Re: [qubes-users] Re: Q wipe files
Hello, on the application layer I can find some better encryption, which is polymorphic. This will prevent that someone find the leverage point to kick the crypto out. https://www.youtube.com/watch?v=aApTVqeGJMw But sadly this PMC is running only under windows. https://www.youtube.com/watch?v=aApTVqeGJMw Ok I can do it on a WinVM under Qubes. But Windows is not a real time system and so nobody knows what is really going on. The only task is to encrypt the original file and delete/wipe the original file. So a real-time OS would be much better, than a multitasking system. If the wipe/shred perhaps or perhaps not will work, there is only one solution to make sure that the disk is clean: https://www.theguardian.com/uk-news/2014/jan/31/footage-released-guardian-editors-snowden-hard-drives-gchq But never mind, Q OS uses a full disk encryption, which is quite smart. This means every original file and any temps or other randomized shadow-files are as well encrypted by default. So I don't need to destroy my PC after I send one email, because I can remove the WinVM. But now I came to the old question, is the LUKS disk encryption perhaps or perhaps not it will be safe? I think the only clean support will be the possibility to plug in the own parallel encryption. Is there some tutorial, how I can use a API to plug in my own encryption as a per-process f before LUKS begins his crypt-process? This will be a multi-layer security system in the end. Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/918f266f-92ad-4368-84b7-9ff570ca883c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes top priorities suggestions for me as an user.
1) qubes is a system for security and isolation. But when you install, you have no encryption options. distros thinks that if a user wants some strong crypto thing, they must research themselves and do all manually. We dont even find nothing about qubes encryption in docs. That is wrong. First thing we must do out-of-the-box is to offer strong full disk encryption, like veracrypt ones, with options, iteractions, etc., and inform the user about that. Even tails for just a live browser with storage capability does that. Even distros like PARTED MAGIC for managing partitions now come with veracrypt installed as default in live-cds. To me, Qubes is neglecting what the user wants to read and do in encryption aspects. I usually use mint strong encryption. But even that i must do manually. Imagine ALL users trying to do this on their own. They wont. i use appendix A configs from links below, much stronger. https://community.linuxmint.com/tutorial/view/2026 (bios) https://community.linuxmint.com/tutorial/view/2061 (uefi) 2) Qubes face 2 problems nowadays for engaging new users with real security. a) Qubes is a system for HIGH END computers with lots of RAM. Usually if for people that has WINDOWS and GAMES also, a good GPU, and wont waste their machine on a UNIQUE linux system at least without dual boot. b) Nvidia spy on people, with their streaming @!^@^% they put in new gpus, network, etc, and people are suspicious amd too. But most consumers are from nvidia. nvidia now spy on hardware level. Does not matter the system security. The solution? REAL windows virtualization with GPU PASSTROUGH. So, the high end computers can use windows for what they need and even play games. Plus, if you do use nvidia in dom-0, they WILL capture the screen on hardware level. Nouveau is not working right for a long time. Onboard or gpu 1 for dom-0 and nvidia or amd high end for windows VM. If the person doesnt have 2 monitors, it can change the vga adapter from 1 to other to use windows after starting the vm. that would be perfect. So we give a finger to nvidia and the drivers problems they cause, and we isolate their spying inside windows vm, plus eliminating the need for a dual boot and for everyone not using their gaming gpus. So, XEN is not good for that? consider passing to KVM. - To create a real secure isolation OS, it`s primal to ensure best disk encryption avaliable, with CHOICE for speed/security, eliminate the windows host multi boot needs, and make good use and usability for windows and gpus. You will reach that when you direct the efforts to adapting the system for what the global user WANTS AND NEEDS, and not adapting the user to the system that 1 person in 1 chair dream for its personal needs. Ubuntu did not follow this lesson with their unity thing and they paid the price. 3) Consider offering PFSENSE as optional firewall vm installed out of the box. It`s very hard and time consuming to do that inside qubes system without studying all, for managing internal ip structure etc. It is the most perfect firewall for use inside a VM, qubes is a system for VMs, and i did use it even inside windows in virtualbox. But i was in WINDOWS, and that means, no real security at all. I would like also to give 2 more suggestions for people to considerate, concerning whonix, since patrick is a developer here: 4) People need a pop-up window to explain them to NEVER use an existing normal vm trough the whonix proxy vm, just NEW ONES. Because they have already fingerprints, identifiers, browser behavior, browser plugins identification, aplication updates, specially in windows. If they connect that with once used real wan IP, game over for anonymity. 5) i will use this post to state that tor behaves differently to connect in windows tor browser, or linux tor browser, compared to whonix, and i dont know why. Whonix gets always same speed, 250 to 500 Kbps, (not KBps) with speed of 30 to 60 kB/s of downloads, and in tor browser outside whonix, i get 500 to 1 Mb kB/s downloads. Thats really strange and wasn`t expected. I get this behavior for almost 2 years, and i dont have the expertize to know why. after some googling, i saw i am not the only one getting different special routes in tor using whonix. Sorry for my bad english, is not my main language, i hope people can understand what i wrote. And forgive me if i wrote stupid things. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8efb8d91-de6b-4a6d-b215-65bca333a81f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [Q3.2rc1] XFCE bugs with locale, suspend bug and some other
