-HCL-Intel_Corporation-NUC7i5BNH-20171226-140508.yml
Description: application/yaml


Re: [qubes-users] Which 3.2 VMs to backup and for eventual 4.0 migration?

2017-12-26 Thread yrebstv

 re: /var/tmp  is  dom0  I am unable  to  cut and paste  from
 dom0 what I see is /dev/mapper/qubes_dom0-root  952848292
 780151168(used) 123272164(available) 87%   / and various others
 smaller directories   ; I don't know what a "partial restore"
 would look like ; I never touch dom0 :0

>>>
>>> It would be some large directories in /var/tmp that start with
>>> `restore_`. But it sounds like that's not your problem. Pretty
>>> sure it's what we diagnosed above (large backups in dom0 home).
>>>
>>
>> - And *Once something is in dom0  files  it can't be moved
>> *out to any other VMs ,
> 
> You can move files from dom0 to other VMs:
> 
> https://www.qubes-os.org/doc/copy-from-dom0/
> 
>> so guess I need to  delete the  large  AppVM backup, that is
>> *indeed in dom0 /home   and re-back it up to an another internal
>> HD  would seem to be preferable , that backing up to dom0 to
>> dom0 (since I guess I'll be backing up "everything" and if that's
>> too large then maybe I'll skip the Templates...

Well I rm 'd all but the 1 large successful photo AppVM. And instead of
re-backing it up to backupVM (AppVM) I attached another internal HD to
the backupVM and am trying to back to it( by 1st doing qvm-copy-to-vm
   , however it's complaining  "qfile-dom0-agent: File
copy: no space left on device" 

I do note that whatever qubes_dom0-root ?file is above is stating 87%
used . (this qubest install is running on a 1GB HD there should be
plenty of run, I have a lot of AppVM perhaps each one walls off a
certain amount of the HD whether they are used or not ?  or perhaps I
need to allow   backupVM  AppVM  more "Basic-> Disk storage -> private
storage max size: which is currently set to 2048MB ? l0l change that to
512000 MB   maybe ?




>> But, again just curious,  are the Templates , Whonix, and AppVMs,
>> dom0 going to be *importable   into   Qubes 4.0  ?  in general , I
>> don't really use Deb-8  which it sounds like will be in Q4.0, and
>> Fedora's Templates will be F26  *not F25 ... ?
>>
> 
> I haven't personally experimented with this much, so I'll leave it to
> someone who has done so to comment on whether it's possible.


Isn't part of the purpose for a 3.2  backup  being to enable to
eventually   "import" their  VMs  into  4.0  from 3.2  ???   Seems to me
this would be something basic  task that folks  are going to do? 
or maybe it's so trivial  for all  the  pro users out there , doesn't
need commenting ?  

or:  if 4.0  is going to come stock  with Fedora 26 ,  are  AppVMs 
based on Fedora 25  even  going to be  "import"-able   into  4.0 ?   
I'd really not have to re-tweak all my Firefox  instances again for
example  :)


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/54c0c72dd023e1bc2477006d6a1d7206%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Which 3.2 VMs to backup and for eventual 4.0 migration?

2017-12-26 Thread yrebstv
fwiw, I am unable to actually add backupVM diskspace for the same
reason, duh.  I think my only option is to remove the huge dom0 file ,
but I'm still wondering how do I get a system wide understanding of how 
3.2  is using the 1GB  HD,  seems should be otherwise plenty of room to 
run 3.2 ... sigh

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84c38c96a40f58423c01f4ba3e75980c%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Which 3.2 VMs to backup and for eventual 4.0 migration?

