Re: [qubes-users] Re: Qubes 3.2 rc1 has been released!
On 06/28/2016 02:23 PM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Jun 28, 2016 at 10:36:42AM -0700, raahe...@gmail.com wrote: Will we be able to upgrade to 3.2 from dom0 update eventually? Or if we choose not to reinstall is there security implications? Yes. Experimental instruction already online: https://www.qubes-os.org/doc/upgrade-to-r3.2/ - -- FWIW, I tried this yesterday and it produced a system that stalled in the middle of booting, so I installed fresh from DVD. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b24f83d8-ebe8-98c2-1397-1e278355b886%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Shutdown Proccess
Maybe some hotlink for this operation at Qubes Manager menu ? If you execute `qvm-shutdown --all --wait` just before shutting down the > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/75ac83ca-e2c4-4b4a-ac6d-381ba499a016%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: VM CPU mapping - countermeasurements against covert channels via cpu caches?
On Tue, 28 Jun 2016, 12384013418489'14'810'4 wrote: > would be the Intel Skylake Technology SGX a solution, so that the keys > cannot be read from the crypto processes? In these covert attacks, the keys are not "read" but leaked. Those leaks are unlikely to be solved by SGX as it's not the threat it is used to counter (i.e., SGX prevents reading of those DRM keys directly from RAM in plain text form :-)). With SGX, the memory is encrypted so that it cannot be "read", however, the CPU still does calculations of an SGX enclave the same way as without them which creates the opportunity for the very same covert channels to form. Other interesting technology in this domain is ability to somehow control cache allocations that is available at least with Broadwell Xeons. However, I'm not convinced it can fully remove cache-based covert channels either. -- i.
Re: [qubes-users] Bitcoin Qubes tutorial
On 2016-06-28 12:01, Franz wrote: Hello, is there some form of tutorial for using Bitcoins with Qubes, considering that I have no experience of bitcoins? It seem I should have a VM for a hot wallet for making transactions and another for a cold wallet to keep the bitcoins. But have no idea if it is possible to move bitcoins between the two Also imagine a good practice would be to make a backup of the VMs containing the wallets using Qubes backup. It would be also interesting to know which clients you consider safer for buying and selling bitcoins. Thanks Best Fran Hi, Fran. I've done exactly this using the Electrum bitcoin wallet. I have a dedicated hot ("watching") wallet in its own VM, and a cold (offline) wallet in a separate VM that's never network-connected. Although I'm hardly a bitcoin expert, I don't think it's a matter of "transferring bitcoin from one wallet to another." Rather, I think the cold wallet just holds the private keys used when authorizing bitcoin transactions. For example, if I'm buying something with 1 bc, I generate a pending transaction in the hot wallet, sign that transaction in the cold wallet, transfer the signed transaction back to the hot wallet, and then broadcast it from there. That way, only that 1 bc is ever vulnerable in a network-connected VM. If I'm misunderstanding this, or doing it wrong, I'd love to be educated by a bitcoin guru! Todd -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/59a6d11ff0484fc1ae7bda853f9dbada%40nowlas.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: VM CPU mapping - countermeasurements against covert channels via cpu caches?