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 (Please don't make duplicate -- or partially duplicate -- threads.) On 2016-07-04 06:45, Eva Star wrote: > > 1) Failed to start any VM after suspend (tested on xfce) > > Qubes Manager show icon with the following error: Error starting > vm internal error: libxenlight failed to create new domain Log > file say: libvchen_is_eof > (Replied on duplicate thread: https://groups.google.com/d/msg/qubes-users/8MDPxl41jRw/p-IKs9gXBAAJ) > > 2) Some characters does not show on title of XFCE windows. Is it > possible to fix this? https://i.imgur.com/xqLqHGD.png > (Replied on duplicate thread.) > 3) About issue with losing "System Tools" links at Application menu > you are already noticed? https://i.imgur.com/rCMiymX.png It's also > not available under right click of the mouse. > (Replied on duplicate thread.) > 4) At the Qubes website I see some bad character. What is it? > https://i.imgur.com/j4bMt05.png > It's a heart icon. You probably have some kind of browser extension that's blocking it. > > Suggestion: Qubes Manager UX: > > 1) Add possibility to sort menu items up and down. It's useful in > big list to keep some most used application at the top. > https://i.imgur.com/gctZoJl.png > (Replied on duplicate thread.) > 2) Related to issue number 1 on this post: It's only show the error > icon per vm and need to hover to get the error message. Why not to > add this errors to the log of VM? > (Replied on duplicate thread.) > 3) As there is a new issue on the tracker from Joanna: > > https://github.com/QubesOS/qubes-issues/issues/2132 > > It is all fine to simplify Qubes Manager and add some > panel addons. But as the new user of Qubes I can suggest to stay > with advanced Qubes Manager available. As for me, I'm only use > start menu because of Qubes Manager does not have some icon near > AppVM name to click on it with LEFT mouse button like Joanna want > and receive list of available shortcuts to start. > > If this will be available on QM then **only one** left mouse click > need to access and start some application. > > Compare it with Start menu: (1 click) open menu (2 click) choose > VM on the BIG list with eye research (3 click) launch application. > > So, there is TWO additional click with Start menu and some eye > research. While new Qubes Manager can provide as the better UX in > same scenarios. And some users will forget about Start menu at > all. > > 4) Why Qubes Manager written on phyton code? Is it compatibility > issue? Why not to write it on C++ with Gt/Gtk ? > > > Some additational questions: > > Is it "safe" to give "yes to all" permissions to vm with > Enigmail(PGP) to access vaultVM through slip-pgp-key? > (Replied on duplicate thread.) > Is it possible to use subkeys on Enigmail? Enigmail does not give > to select subkey. Only primary key available for signing messages. > (Replied on duplicate thread.) - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXeyL2AAoJENtN07w5UDAwPFoP/Rx6CU5xL+PmGrvU/iuoFFgR EIxH441957Gt84dSrMVx4uAjES0ZmtE3uD5qQbMGdVcXw32tB4Zkqhi7hrvzNis1 GHkH4sm3sh+eB+HO7cqQkj/PJqopJMB12zg6eJf0dwy4UYQUpEQYvOJwvpdr1D/D 6riZ4GOJvVA9U7OMUU83vI8lre8nIQ7F8euh1W2qCUPY9wXQWBZxXv6Pu3GWbjER RHQXNIceIbPWJpQtlOSJDFq5chQh7dNx0CBkA1Wih63y3giGvryVxxCBI/Gh6L15 v3wBefJuVIzDGmgJOtKtkIQa1JiZWpma3XT/RqNB2+3atTwVhj47Ys7c9u6+UH+k pgfECFVJAMgWh+N8Gueb0YZXoUfPsBBOTUSh6cG4MDYwDlc9VPspIaYak/m0/xuI CtE4V/BsZ4zoWbWS9mACbnEA+VUu4tCC1juASy/L4VEvK5dvyjjcw5VNR7tZge5L TA+OEsVIszliweUHVlY1TaXye6swaeLN8uVv7DcUIvZrvM/uMbh+GlAgxbDJm3F/ Nwx7xRCz16KrScecv8HWiJ5k6wyEw/fO0qx7EfDcktbqbg4thLMmarTH1nWC2bOq 7E5aN1S5JxHy0+PKTaXq6zjQHX4VAxe01Ev95Q7ZAiQOFMnPI58GmDCO1RUWQZt+ pqfwlx5AVNpAvnPuvBsx =xXJm -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/65b569c7-e000-9eec-5ea5-aa8ac3ead398%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [Q3.2rc1] XFCE bugs with locale and suspend
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-03 18:05, Eva Star wrote: > 1) Failed to start any VM after suspend (tested on xfce) > > Qubes Manager show icon with following error: Error starting vm > internal error: libxenlight failed to create new domai n > > Log file: libvchen_is_eof > Tracking: https://github.com/QubesOS/qubes-issues/issues/2153 > > 2) Some characters does not show. It's on XFCE. Is it possible to > fix this? https://i.imgur.com/xqLqHGD.png > For security, window titles are sanitized for ASCII-only characters by default. You can disable this setting (globally or per-VM) in /etc/qubes/guid.conf (in dom0). Previous discussion: https://groups.google.com/d/topic/qubes-users/l_yqreeNTRc/discussion > 3) Related to first issue: It's only show error icon per vm and > need to hover to get the error. Why not to add this errors to log? > Tracking: https://github.com/QubesOS/qubes-issues/issues/2154 > 4) About issue with losing "System Tools" links at Application > menu you are already noticed? https://i.imgur.com/rCMiymX.png It's > also not available under right click of the mouse. > Added: https://github.com/QubesOS/qubes-issues/issues/2122#issuecomment- 230376188 > Some questions: Is it "safe" to give "yes to all" permissions to vm > with Enigmail(PGP) to access vaultvm through slip-pgp-key? It depends on your threat model, but in many common use cases, yes, it's safe. > And seems it's not possible to use subkeys on such configuration? It is indeed possible to use subkeys with Split GPG: https://www.qubes-os.org/doc/split-gpg/#tocAnchor-1-1-6 > Enigmail does not give to select subkey. Only primary key > available for signing messages. > This sounds like it may just be how subkeys (are supposed to) work. (If not, it could possibly be a limitation of Enigmail). > Suggestion: Qubes Manager UX - Add possibility to sort meny items > up and down. It's useful in big list to keep some most used > application at the top. https://i.imgur.com/gctZoJl.png Added: https://github.com/QubesOS/qubes-issues/issues/1870#issuecomment- 230376093 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXex/JAAoJENtN07w5UDAwgo4P/AvYVlzm8KxNpK/EQzOW9ctG hSOd2ihiumasbrtIsx9godZByqhvvXyQBxIGgisA7CgD4m+RxfbTpS1R/1synp5y Kr9Z7v3fy57zkmsA6Pd5tigs6ykktW7m9TzGDjBBUtyU9XGn7Z04A86ukk1R1hpC w+YWtfdNtgn1dXuoXnUzDBl/iTfymi3B1dSORiSNFBvyxTy2fm/jvOBl6D6wsFg1 qbkzLXb9mV7GLQ9rpGmPBuJwscQ3JC5GteS9OxJIv/+uWwHK2tS20hjIYHTd7Ut3 Gn9zoBXdpRwsnNXs3ESAu2Jxe7Qr00h8McBokKA5QMwJaExi+AX3vUglxLkJQV30 FN6XqflmFC7d994zyTA7ufGxRtPrzlj+kXD8RLPA2fHs0EVQ5Gh94or7o3I/Kvnj 5goOimFxNQrowXIU4yeeSH/Cqq8yqKyC/NUxpt4ZBiCn/zufwzE02V9xaRbcOH9r 00F4U4P+E203sK3kms+dDIcy+e8jvT8BAM86sngA95EF4Zuz0k4IaPU2cpk125M5 nLLmG9zWBlC5s9wNEScSsb+9FvTWKsbMJHOZSesUDxG0CRxVmjaVKpQzjUdq1KT8 YNmpWh4e51aEiiuBqL2ixQYBCIheM1eua60PQaL/mBHtCnZzDruKYoLJZkG5u16y hQvtzb57C7wqJ7TKXEUc =yfOh -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/38a96cd8-5b40-40b3-5628-4d9c868aab9c%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] security app suggestions if some coders are interested
There are some people - like Eva Star - developing some apps/scripts for Qubes. I would like to make a couple of suggestions for coders who might like a development challenge. * A GUI applet for the CLI program "rfkill", that is enabled on the desktop (or management console) by default to easily show the on/off status of network devices. (I don't think this would be too difficult.) * An app to scramble or obscure the network ports, which can be set to automatically start on bootup to give immediate protection. There a few such (CLI) apps available, but an improved GUI-based one would be even better. Any help in this area for victims of wireless hacking would be appreciated. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/140d14bb-20d4-4a12-91bb-051c27b0ecd4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Creating a VPN VM using openvpn issues? (starting with no /rw/config/openvpn ?)
