Re: [qubes-users] Re: Qubes 3.2 rc1 has been released!

2016-06-28 Thread Chris Laprise



On 06/28/2016 02:23 PM, Marek Marczykowski-Górecki wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Jun 28, 2016 at 10:36:42AM -0700, raahe...@gmail.com wrote:

Will we be able to upgrade to 3.2 from dom0 update eventually?  Or if we choose 
not to reinstall is there security implications?

Yes. Experimental instruction already online:
https://www.qubes-os.org/doc/upgrade-to-r3.2/

- -- 


FWIW, I tried this yesterday and it produced a system that stalled in 
the middle of booting, so I installed fresh from DVD.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b24f83d8-ebe8-98c2-1397-1e278355b886%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Shutdown Proccess

2016-06-28 Thread Eva Star
Maybe some hotlink for this operation at Qubes Manager menu ?

If you execute `qvm-shutdown --all --wait` just before shutting down the 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/75ac83ca-e2c4-4b4a-ac6d-381ba499a016%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: VM CPU mapping - countermeasurements against covert channels via cpu caches?

2016-06-28 Thread Ilpo Järvinen
On Tue, 28 Jun 2016, 12384013418489'14'810'4 wrote:

> would be the Intel Skylake Technology SGX a solution, so that the keys 
> cannot be read from the crypto processes?

In these covert attacks, the keys are not "read" but leaked. Those leaks 
are unlikely to be solved by SGX as it's not the threat it is used to
counter (i.e., SGX prevents reading of those DRM keys directly from 
RAM in plain text form :-)). With SGX, the memory is encrypted so that 
it cannot be "read", however, the CPU still does calculations of an SGX 
enclave the same way as without them which creates the opportunity for
the very same covert channels to form.

Other interesting technology in this domain is ability to somehow control 
cache allocations that is available at least with Broadwell Xeons. 
However, I'm not convinced it can fully remove cache-based covert
channels either.


-- 
 i.


Re: [qubes-users] Bitcoin Qubes tutorial

2016-06-28 Thread Todd Lasman

On 2016-06-28 12:01, Franz wrote:

Hello,

is there some form of tutorial for using Bitcoins with Qubes,
considering that I have no experience of bitcoins?

It seem I should have a VM for a hot wallet for making transactions
and another for a cold wallet to keep the bitcoins. But have no idea
if it is possible to move bitcoins between the two

Also imagine a good practice would be to make a backup of the VMs
containing the wallets using Qubes backup.

It would be also interesting to know which clients you consider safer
for buying and selling bitcoins.

Thanks

Best
Fran


Hi, Fran. I've done exactly this using the Electrum bitcoin wallet. I 
have a dedicated hot ("watching") wallet in its own VM, and a cold 
(offline) wallet in a separate VM that's never network-connected. 
Although I'm hardly a bitcoin expert, I don't think it's a matter of 
"transferring bitcoin from one wallet to another." Rather, I think the 
cold wallet just holds the private keys used when authorizing bitcoin 
transactions. For example, if I'm buying something with 1 bc, I generate 
a pending transaction in the hot wallet, sign that transaction in the 
cold wallet, transfer the signed transaction back to the hot wallet, and 
then broadcast it from there. That way, only that 1 bc is ever 
vulnerable in a network-connected VM.


If I'm misunderstanding this, or doing it wrong, I'd love to be educated 
by a bitcoin guru!


Todd

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/59a6d11ff0484fc1ae7bda853f9dbada%40nowlas.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: VM CPU mapping - countermeasurements against covert channels via cpu caches?

2016-06-28 Thread 12384013418489'14'810'4
Hello,

would be the Intel Skylake Technology SGX a solution, so that the keys cannot 
be read from the crypto processes?

https://github.com/01org/linux-sgx

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e4492fa8-6a87-44bb-ab43-cd1ec495b981%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Lenovo Y50-70

2016-06-28 Thread bobby . the . jellyfish123
does the nvidia display work with qubes 3.2? 

from what i gather it should due to the newer linux hernel.

so far its the only reasonably priced qubes compatable 4k, 16gb, backlit kb, 
15" laptop i found yet even without tpm

cant find a 17" the w450, p50, p70 are over $2k easy

the big risk with the y50-70 is bad reviews with build quality there were more 
than a few bad batches aparently thus at worst i may have to return one before 
i get another

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7fc67b1b-5cf8-4f0d-8df7-2f65b0e314b6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Bitcoin Qubes tutorial

2016-06-28 Thread Franz
Hello,

is there some form of tutorial for using Bitcoins with Qubes, considering
that I have no experience of bitcoins?