Hello, would be the Intel Skylake Technology SGX a solution, so that the keys cannot be read from the crypto processes? https://github.com/01org/linux-sgx Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e4492fa8-6a87-44bb-ab43-cd1ec495b981%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL - Lenovo Y50-70
does the nvidia display work with qubes 3.2? from what i gather it should due to the newer linux hernel. so far its the only reasonably priced qubes compatable 4k, 16gb, backlit kb, 15" laptop i found yet even without tpm cant find a 17" the w450, p50, p70 are over $2k easy the big risk with the y50-70 is bad reviews with build quality there were more than a few bad batches aparently thus at worst i may have to return one before i get another -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7fc67b1b-5cf8-4f0d-8df7-2f65b0e314b6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Bitcoin Qubes tutorial
Hello, is there some form of tutorial for using Bitcoins with Qubes, considering that I have no experience of bitcoins? It seem I should have a VM for a hot wallet for making transactions and another for a cold wallet to keep the bitcoins. But have no idea if it is possible to move bitcoins between the two Also imagine a good practice would be to make a backup of the VMs containing the wallets using Qubes backup. It would be also interesting to know which clients you consider safer for buying and selling bitcoins. Thanks Best Fran -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qBkNyzzNnp-dX9%3DpFL3_B6hwu6kVgUNXsLFz_D0wRxb7Q%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 3.2 rc1 has been released!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Jun 28, 2016 at 10:36:42AM -0700, raahe...@gmail.com wrote: > Will we be able to upgrade to 3.2 from dom0 update eventually? Or if we > choose not to reinstall is there security implications? Yes. Experimental instruction already online: https://www.qubes-os.org/doc/upgrade-to-r3.2/ - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXcsCcAAoJENuP0xzK19csjowH/RHfqm/DKhbiVJpu3Nnu997L CbdgyL4Jt2qMLnIad72QL26mzrb42EEx1A3xYSVjfxRWktIrAN83ZXJFVgRJlJee qcsfdtKWZukJmGQ1FZ5M8V/r9oFHw5WBETQQSmreLLgytZam80r0Ssgc55n0wBNj y2G7g9V3Oxi1fbMZOptNKFWfeEoC7++Udx8tK0zuLV/LU/X5HwVmeeyqtazhhaJx MEI4SRM5fgbj4gGACCFPgRrgLjsW8MC1LIeNT38k57X+vgNgQga6Rj4ieJttJDu7 b0nifYm21r5J/47tjFxUnI/sEklRVJO0bPpXzrnIkLFcW7D7hNf5Fvk0yuGI8i0= =Y5rc -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160628182324.GL1323%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 3.2 rc1 has been released!
On Tuesday, June 21, 2016 at 1:45:48 AM UTC-4, mmih...@gmail.com wrote: > > > one other thing i noticed a while ago - the dracut text-mode > > > installer does not show the pop-up asking the user for the LUKS > > > passphrase, the installation doesn't work because of that.. bug? > > > feature? > > > > Can you clarify what you mean by "the installation doesn't work"? As > > in, can't proceed? (How were you able to install in that case?) > > > > Does it seem related to this issue? > > > > https://github.com/QubesOS/qubes-issues/issues/794 > > Good morning, > > What I have noticed is that in the text mode the LUKS password prompt is not > visible until you press a key like ENTER. Then the prompt appears and you can > type in the password. Or, to be exact, you could type in the password blindly > and it would still work. > > For those that have problem entering the disk encryption password in the > graphic boot mode I'd suggest to switch to text mode by pressing the > "Pause/Break" key. Then, when the screen activity subsides, you should press > the ENTER key. In this way you might get a password prompt. > > -- Regards, Matej. Will we be able to upgrade to 3.2 from dom0 update eventually? Or if we choose not to reinstall is there security implications? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c863531e-5b17-4e19-9f5f-94cfa9c8f983%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Shutdown Proccess