On Monday, July 4, 2016 at 11:51:26 AM UTC+6, Chris Laprise wrote: > On 07/04/2016 11:33 AM, gaikokujinkyofu...@gmail.com wrote: > > On Sunday, July 3, 2016 at 11:32:53 PM UTC-3:30, Chris Laprise wrote: > >> On 07/03/2016 10:10 PM, gaikokujinkyofu...@gmail.com wrote: > >>> On Sunday, July 3, 2016 at 9:56:15 PM UTC+3, Chris Laprise wrote: > On 07/03/2016 09:14 PM, gaikokujinkyofu...@gmail.com wrote: > > Some things came up so I hadn't gotten around to trying it out until > > now. > > > > I created a new VM, VpnVM, and ran > > > > openvpn openvpn.ovpn > > > > and yeah! it connected and I opened firefox from VpnVM, and it was > > using the vpn, then ran PersonalVM using VpnVM as my NetVM and > > PersonalVM also showed up as using the VPN so first hurdle cleared? > Yes. > > > Lots more hurdles though as my understanding of it all drops off > > precipitously. > > > > I modified the /rw/config/openvpn/openvpn-client.ovpn file with the > > > > script-security 2 > > up 'qubes-vpn-handler.sh up' > > down 'qubes-vpn-handler.sh down' > > > > lines > > > > and I created the qubes-vpn-handler.sh and changed permissions. > > > > I then tried to start openvpn /rw/config/openvpn/openvpn-client.ovpn > > > > and no go. I get errors: > > > > Options error: --ca fails with ca.crt: No such file or directory > > Options error: --crl-verify failes crl.prm: no such file or dir > > Options error: please correct these errors > > > > I didn't get these errors before I added the qubes-vpn-handler.sh > > > > thoughts? > It looks like you switched to the example ovpn config from > https://github.com/ttasket/Qubes-vpn-support > > I'd recommend you use your original working ovpn and just add the 3 > script lines to that. > > Chris > >>> Actually I am using the ovpn that the vpn provider gives, and am just > >>> adding the 3 lines that step "2. Set up OpenVPN." of > >>> https://www.qubes-os.org/doc/vpn/ page suggest to the ovpn config file > >>> that the vpn provider gave. > >>> > >>> That file seems to work until I modify it with the 3 lines. While I don't > >>> understand the script I would assume there is something in the handler > >>> script that my setup doesn't like as the 3 lines are just invoking the > >>> qubes-vpn-handler.sh right? > >> Above, you switched from 'openvpn.ovpn' to... > >> '/rw/config/openvpn/openvpn-client.ovpn' so make sure they are the same. > >> > >> Changing the location of the files or your current directory while > >> omitting the '--cd' directive would cause the errors. Try starting it > >> with 'openvpn --cd /rw/config/openvpn/ --config openvpn-client.ovpn'. > >> > >> Chris > > Ah sorry. Thanks. I guess, some of my lazy shorthand confused things. I can > > promise though I have been going off the https://www.qubes-os.org/doc/vpn/ > > doc, wasn't actually aware of the github one. > > > > When I try to execute it what dir should I be doing this from? I tried the > > line you suggested > > openvpn --cd /rw/config/openvpn/ --config openvpn-client.ovpn > > > > but got the same options errors as before (just for the heck of it I tried > > from my home dir and from the /rw/config/openvpn dir) > > My bad, I should have said 'sudo openvpn --cd /rw/config/openvpn/ > --config openvpn-client.ovpn'. You want to run it with 'sudo'. > > It shouldn't matter where you start openvpn from as long as you use '--cd'. > > Also, verify that the two 'missing' files are in the /rw/config/openvpn > dir. Do an 'ls -l' there to check they are owned by root. > > Chris No worries, honestly I should have thought of the sudo myself. Well, running it with sudo and it went swimmingly, it connected so that is good, another hurdle cleared. I am now back to one of your earlier posts in this thread, regarding the qubes-firewall-user-script. I have to admit that I am not totally clear on needing to run the groupadd (it seems to be run in the firewall script?) but I ran it (and it shows up in /etc/group so I guess thats good?) but then on the next line: sudo sg qvpn -c openvpn --cd /rw/config/openvpn/ --config openvpn-client.ovpn I get an error saying: Options error: In [CMD-LINE]:1: Error opening configuration file:openvn-client.ovpn I don't understand groups and ids very well so am not sure where there breakdown is here, perhaps I need to set something regarding the openvpn-client.ovpn file? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2fdd853e-9e54-4c93-99ad-def7b03ace5c%40googlegroups.com. For
Re: [qubes-users] [Q3.2rc1] XFCE bugs with locale, suspend bug and some other
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Jul 04, 2016 at 04:45:23PM +0300, Eva Star wrote: > > 1) Failed to start any VM after suspend (tested on xfce) > > Qubes Manager show icon with the following error: > Error starting vm internal error: libxenlight failed to create new domain > Log file say: libvchen_is_eof > > > 2) Some characters does not show on title of XFCE windows. Is it > possible to fix this? > https://i.imgur.com/xqLqHGD.png This is expected. By default only ASCII is allowed. https://github.com/QubesOS/qubes-issues/issues/1059 > 3) About issue with losing "System Tools" links at Application menu > you are already noticed? > https://i.imgur.com/rCMiymX.png > It's also not available under right click of the mouse. https://github.com/QubesOS/qubes-issues/issues/2129 > 4) At the Qubes website I see some bad character. What is it? > https://i.imgur.com/j4bMt05.png Probably some missing font... > Suggestion: > Qubes Manager UX: > > 1) Add possibility to sort menu items up and down. > It's useful in big list to keep some most used application at the top. > https://i.imgur.com/gctZoJl.png Do you mean to control order of items in xfce menu from Qubes Manager? I'm afraid it isn't possible (it's always sorted by name). > 2) Related to issue number 1 on this post: It's only show the error > icon per vm and need to hover to get the error message. Why not to add > this errors to the log of VM? It is logged, in /var/log/libvirt/libxl/libxl-driver.log. Which BTW should contains some more information - can you check what exactly? > 3) As there is a new issue on the tracker from Joanna: > > https://github.com/QubesOS/qubes-issues/issues/2132 > > It is all fine to simplify Qubes Manager and add some panel > addons. > But as the new user of Qubes I can suggest to stay with advanced Qubes > Manager available. As for me, I'm only use start menu because of Qubes > Manager does not have some icon near AppVM name to click on it with > LEFT mouse button like Joanna want and receive list of available > shortcuts to start. > > If this will be available on QM then **only one** left mouse click > need to access and start some application. > > Compare it with Start menu: (1 click) open menu (2 click) choose VM on > the BIG list with eye research (3 click) launch application. > > So, there is TWO additional click with Start menu and some eye > research. While new Qubes Manager can provide as the better UX in > same scenarios. And some users will forget about Start menu at all. Generally I agree, but current Qubes Manger code base is horrible to maintain and we want to rewrite it. This may mean we'll not have resources to add also this feature. > 4) Why Qubes Manager written on phyton code? Is it compatibility > issue? Why not to write it on C++ with Gt/Gtk ? Because it's much easier to write and debug python code. You don't need to worry about hard to debug memory related errors (corruptions, use-after-free, overflows etc). Current manager uses Qt4 (PyQt4), but the plan for the new one is to use (Py)GTK. > Some additational questions: > > Is it "safe" to give "yes to all" permissions to vm with Enigmail(PGP) > to access vaultVM through slip-pgp-key? In most cases yes. > Is it possible to use subkeys on Enigmail? > Enigmail does not give to select subkey. Only primary key available > for signing messages. I don't know, but in theory yes: https://www.qubes-os.org/doc/split-gpg/#tocAnchor-1-1-6 PS I see you make heavy use of your new screenshooting tool :) - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXevPhAAoJENuP0xzK19csQlsIAJfHCNgx1Cm9Vcxd48PQjYoV cVs1qJL9r0wCOd7p39N3+rXtGE9AN+A9lu8iuXqliV6rWGMElvcewrAf6W7zifvs Rl4zHdweTYqla7EePtdNmiaL6By5mkdnKOogS0B3exTCdF18p64Vf5wr+fAUI6Om M6CcTJpF2/BNku+9oXegk6b6n+B1tPBto8AwA3YNzDHT56cqDvrvNc1QdTej1gO7 ggMnx4znKjTnHWssTW6+B4OvaJkpack3jRKAqvgJb6SzpxVUO8AaTpxbWw0sMkpB Q/bNjhwCDgTPPxnnMhRb/3sOj7T3j7GpfhCWSOsmkcFky5Eg17FRdViuzgFZmbY= =ZUBZ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160704234017.GE4609%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes Screenshot Tool with imgurl auto upload available. [beta]