It seem I should have a VM for a hot wallet for making transactions and
another for a cold wallet to keep the bitcoins. But have no idea if it is
possible to move bitcoins between the two

Also imagine a good practice would be to make a backup of the VMs
containing the wallets using Qubes backup.

It would be also interesting to know which clients you consider safer for
buying and selling bitcoins.

Thanks

Best
Fran

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBkNyzzNnp-dX9%3DpFL3_B6hwu6kVgUNXsLFz_D0wRxb7Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 3.2 rc1 has been released!

2016-06-28 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Jun 28, 2016 at 10:36:42AM -0700, raahe...@gmail.com wrote:
> Will we be able to upgrade to 3.2 from dom0 update eventually?  Or if we 
> choose not to reinstall is there security implications?

Yes. Experimental instruction already online:
https://www.qubes-os.org/doc/upgrade-to-r3.2/

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXcsCcAAoJENuP0xzK19csjowH/RHfqm/DKhbiVJpu3Nnu997L
CbdgyL4Jt2qMLnIad72QL26mzrb42EEx1A3xYSVjfxRWktIrAN83ZXJFVgRJlJee
qcsfdtKWZukJmGQ1FZ5M8V/r9oFHw5WBETQQSmreLLgytZam80r0Ssgc55n0wBNj
y2G7g9V3Oxi1fbMZOptNKFWfeEoC7++Udx8tK0zuLV/LU/X5HwVmeeyqtazhhaJx
MEI4SRM5fgbj4gGACCFPgRrgLjsW8MC1LIeNT38k57X+vgNgQga6Rj4ieJttJDu7
b0nifYm21r5J/47tjFxUnI/sEklRVJO0bPpXzrnIkLFcW7D7hNf5Fvk0yuGI8i0=
=Y5rc
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160628182324.GL1323%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 3.2 rc1 has been released!

2016-06-28 Thread raahelps
On Tuesday, June 21, 2016 at 1:45:48 AM UTC-4, mmih...@gmail.com wrote:
> > > one other thing i noticed a while ago - the dracut text-mode 
> > > installer does not show the pop-up asking the user for the LUKS 
> > > passphrase, the installation doesn't work because of that.. bug? 
> > > feature?
> > 
> > Can you clarify what you mean by "the installation doesn't work"? As
> > in, can't proceed? (How were you able to install in that case?)
> > 
> > Does it seem related to this issue?
> > 
> > https://github.com/QubesOS/qubes-issues/issues/794
> 
> Good morning,
> 
> What I have noticed is that in the text mode the LUKS password prompt is not 
> visible until you press a key like ENTER. Then the prompt appears and you can 
> type in the password. Or, to be exact, you could type in the password blindly 
> and it would still work.
> 
> For those that have problem entering the disk encryption password in the 
> graphic boot mode I'd suggest to switch to text mode by pressing the 
> "Pause/Break" key. Then, when the screen activity subsides, you should press 
> the ENTER key. In this way you might get a password prompt.
> 
> -- Regards, Matej.

Will we be able to upgrade to 3.2 from dom0 update eventually?  Or if we choose 
not to reinstall is there security implications?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c863531e-5b17-4e19-9f5f-94cfa9c8f983%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Shutdown Proccess