2017-12-26 Thread 'awokd' via qubes-users
On Tue, December 26, 2017 7:15 pm, yreb...@riseup.net wrote:
> fwiw, I am unable to actually add backupVM diskspace for the same reason,
> duh.  I think my only option is to remove the huge dom0 file , but I'm
> still wondering how do I get a system wide understanding of how 3.2  is
> using the 1GB  HD,  seems should be otherwise plenty of room to run 3.2
> ... sigh

In dom0, do
cd /
du -hd1

then cd into large directories and repeat du -hd1.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39687cdd55b534d5e5930247568256b5.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


AW: [qubes-users] Re: how to clone template (fedora?), and print from cloned template in disposable vm? printer configuration

2017-12-26 Thread '[799]' via qubes-users
x x xxx xx x xxx "xj

Gesendet von ProtonMail mobile

 Original-Nachricht 
An 26. Dez. 2017, 15:53, cooloutac schrieb:

> On Saturday, December 23, 2017 at 5:45:47 PM UTC-5, jerry wrote:
>> 
>
> https://www.qubes-os.org/doc/dom0-tools/qvm-clone/
>
> then install printer in the cloned template, using your printer models linux 
> instructions. You can download the drivers using a disposable vm then 
> transfer them to the template or temporarily allow net access to the conled 
> template to install drivers.
>
> Set your diposable vm to use the new template as its netvm. 
> https://www.qubes-os.org/doc/dom0-tools/qvm-prefs/
>
> --
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/bfbecd46-ef10-4acf-8061-f4aa2154f47f%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/jUrhaibkZUOIGXgz2gAiIO8sKkqjV_dU5WqnlRxrAskfNhX4xXQoLZ9IkUuUoDJ4J8C7xvV_wiiHGbq7XZl4GwKKWBjBM1oJrd5tlZPwb48%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Which 3.2 VMs to backup and for eventual 4.0 migration?

2017-12-26 Thread yrebstv
On 2017-12-26 10:14, awokd wrote:
> On Tue, December 26, 2017 7:15 pm, yreb...@riseup.net wrote:
>> fwiw, I am unable to actually add backupVM diskspace for the same reason,
>> duh.  I think my only option is to remove the huge dom0 file , but I'm
>> still wondering how do I get a system wide understanding of how 3.2  is
>> using the 1GB  HD,  seems should be otherwise plenty of room to run 3.2
>> ... sigh
> 
> In dom0, do
> cd /
> du -hd1
> 
> then cd into large directories and repeat du -hd1.

Ok, thx

only thing seems strange is in a Debian AppVM (my only Deb AppVM)  I
have 2 files private.img and volatile.img  which  end up  *near 1.3Gb   
any idea  if this is normal ?




-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3400f0c49c70f0f85b09e13f436bc599%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Lenovo G505s with Coreboot and Qubes R4-rc3 fails to boot

2017-12-26 Thread Blooorp
I installed Qubes with Encryption on my laptop, all looked fine exept for a 
popup saying that my hardware doesn't support Interrupt Remapping, which 
shouldn't fail my install.

Then on first boot, after I enter my password, the graphical loading screen 
appears for a few seconds, black screen, a series of console outputs(too fast 
to grasp much of it, tho I noticed a "kernel panic - not syncing: fatal 
exception" and back to boot.

The same happened at each boot, sometimes it didn't even ask me for my password 
and failed the same way. I reinstalled Qubes without encryption but the same 
happened.

I tried to reboot without my wifi card or without the "iommu=no-igfx" parameter 
in the GRUB boot menu but no result.

Any idea what may be happening?
Any way to save the boot logs? I tried making journalctl persistent and export 
the files with the troubleshooting tool from the installation media, but 
nothing was saved.

I'm pretty much using the same machine with the same coreboot build and the 
same version of Qubes than Awokd but he doesn't have this issue.

Thanks in advance :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/59860cb4-a8ce-49cb-9ace-a77b8a24569d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to install software on templates (Qubes 4.0)

2017-12-26 Thread Eric Scoles

Per this, in Qubes 4.0 software is to be installed using Qubes tools.
https://groups.google.com/d/msg/qubes-users/aBE-U9YKhjU/0t7hspsbAgAJ

Is there at this time any documentation of how that's done? The current list of 
CLI tools doesn't seem to include anything that relates. 

I looked at Yum Extender under System Tools, but don't see any way to either 
install arbitrary RPMs or add new repos.

This:
https://unix.stackexchange.com/questions/334117/how-to-add-software-sources-for-dom0-in-qubes
...suggests that the correct way to do it is to temporarily add a repo, then 
remove it when you're done installing. 