Many thanks Eva, I'm testing it. First at all, its a great idea and, I appreciate very much your work. I have two minor issues with the script: 1) [user@dom0 Imágenes]$ ./qvm-screenshot-tool.sh [FATAL] no "zenity" tool at dom0 installeted use: \n\nsudo qubed-dom0-update zenity command to add it first (Instead of "qubed-dom0-update is "qubes-dom0-update") As I understand, in some versions of bash, the "\n" don't works as expected. So, I propose to change "echo" by "printf". You just have to add a "\n" at the end. 2) I have dom0 in spanish. So, my Pictures folder is /home/user/Imágenes/ instead of /home/user/Pictures/. But when I run the script, it is saving the pictures in "/home/user/Pictures/" instead of ".../Imágenes" To obtain the correct directory to save the file you can use this command: xdg-user-dir PICTURES /home/user/Imágenes Best Regards! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/118cc2b5-6de8-4eb2-979c-679d0c35e264%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't open an attachment from thunderbird (3.2 rc-1)
There is a PDF in an email attachment I'd like to open in a dispVM from Thunderbird. When I choose that option, I get this error message: qopen-in-vm: Fatal error: send filename to dispVM (error type: Broken pipe) Shouldn't this be "qvm-open-in-vm..."? Or is there another issue I'm missing. FWIW, this is the first time I've tried this in 3.2rc-1. In 3.1, this procedure worked as expected. Todd -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a2b628f2-0ab9-57ee-a224-81a15dfb1d69%40nowlas.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qubes and sugarsync
On Mon, Jul 4, 2016 at 7:28 AM, Andrew David Wongwrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-07-03 23:13, Nicola Schwendener wrote: > > Hi Andrew, thank you for your answer and your time. I'm not sure > > to understand what you say, but doing that means I double the space > > of the data (redundancy of data) between VM. If I share the data > > from one VM, the data will be only in one place. thank you very > > much best regards Nick > > > > Instead of sharing the same data between two VMs, perhaps it would > make more sense to have a single VM? You're unlikely to get many (if > any) isolation benefits by sharing the same data between two VMs like > that. However, if it's merely so that you can run both Linux and > Windows software while accessing the same data (in other words, it's > about compatibility, not security), then perhaps that makes sense. In > that case, I recommend taking a look at the firewall page (link below). > > > P.S. - Please avoid top posting. > > I do not see the point of sharing data between different VMs when the reason of having different VMs is exactly the contrary, that is to separate you digital life in strictly separated compartments. However I do share data with different computers and NAS (via NFS), but it is just one low security VM that does that. Best Fran > > On Saturday, July 2, 2016 at 3:59:20 AM UTC+2, Andrew David Wong > > wrote: > >> > > On 2016-07-01 08:01, Nicola Schwendener wrote: > Hello all, I wish to move away from my windows pc to qubes > os. in my configuration I still will use windows HVM because > I need to run some software (and some office macro) in it. > I've some questions about storages and cloud accounts. I've > a crashplan account that I wish to continue using in linux. > I saw that there is the crashplan linux version and I wish > to know how to create a storagevm that shares via NFS to > windows VM and some other VM the content available in the > storageVM (should be attached to some external disks and the > NAS). then there is sugarsync. this software provides a > synchronization between different PC I've on different > locations. for this software there is a windows only version. > what I wish is that this software should run (I guess via > wine) in the storageVM in order to not duplicate data between > VMs. is it feasable? could someone explain me how to create a > storage VM and share data to other VMs? thank you very much > best regards Nick > > > > > Since you say you're new to Qubes, I hope you don't mind me > > asking: Have you considered that it might not be optimal to attempt > > to reproduce your current setup in Qubes? Many users (myself > > included) have found that the functionality offered by Qubes is > > very different from that of a conventional OS, so much of what we > > used to do on conventional OSes no longer makes sense (or can be > > accomplished in better ways). > > > > For example, instead of sharing files via NFS directly between > > your CrashPlan VM and your Windows VM (which is possible [1]), you > > could consider storing your files in your Windows VM, where you > > use them, then sending your Qubes backups [2] to your CrashPlan > > VM. > > > > This is just one example. It may not apply to your specific > > situation, but that's ok. It's mean to illustrate a more general > > point, which is that you should be open to considering the new > > possibilities that Qubes enables, rather than insisting on > > replicating old systems (that were built on the assumption of a > > single, monolithic OS) in Qubes, since doing so usually results in > > compromising the security by compartmentalization Qubes provides. > > > > [1]: https://www.qubes-os.org/doc/qubes-firewall/#tocAnchor-1-1-4 > > [2]: https://www.qubes-os.org/doc/backup-restore/ > > > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJXejpbAAoJENtN07w5UDAwZycP/RmMfo1KirJa8jYetjG6WSg3 > mJ+MoHuNSIEcZuPsjv3S4+nIjgTSdw8JNdXs9ccWBGu1Ys2qDAbkZ8Jdv94A/3tE > MzP8xHZWL+38+JNQM0gCg1OPPJ0nap+/HJRA85anRIrDSU8AaJ2Ev3DIVX11NTeu > 0KJbgoKJizivshxJVUXo7ygnsHCJ0f+/Zp6V5jv7ee3pRevCj4UhdeUG2TLzcny0 > QH4Tqt4FEpcqABqr5AdROXq8GH2dYkmDS8bpQYOGANb5ICufp9yK3N6Exh7RRVmn > PNNGergWOozzNknX3yA8JifrBUT+uzXuZU5zWvTZQFIgy9l2Mql7Oqr1n1+RyduC > O05RXxr+P72g590Q/DeMw+DS99oCMTOM5x6wUxyhpSYjoeFKHJJJ2XTcADRLkk56 > zz2M2XFqbcrsIHHyeaCAfsvFgBbYWWHvbkAqtgOM3ugrxzejxpRix0M889cxgaxi > 6bmjQio44rbR0JVm8dMpiyD8Z5b2wugdsmtGO0jJhJcUk/PJuSjUq+lvG0z7omGM > GVXLeGEizJ3co11kuyDHUHvMs+8O0HquSSugQEiXmGboNxxnOPoquMwor9uBm+yW > fiKJzQaXkTJRz28D/kF+2yUQSVlBPapL0/VayTmjrRqxAIe1mLKOyoANyNMO0w3z > jMctMLuHXMdRG8gMM/M9 > =Ksob > -END PGP SIGNATURE- > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and
Re: [qubes-users] Re: Creating a VPN VM using openvpn issues? (starting with no /rw/config/openvpn ?)