2016-06-28 Thread raahelps
On Monday, June 27, 2016 at 9:12:43 PM UTC-4, Marek Marczykowski-Górecki wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Mon, Jun 27, 2016 at 05:57:00PM -0700, Eva Star wrote:
> > https://github.com/QubesOS/qubes-issues/issues/1581
> > 
> > What do you think about adding "priority" to each vm to solve shutdown 
> > process issue?
> > With highest (>=) priority number VM shutdown first and with the same 
> > number maybe synchronously.
> > 
> > Example:
> > sys-net -- shutdown priority 10
> > sys-firewall -- 20
> > sys-whonix -- 30
> > Some-ProxyVm with sys-whonix netvm -- auto priority 31 or manual selected 
> > 40 (Maybe user can choose priority. New vm must created with +1 shutdown 
> > priority by default or manually selected.)
> > 
> > When shutdown process start it must shutdown VMs with highest priority 
> > first, then continue shutdown with lower priority number VMs. 
> > At the same time Qubes must show fullscreen list of all VMs and status of 
> > them with buttons to kill them.
> > 
> > The idea to shutdown with dependencies. Like users do at QM when they wants 
> > to stop all vms.
> > 
> > Maybe we can setup priorities automatically in most situations. We know 
> > sequences like: sys-new -> sys-firewall -> vmproxy1 -> sys-whonix -> vmvpn 
> > -> appvm 
> > So, we can stop them one-by-one from right to left. It is reasonable, then 
> > stop all of them at the same time.
> > 
> > Or maybe 2-3 groups of vms by priority, e.g:
> > default - automatic priority by sequences.
> > highest - must shutdown before any other if we can do that (no dependences) 
> > low - shutdown after all other
> 
> While there is some sense in having such sequential shutdown, it's
> rather solution for this one, not the shutdown hung:
> https://github.com/QubesOS/qubes-issues/issues/1826
> 
> If you execute `qvm-shutdown --all --wait` just before shutting down the
> system, it will shutdown all the VMs at the same time, and it's also
> enough to have fast shutdown.
> The problem is that VMs shutdown during system shutdown (which
> is called exactly as `qvm-shutdown --all --wait`) somehow doesn't finish
> its task. VMs shutdown itself is initiated, which is visible for example
> in disk activity. But I don't know what happens next - either not all
> VMs are powered off, or some cleanup isn't executed. If you look at
> shutdown messages, you can see at the end that disk can't be unmounted
> because it is still in use. This may be some hint about the cause...
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJXcc7rAAoJENuP0xzK19csLEQIAIP+pxq7YpnddK2eIxpRt+QC
> KREhBWEqBhKkw8x+mGvE4L2GPMKJ0xWsS9398s/XQ2gKcz24Ow79xfgWex+/pURS
> bTqp7K7bVIW/sEHofO0/dLJSguNnx5r3X8TnwSXMkDNvdfQBm+6vm2R+zhwij5cb
> Oiuchp6JMVkES16y67TVkPYm+Py9wcSxWj51hKgFqeDDcTveDmOCZiX+pBwDuXGN
> Gei0AuZlq/wl9NmDnfyQFB2Db8zgg1MWRpY3LFT4eu7G+4IbQ0fKzghNPsoRH+SU
> IS5ONxkFLlJzSGThhBHEeTuK9vvth2Ik551QI1X7f1Ve95OdzPyVB2BlerqWsLs=
> =NeYG
> -END PGP SIGNATURE-

I never had shutdown stall from not shutting down the vms that start at boot.  
Like all the sys vms.   Its only happens sometimes if I don't shutdown an appvm 
first that I've manually started.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/386327d6-6755-4f6a-a471-07050d54608f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] manual update dom0 to newest 4.5 kernel

2016-06-28 Thread R F
Holger,

Great to hear you managed to upgrade the kernel !! This means I might not
need to buy an other laptop after all.

I looked back at what you posted but it's a bit confusing. I'm probably not
the only one.

Would it be possible for you to make a clear overview of all the steps to
take (commandos in dom0 terminal) to be able to upgrade the kernel?

This would be of help to alot of people, at least to me.

Hope you can help out.
Much appreciated!