1. Is that the canonical method?
2. How would we retrieve updates?
3. What if we need to install a package that's not available via a repo?



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ad1c37a-062a-47c8-8edc-5b49298a6e63%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Password security/disposable vm security

2017-12-26 Thread mmm648
Kk, thanks for all the information as long as that AppVM thing is true I'm 
happy enough. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f8bf2c54-a135-486b-b9f1-dd0cfd6fd896%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to install software on templates (Qubes 4.0)

2017-12-26 Thread 'Tom Zander' via qubes-users
In short, software is to be installed in your template exactly the same as 
you would do it in the ‘upstream’ way.

So if you are using a debian template, you’d be able to go to the debian 
wiki pages that explain how to do it.

So your question 1 and two are answers with; “like in the upstream distro".

> 3. What if we need to install a package that's not available via a repo?

This opens a bit more complex situation because software not available for a 
public repo may cause the issue of it not being trusted. I don’t trust 
skype, for instance.

Technically the installation is not too difficult, you just follow the 
instructions from the place you find the software.
But it is important to assess how much you trust this software and its 
installer because changes made in a template will have an effect on ALL 
qubes that are based on it.
Installing untrusted software in a template may end up exposing your data in 
the “work” qube that is based on it.

You may consider creating a new AppVM where you install the software (again, 
using the instructions from the place where you find the software). Check the 
/rw/config dir, there is a binds configuration that allows you to specify 
which files or directories are kept between restarts.

Hope this helps.
-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4259797.hveZSERC7u%40strawberry.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Lenovo G505s with Coreboot and Qubes R4-rc3 fails to boot

2017-12-26 Thread Blooorp
Le mardi 26 décembre 2017 22:26:10 UTC+1, Blooorp a écrit :
> I installed Qubes with Encryption on my laptop, all looked fine exept for a 
> popup saying that my hardware doesn't support Interrupt Remapping, which 
> shouldn't fail my install.
> 
> Then on first boot, after I enter my password, the graphical loading screen 
> appears for a few seconds, black screen, a series of console outputs(too fast 
> to grasp much of it, tho I noticed a "kernel panic - not syncing: fatal 
> exception" and back to boot.
> 
> The same happened at each boot, sometimes it didn't even ask me for my 
> password and failed the same way. I reinstalled Qubes without encryption but 
> the same happened.
> 
> I tried to reboot without my wifi card or without the "iommu=no-igfx" 
> parameter in the GRUB boot menu but no result.
> 
> Any idea what may be happening?
> Any way to save the boot logs? I tried making journalctl persistent and 
> export the files with the troubleshooting tool from the installation media, 
> but nothing was saved.
> 
> I'm pretty much using the same machine with the same coreboot build and the 
> same version of Qubes than Awokd but he doesn't have this issue.
> 
> Thanks in advance :)

Some additional input I forgot to add : I have the version of the G505s with 
integrated HD 8650G + discrete R5 M230 graphics.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8efe6ff4-49ca-4543-8cf4-7c4cf9283ebc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to install software on templates (Qubes 4.0)

2017-12-26 Thread Eric Scoles
Sorry, I guess I'm not understanding your answer. The 'usual way' to install in 
an upstream distro would be to connect to the network. Again, as I understand 
it, in Qubes 4, we can't do that anymore from templates: 


Templates don't have Net-VM's in Qubes 4. All updates are run over the 
Qubes-tools, and are no longer networked.

[https://groups.google.com/d/msg/qubes-users/aBE-U9YKhjU/0t7hspsbAgAJ]



What I imagine I'll try next is to get the RPM into the template filesystem and 
use command line tools to install it. Is that what you mean by "the usual 
methods"? That still leaves the package without a clear way to be updated.

As far as the 'trusted' or 'not trusted' nature of a particular piece of 
software: We need to install what we need to install. If the system prevents 
people from doing what they need to do, they won't use the system -- that's 
axiomatic. So that's a net reduction in security. ('The best security is the 
security you use.')