On Monday, June 27, 2016 at 9:12:43 PM UTC-4, Marek Marczykowski-Górecki wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Mon, Jun 27, 2016 at 05:57:00PM -0700, Eva Star wrote: > > https://github.com/QubesOS/qubes-issues/issues/1581 > > > > What do you think about adding "priority" to each vm to solve shutdown > > process issue? > > With highest (>=) priority number VM shutdown first and with the same > > number maybe synchronously. > > > > Example: > > sys-net -- shutdown priority 10 > > sys-firewall -- 20 > > sys-whonix -- 30 > > Some-ProxyVm with sys-whonix netvm -- auto priority 31 or manual selected > > 40 (Maybe user can choose priority. New vm must created with +1 shutdown > > priority by default or manually selected.) > > > > When shutdown process start it must shutdown VMs with highest priority > > first, then continue shutdown with lower priority number VMs. > > At the same time Qubes must show fullscreen list of all VMs and status of > > them with buttons to kill them. > > > > The idea to shutdown with dependencies. Like users do at QM when they wants > > to stop all vms. > > > > Maybe we can setup priorities automatically in most situations. We know > > sequences like: sys-new -> sys-firewall -> vmproxy1 -> sys-whonix -> vmvpn > > -> appvm > > So, we can stop them one-by-one from right to left. It is reasonable, then > > stop all of them at the same time. > > > > Or maybe 2-3 groups of vms by priority, e.g: > > default - automatic priority by sequences. > > highest - must shutdown before any other if we can do that (no dependences) > > low - shutdown after all other > > While there is some sense in having such sequential shutdown, it's > rather solution for this one, not the shutdown hung: > https://github.com/QubesOS/qubes-issues/issues/1826 > > If you execute `qvm-shutdown --all --wait` just before shutting down the > system, it will shutdown all the VMs at the same time, and it's also > enough to have fast shutdown. > The problem is that VMs shutdown during system shutdown (which > is called exactly as `qvm-shutdown --all --wait`) somehow doesn't finish > its task. VMs shutdown itself is initiated, which is visible for example > in disk activity. But I don't know what happens next - either not all > VMs are powered off, or some cleanup isn't executed. If you look at > shutdown messages, you can see at the end that disk can't be unmounted > because it is still in use. This may be some hint about the cause... > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJXcc7rAAoJENuP0xzK19csLEQIAIP+pxq7YpnddK2eIxpRt+QC > KREhBWEqBhKkw8x+mGvE4L2GPMKJ0xWsS9398s/XQ2gKcz24Ow79xfgWex+/pURS > bTqp7K7bVIW/sEHofO0/dLJSguNnx5r3X8TnwSXMkDNvdfQBm+6vm2R+zhwij5cb > Oiuchp6JMVkES16y67TVkPYm+Py9wcSxWj51hKgFqeDDcTveDmOCZiX+pBwDuXGN > Gei0AuZlq/wl9NmDnfyQFB2Db8zgg1MWRpY3LFT4eu7G+4IbQ0fKzghNPsoRH+SU > IS5ONxkFLlJzSGThhBHEeTuK9vvth2Ik551QI1X7f1Ve95OdzPyVB2BlerqWsLs= > =NeYG > -END PGP SIGNATURE- I never had shutdown stall from not shutting down the vms that start at boot. Like all the sys vms. Its only happens sometimes if I don't shutdown an appvm first that I've manually started. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/386327d6-6755-4f6a-a471-07050d54608f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] manual update dom0 to newest 4.5 kernel