Cheers,
R



On Wednesday, 27 April 2016, Marek Marczykowski-Górecki <
marma...@invisiblethingslab.com> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Tue, Apr 26, 2016 at 10:54:19PM +, Holger Levsen wrote:
> > On Wed, Apr 27, 2016 at 12:39:08AM +0200, Marek Marczykowski-Górecki
> wrote:
> > > Reading through /etc/grub.d/20_linux_xen, it requires also
> > > /boot/config-$kernelversion file.
> >
> > whoohoo, that worked, grub picked it up and when I boot it… it reboots
> > directly after grub loading xen and the 4.5 kernel… with no
> > output/failure whatsoever :/
>
> Try removing "quiet" option from kernel cmdline.
>
> > at least the fallback to xen with 4.1 kernel works nicely…
> >
> > the initramfs for 4.5 is a bit smaller (16755547 vs 17384503), there are
> > 3778 files in /lib/modules/4.1* and 3589 in /lib/modules/4.5*
>
> Interesting, but probably doesn't matter. I guess in 4.5 more things are
> selected as built-in.
>
> - --
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
>
> iQEcBAEBCAAGBQJXH/QTAAoJENuP0xzK19cshOIH/RUGJ0WgUuV/8uOcLLn18uOF
> ulC1L+VKBThMtjdAqU/GVT8Qy6YSaS91Y5GGzp5/9Iw7nNSi+6fZxQZ1pT9wHjQE
> 8rYiWfwjnNBEiUaVDpEEMivmCy9q1AiFRwMGGH3xgxIzfKnEU+zt5SEcoplu8bEo
> lLg3VbfcFQphGOI3O7gA3KHeUdwsCNCQit1DV/4ZekPot4K/YphoQmSGNKSrtp18
> AZNzfKLv2YFp4dApD6jIGLBktOcqPz+DwGDP458nDFiTFvsaSq+Fo8HOXumwVjyK
> E+E+rpwwvPoX36BdEg8PhBEc0H4gYOqKGmD312/VvFdfEqBn0+z9HMj397s+7r0=
> =h8p7
> -END PGP SIGNATURE-
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGqf3ZFPJMWGcNq-U%2BuHMJ8QJxicc8pL3qU5LHxtmJQBxeYgkw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Opengl, passwords, crypt, vpn and docs

2016-06-28 Thread Chris Laprise

On 06/27/2016 09:18 PM, Eva Star wrote:
1) VPN doc say at the first part that need to add "network-manager" 
and enable it. At the second part it's without "network-manager". 
When/On what situations I need I enable?


When using a proxy vm to run the vpn client, you can either enable 
network manager or you can setup the client (e.g. openvpn, etc.) 
manually in the CLI. So the CLI method with scripts doesn't require 
enabling network manager in the proxy vm.




2) At the second part of VPN doc. How exactly DNS line at 
vpnclient.config must be written ?


|vpn_dns '1.2.3.4.5 2.3.4.5.6' |

Is it correct line?


The complete correct line would be:
setenv vpn_dns '1.2.3.4.5 2.3.4.5.6'


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/32f35e71-625f-1fb5-3211-485b6bdc26d8%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VM Manager ERROR: "libvirtError: internal error: client socket is closed"

2016-06-28 Thread danmichaels8876
I installed the debian and whonix templates

But then, whenever I open VM Manager, I get the following error:

"Whoops. A critical error has occured. This is most likely a bug in Qubes 
Manager.

libvirtError: internal error: client socket is closed at line 1268 of the file 
libvirt.py"



Not only this.. but when I click OK, i can browse the VMs.. but I can't attach 
USB devices to them



So... what is the solution here...? Do I Just need to restart the Qubes 
system.. or has something else gone wrong entirely...?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9bd6efba-eb2c-46a9-8192-bbdd7e8e40f2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qubes-dom0-update results in HTTP Error 404

2016-06-28 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-06-28 05:05, Chris Grimmett wrote:
> I did the command you suggested, then tried again. I saw the same
> 404 errors. It wasn't until I was working on another project,
> getting screenshots to save to AppVMs 
> (https://jrruethe.github.io/blog/2015/09/17/screenshots-in-qubes/) 
> when I was able to install a new package in Dom0. After that, I
> was able to get qubes-windows-tools updated. Here are the commands
> i ran:
> 
> * sudo qubes-dom0-update scrot * sudo qubes-dom0-update 
> qubes-windows-tools * sudo qubes-dom0-update 
> --enablerepo=qubes-*-testing qubes-windows-tools
> 