On Sunday, July 3, 2016 at 11:32:53 PM UTC-3:30, Chris Laprise wrote: > On 07/03/2016 10:10 PM, gaikokujinkyofu...@gmail.com wrote: > > On Sunday, July 3, 2016 at 9:56:15 PM UTC+3, Chris Laprise wrote: > >> On 07/03/2016 09:14 PM, gaikokujinkyofu...@gmail.com wrote: > >>> > >>> Some things came up so I hadn't gotten around to trying it out until now. > >>> > >>> I created a new VM, VpnVM, and ran > >>> > >>> openvpn openvpn.ovpn > >>> > >>> and yeah! it connected and I opened firefox from VpnVM, and it was using > >>> the vpn, then ran PersonalVM using VpnVM as my NetVM and PersonalVM also > >>> showed up as using the VPN so first hurdle cleared? > >> Yes. > >> > >>> Lots more hurdles though as my understanding of it all drops off > >>> precipitously. > >>> > >>> I modified the /rw/config/openvpn/openvpn-client.ovpn file with the > >>> > >>> script-security 2 > >>> up 'qubes-vpn-handler.sh up' > >>> down 'qubes-vpn-handler.sh down' > >>> > >>> lines > >>> > >>> and I created the qubes-vpn-handler.sh and changed permissions. > >>> > >>> I then tried to start openvpn /rw/config/openvpn/openvpn-client.ovpn > >>> > >>> and no go. I get errors: > >>> > >>> Options error: --ca fails with ca.crt: No such file or directory > >>> Options error: --crl-verify failes crl.prm: no such file or dir > >>> Options error: please correct these errors > >>> > >>> I didn't get these errors before I added the qubes-vpn-handler.sh > >>> > >>> thoughts? > >> It looks like you switched to the example ovpn config from > >> https://github.com/ttasket/Qubes-vpn-support > >> > >> I'd recommend you use your original working ovpn and just add the 3 > >> script lines to that. > >> > >> Chris > > Actually I am using the ovpn that the vpn provider gives, and am just > > adding the 3 lines that step "2. Set up OpenVPN." of > > https://www.qubes-os.org/doc/vpn/ page suggest to the ovpn config file that > > the vpn provider gave. > > > > That file seems to work until I modify it with the 3 lines. While I don't > > understand the script I would assume there is something in the handler > > script that my setup doesn't like as the 3 lines are just invoking the > > qubes-vpn-handler.sh right? > > Above, you switched from 'openvpn.ovpn' to... > '/rw/config/openvpn/openvpn-client.ovpn' so make sure they are the same. > > Changing the location of the files or your current directory while > omitting the '--cd' directive would cause the errors. Try starting it > with 'openvpn --cd /rw/config/openvpn/ --config openvpn-client.ovpn'. > > Chris Ah sorry. Thanks. I guess, some of my lazy shorthand confused things. I can promise though I have been going off the https://www.qubes-os.org/doc/vpn/ doc, wasn't actually aware of the github one. When I try to execute it what dir should I be doing this from? I tried the line you suggested openvpn --cd /rw/config/openvpn/ --config openvpn-client.ovpn but got the same options errors as before (just for the heck of it I tried from my home dir and from the /rw/config/openvpn dir) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/392e3dc3-fbd1-492f-a9d2-2dc6771d0f81%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] newbie question about port forwarding and remote connection
Hi Eva, this isn't a bad solution, but I'm using windows 8.1 and settings between windows versions (a least some) are different. but this idea isn't bad at all!! thank you best regards Nick On Monday, July 4, 2016 at 3:52:51 PM UTC+2, Eva Star wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 07/04/2016 04:29 PM, Nicola Schwendener wrote: > > Hello all, I'm totally new in Qubes OS. I'm moving from Windows and > > a "single" OS doing all... I'm posing some (stupid) questions that > > maybe I understand better how to migate it: Right now I've > > NoMachine running on my windows pc, allowing connection through > > sshd daemon and let me doing whatever I want on the PC how can I > > accomplish that on qubes? If I install on the fedora template, how > > can I manage the application to run (and in which AppVM)? I don't > > think is the case to expose the dom0 in order to allow working > > remotely as I were at home. thank you very much best regards Nick > > Simple migration way for Windows user: > > 1) Buckup all of your Windows data to USB Flash with all programs and > add to it some windws.iso to install it on Qubes. > 2) Install Qubes Os > 3) Install Windows on Qubes using windows.iso > 4) Mount you flash USB to FedoraVM that is available by default and > copy all your data to your new virtual Windows. > 5) Use Windows as you do it regular and learn QubeOS in parallel. > > > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQIcBAEBCAAGBQJXemouAAoJEGSin3PC/C0AemAP/jwD7msDUuFYpXjZnmdZ9UDp > WGbTpGbHlrtOPbJld4KyByyTvA83fWmlNJ5rmLhruV6PW0KX/xSivS8JjvndU8Vo > /hN2Cb+PCp4Vf3ZyweItfp0INmxig4uy8yiqftR7aNvNj/Iqd1kMUKYFQZaV6QQD > 8PTdGqn3MtVLk97iHRImnuInuPDcizq5+10x1gXYkFZN7NSJJ99mLd93giZvzK+I > iggSv947YiGR93fXxb7/ePX4QhDVHJQS3BwYZqafdAvRLP/S+Di2z9t3UtUE+XBy > esr5LBFXzksiqULj71h/E1aBo1uA+0siSaUGZJXmuiS9tgbYjWak7hfyVYn1Xx4n > +43mDnUIPH6BfgUt1tIlkRtOlfL4XiDGhDVJGRGTtWyTSBUEfFbahU6GWaRZcW1N > fYTZctu56qt6V2AY8huw6FWgviPmWg1UqH56nValGMDvV+hQyJz2GZdJtWeDwIMT > 48yTlkQB8IctF5xa1oOhZ9QHpujwL/WBNGLg+YPmiGWlbtIXw9jlQYhFxu7mquO+ > 4AmhRNTtcAlTmxbB0Q3QbEM3HsDvT1beynYhdq7LeCs2k/gcICL2stCy0b5H7m13 > xBPtK9nI6syaMwgYEDwaGw7PWskSVjvSh0V1S1sG1m2XruKfujgW1MGNohvVlfao > SP4b43P8FsJ8LwnGoCp8 > =yUKV > -END PGP SIGNATURE- > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/19f9c6cf-543d-4bfd-85ec-8f8e18fbf812%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] AEM boot option causes hard reboot/partial shutdown (Lenovo T450s)
If I replace the kernel with 4.1 from R3.1, it can make it to the AEM target and the decrypt prompt. It chokes just after decrypting the volumes, but that's to be expected. The 4.4 kernel appears to introduce some factor that causes the crash. Swapping xen 4.6.1 with 4.6.0 has no visible effect either way. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c2806248-ec97-631e-70b2-7b4d0e96fbfc%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Split GPG and ssh keys