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/05a419ca-8940-4b49-8acf-d19cea29c7fd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to install software on templates (Qubes 4.0)

2017-12-26 Thread 'Tom Zander' via qubes-users
On Tuesday, 26 December 2017 23:58:36 CET Eric Scoles wrote:
> Sorry, I guess I'm not understanding your answer. The 'usual way' to
> install in an upstream distro would be to connect to the network.

Your ‘yum’, ‘pacman’, ‘apt-get’ have access to the internet via a proxy 
solution.

Please give it a try.

-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/22619918.86Z0RbBJyT%40strawberry.
For more options, visit https://groups.google.com/d/optout.


Mozilla (was: Re: [qubes-users] Password security/disposable vm security)

2017-12-26 Thread Leo Gaspard
On 12/26/2017 03:25 PM, 'Tom Zander' via qubes-users wrote:>>
"Personally, I' d avoid thunderbird and anything from mozilla, but thats
>> just me."
>> Do they have a bad track record(I planned on researching my apps later
>> =p).
> 
> Just last month they added an invisible plugin in their binary builds which 
> was programmed to not show up in the 'add-on' screen and had the ability to 
> alter page content.
> Someone didn't actually program it well enough and the whole thing got 
> leaked and after a lot of heat, a lot of bad press they eventually 
> apologised.
> 
> I'm more concerned that they tried then how they failed.
> It leaves a bad taste in my mouth.
> 
> Google for "looking glass" and "mozilla" if you want to know more.

(disclaimer: I once was an intern for Mozilla, though I do not have any
bond with Mozilla right now)

tl;dr: please do google for “looking glass” and “mozilla”

Erhm. This is a *really* biased way of putting things. They did push an
(opt-out) study through the (opt-out, iirc) studies subsystem, that did
have the ability to alter page content.

That said, the add-on was not programmed to not show up in the ‘add-on’
screen (that I know of), it was just a regular opt-out shield study.

Now, the handling of this particular instance has indeed been stupid:
this study was actually no study, but a promotional event organized with
the Mr. Robot series (which explains the ability to alter page content,
though I'm obviously not saying anyone wanted it), and in addition to
this it appeared with the suspicious “My reality is different than
yours” message, which made some users think they had been infected by
some virus.

So I'm not saying this was not a particularly stupid action and that
they did not end up with woefully bad press (especially damaging given
they had just outed Firefox 57 and its long-awaited changes), but it's
nowhere near as bad as what you imply, ie. that they would already have
willingly pushed a malicious add-on.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/421f892b-2758-d853-1bea-33b9e1bc24f1%40gaspard.io.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Weak connection. Cannot reinstall borked template, download will not resume.

2017-12-26 Thread dangmadzyu
Attempting to upgrade KeePassX to KeePassX 2.0, using backports, borked my 
debian template by removing qubes-gui-agent and pulseaudio. 

Was unable to find way to undo damage. 

Opted to reinstall template, but I cannot download it without my connection 
dropping, and thus timing me out. dnf does not resume the download, despite it 
claiming to be saving the download to cache.

I have put keepcache=true in dnf.conf, with no results.


cannot wget from dom0. Should I wget from some other VM?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3908f022-5c27-4336-a53c-7977e226e5bc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Weak connection. Cannot reinstall borked template, download will not resume.

2017-12-26 Thread dangmadzyu
On Tuesday, December 26, 2017 at 6:02:57 PM UTC-8, dangm...@gmail.com wrote:
> Attempting to upgrade KeePassX to KeePassX 2.0, using backports, borked my 
> debian template by removing qubes-gui-agent and pulseaudio. 
> 
> Was unable to find way to undo damage. 
> 
> Opted to reinstall template, but I cannot download it without my connection 
> dropping, and thus timing me out. dnf does not resume the download, despite 
> it claiming to be saving the download to cache.
> 
> I have put keepcache=true in dnf.conf, with no results.
> 
> 
> cannot wget from dom0. Should I wget from some other VM?


Qubes 3.2
qubes-dom0-update --action=reinstall qubes-template-debian-8

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/748506e5-9c7f-431e-8a5d-8d0c35826868%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.