Are you downloading updates via Tor (sys-whonix)? If so, it's possible
that you just temporarily had a bad exit node.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXcnVIAAoJENtN07w5UDAwd3cP+wZetL9njcJULVO0VHW/Viqy
QVS+NQ1WJGFjKByocutM/vRUwueYke46SAEjH9UKyppM9GmdSvixdZFMLJikpQjS
CbJnDZtNutW2/37F8pju1hcuaQuhSc9Po6BP/4tFVxUku7a5GNwqcJoWYd9WmS3L
zrlPEr8/LEn+QT6vDpfszR266rcKkdFrpI9W3UlfrjPr5aDzAOWcvyex+B6yVcUF
5XWumaA+XnmMXypZsRze2rVNRg7NrV0BBSYbI4YSiVy1U7wuMp8215gDVNBF/Wxg
HRUzy7LNaHL/8Oi1I/NrSIizT65Lvy+/iqjRhWyAUvxmo7splPpf0aH9IsN+iNuP
R2/Uuo3SBtk9Osbtu+IMsOtRMX33yk3EW5xdj6jES2CHzAoKf8HyX4KxpBAJ/jNi
cl56ERhtrWjyY9Js+5nGv3UgIiBpvJuv1YzHPMM5jCbfBPa8qCLoPvWkKjZfd7MV
ttXHgNiw4ei2b8LwsKlhj6C5qZY8KSLUCYfOjrbiDnZY3NzKnIByYK7yYdvOScCy
6s0Ei3e9KDvjKv8Fo6IdpN6JklABcrxN+1tH7WYORAZS5XFjibXumfvr1mGdNLX1
DD108YhRIiyk91OTd/W+jpHje7JQcIFPX4BOs9d22ygB4OXzkTRSoqvV1185+fdv
vJ8B1Q5nC6dxouHfhFGf
=NGXE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5a791c27-7cff-d53e-b5fd-55426ec75c5c%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] R3.2-rc1 - Improvements / Well done / Thanks!

2016-06-28 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-06-28 01:31, qubescr...@gmail.com wrote:
> Hi
> 
> Amidst a sea of complaints and bug reports, I just wanted to drop
> a note to say thank you to everyone who's working on Qubes, so
> THANK YOU!  You are doing an amazing job, guys!  :-)
> 
> Having just updated to the latest release, the difference for me
> has been absolutely remarkable - like night and day.
> 
> With KDE, Breeze dark theme and font sizes increased to counter my
> 4K screen and make everything legible again, this is now becoming a
> joy to use.
> 
> If I could only work out how to get Streisand OpenVPN working 
> properly in a ProxyVM, and find a way to use Apple Pages / Numbers 
> etc. via a web browser, I can well imagine Qubes becoming my daily 
> OS.
> 
> Given that I'm only just above "idiot" level, I'd say this bodes
> well for your aims for widespread adoption.  Well done, to you
> all!
> 

Thank you! We're very glad to hear that it's working well for you.

(Check out the recently-updated VPN documentation if you haven't
already: https://www.qubes-os.org/doc/vpn/. Also, no personal
experience with iWork for iCloud, but it sounds like it has browser
support: https://www.apple.com/iwork-for-icloud/. Does it not work in
Chrome in a Fedora AppVM?)

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXcnSRAAoJENtN07w5UDAwygQQALOVVbn+jaSvX/NH+9ZpMYAK
GTJfhrue1ZLdow8IuslELNR6Fhv0kq97sTbBEMeUoaF6LpM8ubisVe9HcPOq5zmn
Wcb5NoPjgVEX/Z+AsEXBPb6E922wNQGeOLuTFiyhSyxwRDwZnhIyLuNNqFJ5+Ibq
qlOGyO3oep93e3BZJPFMIoROn9e14WyT9P1Nn2L2LVH6KUoeZ2AwKSBZcIVFMvSM
X7E5pgBYuxbJy4NDlOzwfAo9mH1QeIdAFGg5tIfkvITAzht/6JPXsKPb+7aGSDrh
218bzvfiS5gnzuzc/LqmolYNMZ1aUuwJSrIcZjY5OCfDiAEirnqVCT1oLyGigv9h
Xdut3fBagiDnaWs4LsIn/qASXYLStl1wnjm6lcx3nH+vxJRGLCbbYVUri7HtvRhX
j9/4oEq9r9/LiYKSmvni2TgAWb/quiq8SqOymrUwfqKkMj33NN9pvPkqsKptXYrY
w3QIDpAP+khFcILRkiURSVcw5U9dHLAs1wHt8+i368UYreGdw/hKRvKLgugGPQyH
OmCHllMaJvLbGJFPZudfZarVNzI3YejNKWCSOYu1FYjcJbGJLn7O99ZpD0vZqlrl
8+8n2kEZ8ivKtI4X1s9D3zhuapAushj6b0x55AH5qjBUUtayd9e41jgjFPXARQQ4
UwvWgWUrEioAh7Fr0wez
=RlCV
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/22097fe9-6c76-bdf9-fa63-eceded82203d%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How to install XFCE in dom0?