This issue can be simply solved by moving to New GPG version and not need to realize something form SSH, because of GnuPG 2.1 seems support them by default with --enable-ssh-support key: https://github.com/QubesOS/qubes-issues/issues/1962 Please update the ticket Proof link, search for `ssh` term on the page: https://gnupg.org/faq/whats-new-in-2.1.html -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nldqmn%24ts7%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] newbie question about port forwarding and remote connection
On 07/04/2016 09:29 AM, Nicola Schwendener wrote: Hello all, I'm totally new in Qubes OS. I'm moving from Windows and a "single" OS doing all... I'm posing some (stupid) questions that maybe I understand better how to migate it: Right now I've NoMachine running on my windows pc, allowing connection through sshd daemon and let me doing whatever I want on the PC how can I accomplish that on qubes? If I install on the fedora template, how can I manage the application to run (and in which AppVM)? I don't think is the case to expose the dom0 in order to allow working remotely as I were at home. thank you very much best regards Nick -- Hi, There is a helpful guide on port-forwarding for Qubes appvms: https://www.qubes-os.org/doc/qubes-firewall/ You could install nomachine in either a template or a standalone appvm. If you do the former, you may want to also use 'systemctl disable' on the nomachine service in the template... then you would enable it in the appvm which uses that template. (You would have to re-enable it each time you booted the appvm, however.) With a standalone appvm, installing the software is much the same as any regular OS. You just have to take care of port forwarding (see above link). dom0 isn't a networked domain, and its against Qubes security philosophy to access it remotely. Of course, you can find ways to circumvent this. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e0d06d13-4626-5e81-17cd-7c899d02053b%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] newbie question about port forwarding and remote connection
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/04/2016 04:29 PM, Nicola Schwendener wrote: > Hello all, I'm totally new in Qubes OS. I'm moving from Windows and > a "single" OS doing all... I'm posing some (stupid) questions that > maybe I understand better how to migate it: Right now I've > NoMachine running on my windows pc, allowing connection through > sshd daemon and let me doing whatever I want on the PC how can I > accomplish that on qubes? If I install on the fedora template, how > can I manage the application to run (and in which AppVM)? I don't > think is the case to expose the dom0 in order to allow working > remotely as I were at home. thank you very much best regards Nick Simple migration way for Windows user: 1) Buckup all of your Windows data to USB Flash with all programs and add to it some windws.iso to install it on Qubes. 2) Install Qubes Os 3) Install Windows on Qubes using windows.iso 4) Mount you flash USB to FedoraVM that is available by default and copy all your data to your new virtual Windows. 5) Use Windows as you do it regular and learn QubeOS in parallel. -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXemouAAoJEGSin3PC/C0AemAP/jwD7msDUuFYpXjZnmdZ9UDp WGbTpGbHlrtOPbJld4KyByyTvA83fWmlNJ5rmLhruV6PW0KX/xSivS8JjvndU8Vo /hN2Cb+PCp4Vf3ZyweItfp0INmxig4uy8yiqftR7aNvNj/Iqd1kMUKYFQZaV6QQD 8PTdGqn3MtVLk97iHRImnuInuPDcizq5+10x1gXYkFZN7NSJJ99mLd93giZvzK+I iggSv947YiGR93fXxb7/ePX4QhDVHJQS3BwYZqafdAvRLP/S+Di2z9t3UtUE+XBy esr5LBFXzksiqULj71h/E1aBo1uA+0siSaUGZJXmuiS9tgbYjWak7hfyVYn1Xx4n +43mDnUIPH6BfgUt1tIlkRtOlfL4XiDGhDVJGRGTtWyTSBUEfFbahU6GWaRZcW1N fYTZctu56qt6V2AY8huw6FWgviPmWg1UqH56nValGMDvV+hQyJz2GZdJtWeDwIMT 48yTlkQB8IctF5xa1oOhZ9QHpujwL/WBNGLg+YPmiGWlbtIXw9jlQYhFxu7mquO+ 4AmhRNTtcAlTmxbB0Q3QbEM3HsDvT1beynYhdq7LeCs2k/gcICL2stCy0b5H7m13 xBPtK9nI6syaMwgYEDwaGw7PWskSVjvSh0V1S1sG1m2XruKfujgW1MGNohvVlfao SP4b43P8FsJ8LwnGoCp8 =yUKV -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4878331b-5944-c611-cd72-d03f41d08595%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] [Q3.2rc1] XFCE bugs with locale, suspend bug and some other
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 1) Failed to start any VM after suspend (tested on xfce) Qubes Manager show icon with the following error: Error starting vm internal error: libxenlight failed to create new domain Log file say: libvchen_is_eof 2) Some characters does not show on title of XFCE windows. Is it possible to fix this? https://i.imgur.com/xqLqHGD.png 3) About issue with losing "System Tools" links at Application menu you are already noticed? https://i.imgur.com/rCMiymX.png It's also not available under right click of the mouse. 4) At the Qubes website I see some bad character. What is it? https://i.imgur.com/j4bMt05.png Suggestion: Qubes Manager UX: 1) Add possibility to sort menu items up and down. It's useful in big list to keep some most used application at the top. https://i.imgur.com/gctZoJl.png 2) Related to issue number 1 on this post: It's only show the error icon per vm and need to hover to get the error message. Why not to add this errors to the log of VM? 3) As there is a new issue on the tracker from Joanna: https://github.com/QubesOS/qubes-issues/issues/2132 It is all fine to simplify Qubes Manager and add some panel addons. But as the new user of Qubes I can suggest to stay with advanced Qubes Manager available. As for me, I'm only use start menu because of Qubes Manager does not have some icon near AppVM name to click on it with LEFT mouse button like Joanna want and receive list of available shortcuts to start. If this will be available on QM then **only one** left mouse click need to access and start some application. Compare it with Start menu: (1 click) open menu (2 click) choose VM on the BIG list with eye research (3 click) launch application. So, there is TWO additional click with Start menu and some eye research. While