Holger, Great to hear you managed to upgrade the kernel !! This means I might not need to buy an other laptop after all. I looked back at what you posted but it's a bit confusing. I'm probably not the only one. Would it be possible for you to make a clear overview of all the steps to take (commandos in dom0 terminal) to be able to upgrade the kernel? This would be of help to alot of people, at least to me. Hope you can help out. Much appreciated! Cheers, R On Wednesday, 27 April 2016, Marek Marczykowski-Górecki < marma...@invisiblethingslab.com> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Tue, Apr 26, 2016 at 10:54:19PM +, Holger Levsen wrote: > > On Wed, Apr 27, 2016 at 12:39:08AM +0200, Marek Marczykowski-Górecki > wrote: > > > Reading through /etc/grub.d/20_linux_xen, it requires also > > > /boot/config-$kernelversion file. > > > > whoohoo, that worked, grub picked it up and when I boot it… it reboots > > directly after grub loading xen and the 4.5 kernel… with no > > output/failure whatsoever :/ > > Try removing "quiet" option from kernel cmdline. > > > at least the fallback to xen with 4.1 kernel works nicely… > > > > the initramfs for 4.5 is a bit smaller (16755547 vs 17384503), there are > > 3778 files in /lib/modules/4.1* and 3589 in /lib/modules/4.5* > > Interesting, but probably doesn't matter. I guess in 4.5 more things are > selected as built-in. > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJXH/QTAAoJENuP0xzK19cshOIH/RUGJ0WgUuV/8uOcLLn18uOF > ulC1L+VKBThMtjdAqU/GVT8Qy6YSaS91Y5GGzp5/9Iw7nNSi+6fZxQZ1pT9wHjQE > 8rYiWfwjnNBEiUaVDpEEMivmCy9q1AiFRwMGGH3xgxIzfKnEU+zt5SEcoplu8bEo > lLg3VbfcFQphGOI3O7gA3KHeUdwsCNCQit1DV/4ZekPot4K/YphoQmSGNKSrtp18 > AZNzfKLv2YFp4dApD6jIGLBktOcqPz+DwGDP458nDFiTFvsaSq+Fo8HOXumwVjyK > E+E+rpwwvPoX36BdEg8PhBEc0H4gYOqKGmD312/VvFdfEqBn0+z9HMj397s+7r0= > =h8p7 > -END PGP SIGNATURE- > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAGqf3ZFPJMWGcNq-U%2BuHMJ8QJxicc8pL3qU5LHxtmJQBxeYgkw%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Opengl, passwords, crypt, vpn and docs
On 06/27/2016 09:18 PM, Eva Star wrote: 1) VPN doc say at the first part that need to add "network-manager" and enable it. At the second part it's without "network-manager". When/On what situations I need I enable? When using a proxy vm to run the vpn client, you can either enable network manager or you can setup the client (e.g. openvpn, etc.) manually in the CLI. So the CLI method with scripts doesn't require enabling network manager in the proxy vm. 2) At the second part of VPN doc. How exactly DNS line at vpnclient.config must be written ? |vpn_dns '1.2.3.4.5 2.3.4.5.6' | Is it correct line? The complete correct line would be: setenv vpn_dns '1.2.3.4.5 2.3.4.5.6' Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/32f35e71-625f-1fb5-3211-485b6bdc26d8%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] VM Manager ERROR: "libvirtError: internal error: client socket is closed"
I installed the debian and whonix templates But then, whenever I open VM Manager, I get the following error: "Whoops. A critical error has occured. This is most likely a bug in Qubes Manager. libvirtError: internal error: client socket is closed at line 1268 of the file libvirt.py" Not only this.. but when I click OK, i can browse the VMs.. but I can't attach USB devices to them So... what is the solution here...? Do I Just need to restart the Qubes system.. or has something else gone wrong entirely...? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9bd6efba-eb2c-46a9-8192-bbdd7e8e40f2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qubes-dom0-update results in HTTP Error 404
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-06-28 05:05, Chris Grimmett wrote: > I did the command you suggested, then tried again. I saw the same > 404 errors. It wasn't until I was working on another project, > getting screenshots to save to AppVMs > (https://jrruethe.github.io/blog/2015/09/17/screenshots-in-qubes/) > when I was able to install a new package in Dom0. After that, I > was able to get qubes-windows-tools updated. Here are the commands > i ran: > > * sudo qubes-dom0-update scrot * sudo qubes-dom0-update > qubes-windows-tools * sudo qubes-dom0-update > --enablerepo=qubes-*-testing qubes-windows-tools > Are you downloading updates via Tor (sys-whonix)? If so, it's possible that you just temporarily had a bad exit node. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXcnVIAAoJENtN07w5UDAwd3cP+wZetL9njcJULVO0VHW/Viqy QVS+NQ1WJGFjKByocutM/vRUwueYke46SAEjH9UKyppM9GmdSvixdZFMLJikpQjS CbJnDZtNutW2/37F8pju1hcuaQuhSc9Po6BP/4tFVxUku7a5GNwqcJoWYd9WmS3L zrlPEr8/LEn+QT6vDpfszR266rcKkdFrpI9W3UlfrjPr5aDzAOWcvyex+B6yVcUF 5XWumaA+XnmMXypZsRze2rVNRg7NrV0BBSYbI4YSiVy1U7wuMp8215gDVNBF/Wxg HRUzy7LNaHL/8Oi1I/NrSIizT65Lvy+/iqjRhWyAUvxmo7splPpf0aH9IsN+iNuP R2/Uuo3SBtk9Osbtu+IMsOtRMX33yk3EW5xdj6jES2CHzAoKf8HyX4KxpBAJ/jNi cl56ERhtrWjyY9Js+5nGv3UgIiBpvJuv1YzHPMM5jCbfBPa8qCLoPvWkKjZfd7MV ttXHgNiw4ei2b8LwsKlhj6C5qZY8KSLUCYfOjrbiDnZY3NzKnIByYK7yYdvOScCy 6s0Ei3e9KDvjKv8Fo6IdpN6JklABcrxN+1tH7WYORAZS5XFjibXumfvr1mGdNLX1 DD108YhRIiyk91OTd/W+jpHje7JQcIFPX4BOs9d22ygB4OXzkTRSoqvV1185+fdv vJ8B1Q5nC6dxouHfhFGf =NGXE -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5a791c27-7cff-d53e-b5fd-55426ec75c5c%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] R3.2-rc1 - Improvements / Well done / Thanks!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-06-28 01:31, qubescr...@gmail.com wrote: > Hi > > Amidst a sea of complaints and bug reports, I just wanted to drop > a note to say thank you to everyone who's working on Qubes, so > THANK YOU! You are doing an amazing job, guys! :-) > > Having just updated to the latest release, the difference for me > has been absolutely remarkable - like night and day. > > With KDE, Breeze dark theme and font sizes increased to counter my > 4K screen and make everything legible again, this is now becoming a > joy to use. > > If I could only work out how to get Streisand OpenVPN working > properly in a ProxyVM, and find a way to use Apple Pages / Numbers > etc. via a web browser, I can well imagine Qubes becoming my daily > OS. > > Given that I'm only just above "idiot" level, I'd say this bodes > well for your aims for widespread adoption. Well done, to you > all! > Thank you! We're very glad to hear that it's working well for you. (Check out the recently-updated VPN documentation if you haven't already: https://www.qubes-os.org/doc/vpn/. Also, no personal experience with iWork for iCloud, but it sounds like it has browser support: https://www.apple.com/iwork-for-icloud/. Does it not work in Chrome in a Fedora AppVM?) - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXcnSRAAoJENtN07w5UDAwygQQALOVVbn+jaSvX/NH+9ZpMYAK GTJfhrue1ZLdow8IuslELNR6Fhv0kq97sTbBEMeUoaF6LpM8ubisVe9HcPOq5zmn Wcb5NoPjgVEX/Z+AsEXBPb6E922wNQGeOLuTFiyhSyxwRDwZnhIyLuNNqFJ5+Ibq qlOGyO3oep93e3BZJPFMIoROn9e14WyT9P1Nn2L2LVH6KUoeZ2AwKSBZcIVFMvSM X7E5pgBYuxbJy4NDlOzwfAo9mH1QeIdAFGg5tIfkvITAzht/6JPXsKPb+7aGSDrh 218bzvfiS5gnzuzc/LqmolYNMZ1aUuwJSrIcZjY5OCfDiAEirnqVCT1oLyGigv9h Xdut3fBagiDnaWs4LsIn/qASXYLStl1wnjm6lcx3nH+vxJRGLCbbYVUri7HtvRhX j9/4oEq9r9/LiYKSmvni2TgAWb/quiq8SqOymrUwfqKkMj33NN9pvPkqsKptXYrY w3QIDpAP+khFcILRkiURSVcw5U9dHLAs1wHt8+i368UYreGdw/hKRvKLgugGPQyH OmCHllMaJvLbGJFPZudfZarVNzI3YejNKWCSOYu1FYjcJbGJLn7O99ZpD0vZqlrl 8+8n2kEZ8ivKtI4X1s9D3zhuapAushj6b0x55AH5qjBUUtayd9e41jgjFPXARQQ4 UwvWgWUrEioAh7Fr0wez =RlCV -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/22097fe9-6c76-bdf9-fa63-eceded82203d%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: How to install XFCE in dom0?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-06-28 00:17, Albin Otterhäll wrote: > Andrew David Wong: >> I noticed you started a thread on this last month, too: >> >> https://groups.google.com/d/topic/qubes-users/rgjQoi40XKY/discussion > >> > My question was regarding the eventual requirement for > customization that is documented on that page. I didn't think that > the installation instructions where outdated. > Ah, I see. My apologies for misunderstanding. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXcnMuAAoJENtN07w5UDAwcp8P/jEdtWz+C4BwnZwh0wtxk55a P9j6oQwBg5QTwvHQjdY0/FDtn4f2zbOUdWGVVTAh79VvWWsVGUfdtRkEvZYRxl65 Hh3VDqJ+/DJTY43usUMl47K151LiMrHs1M0iwBV6Pn6yEF2TErIbBOoX517fG8FB aFtxAk5J4kZFWqznTHtIdylzDw3+c0z1X2oT6vVawdmJtp+s3dvGsk3w6L8M6lzT l4HCHNKhCYV20hK5PPZFw2d7K35OA+n6xveRP+UHlY+iXxZ0UZ1jxyJ09gtWKL14 NulxKAw9Bz6RPvQrScUEm8MlRp3C0dekI6v0D4667Kfq7k5Our7Yj6zpGjMUlwfh 64wxoj44dv4ok5guIFc5Q3PbCI5vsrEKwdEXewzhUGiqE+ps9xBk9z2qIsEK1chX /oBTu7oRLTHOuI9uF9/Mo+2jkAB9Ok9q/9vjcYRXQRjo76P+gBK6r344vsKYc78N oTF8UZO84nS3RhOhYGjTjpN8Wh1pJjtCSbxXBckiHdjSjCPqapUMdkI8UDFsvRGG kwGgIuqFUmOsQ4ddAn4/K+TYSjfj/AP1us1fK3sQiEapTgVgmF2YSUpXBTUMSeii LhYxLRzJA39I9DcZdkxZw2X6haGABOzXlrsUtcnJPEnlfXjM6nCWXZLY+C7+SEhN LU18CrUbLwAHdWDvvmIZ =izJf -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dd29223e-4f54-ca8f-615f-03bf0f3dad14%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Opengl, passwords, crypt, vpn and docs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-06-27 18:18, Eva Star wrote: > 3) I'm worry about hdd encryption by cryptosetup. Is it strong by > default? We can not choose ALGs at installer... It uses cryptsetup (LUKS/dm-crypt) under the hood. You can configure the settings manually from the command line by following the instructions here: https://www.qubes-os.org/doc/encryption-config/ > 3.1) How can I change password for my LUKS drive ? Maybe docs page > about that? 3.2) How can I reencrupt full disk with ALG? What ALG > is used by default? 3.3) How to increase number of iterations to > count password hash? All three of these questions are answered (or should be answered) by the cryptsetup man page and/or FAQ: http://linux.die.net/man/8/cryptsetup https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions > 3.4.0) Is it possible to install other crpt.software to dom0 and > make container to store vms on it (layer 2 for some vms)? Will QM > work when vms not accessible before container will be mounted by > user manually ? This sounds like it falls under the "per-VM encryption" idea that has been discussed extensively on these lists over the years. See this issue, for example: https://github.com/QubesOS/qubes-issues/issues/1293 > 5) "Files" not start every time when I click on shortcut to start > it :-/ Time to time only after 3 clicks it starts. Is it this? https://github.com/QubesOS/qubes-issues/issues/2085 If so, looks like the fix is already in the testing repo. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXcnEAAAoJENtN07w5UDAwXmkQAIXr/On/ctMU1Z1dbFWYApPs 2JqJTwkSmAY7aImAxjrlfdrvNL369pEdX1L8EurQJo4dYDZuXI/TEpp0eoh7+Bji w+PdSNcgZvIDNG2WPJEwWS8QEnKl6TVxHjUpY4KbNvyAaXU2Uh2uXxkvKcj/yFrq nC3YcRaSHIV2Cdf00GyRNrSeGMpguKNiR/V+ymyECdlhDRlVSEJTzuD2/iLT0Tbi 6wtdmdIsg2wiTYyCDokYrYF9qxEY+plQ9Do8F799Lxpy/Uzy/jFiSjhSs5pbQk4B mOt6lXqTqNdsrCmJksPX0NvJswyshn0WeergJnDiJncyYCkiF2yvLV4dwgB1RXfH fPmd5FTvh9y6exJBg93roCcNUQWYA23ZSjSGdSXi5nMDN97vV8fdOBdImZ7XODEQ nZrfokQ2mhhbWlrDPn7UlLO/yPwgAL6/GXN8WtxDAXYcahcuy9d66eyf8YoGAJ/N O4dcwTuNfV80Vc9hWzJYErfxxIbegBp5EF4OwE3zv6Y0qOg0iQasxzFa0C6Imh9M 7hNPQT6nDpMmSQ/FLJXkGeuAnawwkjjkTDEum1MDWL2kl+l5iUHATa6mLdVlRsGL ncFsdyZAgL4yWdTaPR2U8Ibx1vK3D7/YF9o20kuHFmf7Mudj+vednklejOXvusRn z+bw5QMlD/S4z7sw8F3x =DgRg -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0c51d814-e721-7425-728b-6467a00925dd%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to install XFCE in dom0?
Andrew David Wong: > I noticed you started a thread on this last month, too: > > https://groups.google.com/d/topic/qubes-users/rgjQoi40XKY/discussion My question was regarding the eventual requirement for customization that is documented on that page. I didn't think that the installation instructions where outdated. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nkt89u%24vij%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.