2016-06-28 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-06-28 00:17, Albin Otterhäll wrote:
> Andrew David Wong:
>> I noticed you started a thread on this last month, too:
>> 
>> https://groups.google.com/d/topic/qubes-users/rgjQoi40XKY/discussion
>
>> 
> My question was regarding the eventual requirement for
> customization that is documented on that page. I didn't think that
> the installation instructions where outdated.
> 

Ah, I see. My apologies for misunderstanding.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXcnMuAAoJENtN07w5UDAwcp8P/jEdtWz+C4BwnZwh0wtxk55a
P9j6oQwBg5QTwvHQjdY0/FDtn4f2zbOUdWGVVTAh79VvWWsVGUfdtRkEvZYRxl65
Hh3VDqJ+/DJTY43usUMl47K151LiMrHs1M0iwBV6Pn6yEF2TErIbBOoX517fG8FB
aFtxAk5J4kZFWqznTHtIdylzDw3+c0z1X2oT6vVawdmJtp+s3dvGsk3w6L8M6lzT
l4HCHNKhCYV20hK5PPZFw2d7K35OA+n6xveRP+UHlY+iXxZ0UZ1jxyJ09gtWKL14
NulxKAw9Bz6RPvQrScUEm8MlRp3C0dekI6v0D4667Kfq7k5Our7Yj6zpGjMUlwfh
64wxoj44dv4ok5guIFc5Q3PbCI5vsrEKwdEXewzhUGiqE+ps9xBk9z2qIsEK1chX
/oBTu7oRLTHOuI9uF9/Mo+2jkAB9Ok9q/9vjcYRXQRjo76P+gBK6r344vsKYc78N
oTF8UZO84nS3RhOhYGjTjpN8Wh1pJjtCSbxXBckiHdjSjCPqapUMdkI8UDFsvRGG
kwGgIuqFUmOsQ4ddAn4/K+TYSjfj/AP1us1fK3sQiEapTgVgmF2YSUpXBTUMSeii
LhYxLRzJA39I9DcZdkxZw2X6haGABOzXlrsUtcnJPEnlfXjM6nCWXZLY+C7+SEhN
LU18CrUbLwAHdWDvvmIZ
=izJf
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dd29223e-4f54-ca8f-615f-03bf0f3dad14%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Opengl, passwords, crypt, vpn and docs

2016-06-28 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-06-27 18:18, Eva Star wrote:
> 3) I'm worry about hdd encryption by cryptosetup. Is it strong by
> default? We can not choose ALGs at installer...

It uses cryptsetup (LUKS/dm-crypt) under the hood. You can configure
the settings manually from the command line by following the
instructions here:

https://www.qubes-os.org/doc/encryption-config/

> 3.1) How can I change password for my LUKS drive ? Maybe docs page
> about that? 3.2) How can I reencrupt full disk with ALG? What ALG
> is used by default? 3.3) How to increase number of iterations to
> count password hash?

All three of these questions are answered (or should be answered) by
the cryptsetup man page and/or FAQ:

http://linux.die.net/man/8/cryptsetup
https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions

> 3.4.0) Is it possible to install other crpt.software to dom0 and
> make container to store vms on it (layer 2 for some vms)? Will QM
> work when vms not accessible before container will be mounted by
> user manually ?

This sounds like it falls under the "per-VM encryption" idea that has
been discussed extensively on these lists over the years. See this
issue, for example:

https://github.com/QubesOS/qubes-issues/issues/1293

> 5) "Files" not start every time when I click on shortcut to start
> it :-/ Time to time only after 3 clicks it starts.

Is it this?

https://github.com/QubesOS/qubes-issues/issues/2085

If so, looks like the fix is already in the testing repo.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=DgRg
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0c51d814-e721-7425-728b-6467a00925dd%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to install XFCE in dom0?

2016-06-28 Thread Albin Otterhäll
Andrew David Wong:
> I noticed you started a thread on this last month, too:
> 
> https://groups.google.com/d/topic/qubes-users/rgjQoi40XKY/discussion

My question was regarding the eventual requirement for customization
that is documented on that page. I didn't think that the installation
instructions where outdated.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/nkt89u%24vij%241%40ger.gmane.org.
For more options, visit https://groups.google.com/d/optout.