new Qubes Manager can provide as the better UX in same scenarios. And some users will forget about Start menu at all. 4) Why Qubes Manager written on phyton code? Is it compatibility issue? Why not to write it on C++ with Gt/Gtk ? Some additational questions: Is it "safe" to give "yes to all" permissions to vm with Enigmail(PGP) to access vaultVM through slip-pgp-key? Is it possible to use subkeys on Enigmail? Enigmail does not give to select subkey. Only primary key available for signing messages. -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXemhzAAoJEGSin3PC/C0AQJ4QALmClERHWaFpvEVjaPy1X8oH LhuZ9QqTXPvcaLrtJZsi/uY6BxTlb+ePYvwKgSDCtZ4wxERnDMU3qIRpjtQf34Mb ouQb+NG5uPoSqyn4WGK7Hpr47h2z5T4VbrjCqFd7PwzDLWkHqBUqTo/KWLLU9uu0 aa60Dawoa5yEz8OffBKb7X8eYmFBV7ySZCIq3tTNzhvPNp3XIYeKkl+ad+xBeFZ8 9VQ5q2T7/a/oqxZMDFvO7viHZJzMCIEuKN8ivay8IKOWQLL+A3poFWV6p2XvbcTV SjGcyJRifN6vYFW2jj3fHlEA/o3qRqGdrgK2i0U0As1bwobat6PFNGuQdP75UGN7 u+p41Pff+KgKJGUhif7nbbao0PpQu2p6EK4sk879Rp84ySvnvBCw8Nl8Go5XlyPd J6H/IKcwYjQYOcUHK1pQuPp8q/8XbjDL77BY+AOP8DtYZWuwn2V6/KrO+SgOsY5z cRFGxKo4ZNowQZSU+YXK0WCJRWjMAFmc4uOFR3Ysmxnfzx6BIki71FLz68mo9Seg 5I+UKA/naRM0oUsMnxbjF9/Da1ePC29b8XZ2zQEyfp+4+j+o/K4DG8RbD1uX+a/5 29PLHf1YXp8zy3tgKkMqDjzw1jmeco3oxc+BOBlcizujNPxlkWyHFtRk6Nz8I8Zy 9N7yzB9y0V1VPqDe5JbJ =Xy3X -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b6d41ac3-000e-8a21-43e7-2c91cac8d5ac%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Q wipe files
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/04/2016 03:17 PM, Andrew David Wong wrote: > By default, the default LUKS parameters are used. So, this question > (and the answer) should be the same for many (most?) OSes that use > LUKS/dm-crypt for full disk encryption. > Okey, Are you really want amount on psychical security that common OS provides or you want high level of security? I will describe my through about "layer 2" of encryption on other thread. But we really need them! And it must use other peace of software to do that! >> How much operations need to brute "one" password? > > The answer will depend *heavily* on the length and entropy of the > passphrase. > I understand that. But lets count the time for 8 or 10 characters password. I will try to do that later if somebody will not share this info with us. ps. sorry I send you direct email. It's my mistake while I only start using maillist via email. -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXemFFAAoJEGSin3PC/C0AKX8P/22DFmmwn+95Zi1JYl5ZvAGn 15DKiZTjuK5o2nyj8WREwZIUmQEtjmMnEvzlojKldO/Cb9O3RUtLISXgw3A+wQ1w gWgyDy0LFx1TBCmk/RN1Jg3r3X/GmHy1gHLBrgmzMPeIe9tDj4Scbj+l7qishk5g sb6KzL4d/Y2x0z5s7/JtenTKrg3gabwFI8J3MA1FGiofOdtlnUwZ1KnYquqxbcJ/ d71rJ+Mu57uvGAvQOVsYqvnZjUZIaSBZl1XLFBa8mTBLqzhW7qDrUeXw5kaNo0JS iyLZs/KXXEgSnYgonwvDK2DTl3P2wbFq8i+CSOgRAPFq1AqdSIiEYAMvOY3PUjrR MsM41hzya+9F2OGI/d8qYgI++xKVY4qB/JdUVUbjgoHnVv4L4xwLJqE/wtuAp1l0 nyNyDN66U6sUfzF7BE7wy0NKDQ9bn0EhM7+2iV5Bp0FgeXovQsbwXEc765NJuqKR vQETaispNEv7SokshfFrgepriQ4mBxD9DxjLjw+laVCtYUIyIVzlVixwFSdcVHUE PC6MjzpDhFcODeZX+fDYN2Vu4U6hYhjJnjGuBk2/0qqmvS9LFSevXqH/rPhzJIpU opVG6apdvozcbVPETYx8z35glsNbecfLxXxFVNdNW1PuAsxdk93wCgZLrvrGP6jd D5LJrykqeNwhBSKNQN+l =x57P -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d97cc4d0-0cd4-990a-3b7c-7310ef3dbe8c%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Will KDE be deprecated? Migration for in-place upgrades?
Am 01.07.2016 um 19:53 schrieb Marek Marczykowski-Górecki: > On Fri, Jul 01, 2016 at 03:43:00PM +, Patrick Schleizer wrote: > > Therefore my question, will KDE be deprecated? Or will it still be > > somewhat supported? > > It will still be available in repositories, but but will not be included > in installation image and Xfce will be the default environment for new > installations. And you have tested it on a HiDPI display, I suppose? Achim -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/da9ea919-aef5-8d9d-f130-4528fe18c64a%40noses.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes R3.2 - XFCE empty space on bottom of the desktop
Marek Marczykowski-Górecki: > On Sat, Jul 02, 2016 at 05:26:00PM +, Patrick Schleizer wrote: >> I used 'default task bar' in XFCE. > >> When I start a dom0 terminal, if maximized, it uses all space no the screen. > >> When I start a VM terminal, even if maximized, it leaves a small area at >> the bottom empty. (Even if there is no task bar.) > >> How to fix this? > > Do you mean empty panel at the bottom? If you don't use it, you can > remove it (right click on it). > > Yes. I will try that. Cheers, Patrick -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8c22ed2b-91dd-a886-e066-66b14785640f%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] AEM boot option causes hard reboot/partial shutdown (Lenovo T450s)
On 07/04/2016 07:26 AM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sun, Jul 03, 2016 at 09:20:47PM -0400, Chris Laprise wrote: AEM is now causing reboots for me as well, after installing it under R3.2rc1. Has there been any progress on this? I don't see any signed sources of the newer tboot versions, so I'm reluctant to try them. Try setting `pci_e820_host` property to false on sys-net and sys-usb. - -- I tried it anyway (without success), but the reset is occurring well before the decryption prompt. It happens just after the 'Loading...' grub screen vanishes and there is a cursor at the top of a black screen (before plymouth GUI screen would appear). I still have a boot image with a working AEM. If I could use it to help eliminate some possible causes, like the new kernel version for instance... Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/37e04782-65ef-924e-ba17-567ca3993068%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Q wipe files
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-04 02:37, Eva Star wrote: > I want also disscuss the related topic about "how strong the > encryption of Qubes os by default" when in the world available many > supercomputers and bot networks with over 93 petaflops (93 > quadrillion floating-point operations per second) > By default, the default LUKS parameters are used. So, this question (and the answer) should be the same for many (most?) OSes that use LUKS/dm-crypt for full disk encryption. > How much operations need to brute "one" password? The answer will depend *heavily* on the length and entropy of the passphrase. > Can we count the time to brute some regular container on regular > pc that encrypted with default crypt setup settings on some > supercomputer that is already official available? Here are some links for you: http://security.stackexchange.com/a/25392 http://security.stackexchange.com/q/79319 http://security.stackexchange.com/q/61346 http://security.stackexchange.com/q/82389 http://www.eetimes.com/document.asp?doc_id=1279619 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXelPVAAoJENtN07w5UDAwvJQP/jEKpvg8nvxrfe0RG7bLHc0h hcbwZLcMBvYRSPRYJQENlHBNyhAfA8vyxQnb5vDH4+MmwdJNfCyAgU3R44QHyqAs eloAIQJJa+r09xlLvIEwE/eHxe/zqjr76joYF1SayJH1nGKOpCCY9gxb34hhdrf3 MGmAZIsIk8VTyzr6nxEn/YRTnWmynqEOFxJNpdHi1plsFVOP8oIUWN2s0i6lfeqn 1iK87M1JOeMHoNYjHJAhu+/AjDXYueknRdp8U5bni+radKnj2unT/If9qYGG7ult n7z/MPtVbsvzd0B5WRAZcaP0T/tYVLtS4JYZvV8u8WRFPFvmaJsVr8aa3KjVOHG2 K6+AC67RZ4fQFi4ne9dzN61dvCjOznVHod8kdVFbEGwowGaGu1u1YLkYnQAQhYWF Qg9tjFvVdVYQ+9fD9PvkIXHj0JoXkrKKQSgJ41tpkzAoCt0vdhAXTkzRnPg9quMG I5TI9JeNM4zeiBEMcnnWna8M/42AFNOhXCV2u+gIYe7WX/SpJfvxPcbLo5vLJlAs d9dyyndVU6gqegm75nx4rnM2KL082ahHGPKETZDlrRIMoUCPJ7Yxnbc2bOscojXz gGsfSUPTg/z3TvwlhyEsnES08MF6XAdgXBGwwxhXoZhd2GLPaNydW2IZo6KTwHMC KerY+ZC3u3zlS1DW0zNK =d/ab -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c5808e21-8b7c-bbff-446b-bd37a6627c25%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [mail list] Can not write by email
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/04/2016 02:15 PM, Marek Marczykowski-Górecki wrote: > > That was the case... I've added you to a whitelist (at least in > theory). > > Thanks. (testing message) -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXekbIAAoJEGSin3PC/C0AhxEP/07Qfcvh5zCLWakXQfR+H+xA XsE5XTIdUTJ2QsWcs4tDq/95Q99xiKXZ4PyA30JG/OnamnSARZF4p2MOX4ixKdep hkcSXIWbEmjEp4YIrYO8CsofaNhMJA/uyK90wsxBku9Q+aN0rYmh3gurZtznwXgZ WXenvdAJh3+VCKYEIRdQQ9HnGcNpa+8VuMVkgQrSm5XCh2BXkIdiMM5yQhSpACCq 0L93/OOubNzn8R0jfk3RN+BuV7m8492CfcWyr84VSTB0hnpbWjc47f90rQyA1Rf0 Z1Mkk1Cv2QR5b4dms3mu5ZS6mE1n33OF0eMjQ6NXMd/xwmKDKxElZPYhtIytf15k OrD6nUC8dh/+hv0GpfYmv97TpbdRi9uxGEsv0aXSBy12IltJh/WMAB/+xtk9RXGC xnBStxvwXaywd4uuQHJCVhhoNC2KEWclWMB29We5M3KqrHI5fsH8CzL4+RT6BanR Efiw63j2+jjyRLK+QNzzlr29Vr1085f3sCNZt7iLf2Y5HbOdLoThbq+i3IDOlji2 JWMkn7pZmPAMOjPsp+4iRnEyOYkFF4U2RdrQE1dUwYam4rxBYlNmdj+DVTxDwC41 DdctORXu4rTD3Ho9lpPwvpC9OvE2lb6H9BxO4YCOl9LQwrkAk/gj/77o1Y+gVvDP 58ItG6ovR/7tAImFDcRi =7/+n -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b1497647-6235-ba81-db42-12ccb861d9c5%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [mail list] Can not write by email
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Jul 04, 2016 at 03:35:09AM -0700, Andrew David Wong wrote: > On 2016-07-04 03:04, Eva Star wrote: > > Want to setup Thrunderbird to read and write to the maillist. I do > > all like qubes docs said: > > > > 1. I subscribe from other email to qubes-users 2. send replies and > > they do not appear on the qubes maillist > > > > I also tried to do the same via news.gname I receive confirmation > > email, send confirmation answer... but my reply still not on the > > mail list. > > > > What I do wrong??? > > > > Please make sure you follow the instructions here precisely: > > https://www.qubes-os.org/mailing-lists/ > > Did you send a blank email to qubes-users+subscr...@googlegroups.com? > > Did you try different methods of confirming in response to the > confirmation email (replying, clicking the link)? > > (It's also possible that your email got caught in the spam filter, in > which case it should show up once Marek has a chance to get to it.) That was the case... I've added you to a whitelist (at least in theory). - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXekVcAAoJENuP0xzK19csitcIAInwHMHOB58lrq5fHQxRkJqE u1EtfId2J9Dd+5kSFSe0BDex1zlc/mng89btY+a/5NPwRaM6uiQCA9mmFn9oSAbE gva+7CdYeExrfUmdKutUilFXVAPg9hlULOVdJlTS/1V06O0J8UOg8QndsCQ4P9i+ EOiFm8OOuFq3tuKnBwFpVhkVWO5uoaPq96Ay0m7twQiuuV0zBFKQBDl8Ec7zW0Yl PUaJ1CPNTEnI8HSzqtKFziYDvBYd4/Rj8aWj+kyn5ovhvUfMH41wZm9hYpv0wMVa xlY3glzfZNgX24u/0jmovXskcPhlCv94TygRXC7yOfUWGRNkRhR/xT0JdyHAhEs= =F48P -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160704111540.GC1464%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] [Q3.2rc1] XFCE bugs with locale and suspend
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 1) Failed to start any VM after suspend (tested on xfce) Qubes Manager show icon with following error: Error starting vm internal error: libxenlight failed to create new domai n Log file: libvchen_is_eof - 2) Some characters does not show. It's on XFCE. Is it possible to fix this? https://i.imgur.com/xqLqHGD.png 3) Related to first issue: It's only show error icon per vm and need to hover to get the error. Why not to add this errors to log? 4) About issue with losing "System Tools" links at Application menu you are already noticed? https://i.imgur.com/rCMiymX.png It's also not available under right click of the mouse. Some questions: Is it "safe" to give "yes to all" permissions to vm with Enigmail(PGP) to access vaultvm through slip-pgp-key? And seems it's not possible to use subkeys on such configuration? Enigmail does not give to select subkey. Only primary key available for signing messages. Suggestion: Qubes Manager UX - Add possibility to sort meny items up and down. It's useful in big list to keep some most used application at the top. https://i.imgur.com/gctZoJl.png -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXebZoAAoJEGSin3PC/C0A4fgP/2/uKNATRsMXzOclFttIQI/g bEiOpVZFc+o6Thq+ys7+U1hhBtn5EMR3iyL30jW0q3P/0ksx9pMIRdy5OqGjeUfH xAUWlwCL9bdzZnTer5hpYRLw/nlx1fSdzErBJP0t9hZpkpiBf+crmQfqNtsoVP+E d76yKeCSg61F5uvPUYMqEQfpKkDZd3c6QKG6SNf9KymakWkZyxTcLa2YQnn44osS 8U1CZnV8+yotLM+SsKAOybKvFa9adUI1tXLMTSyTIG1EV8uWqGwzhaJHgXU/oxsv ksUliR4esyDm0UXG+HU4MS6JzrpPrIHouZ2hAEooK2NN0POwmfrjvOrW0zUDn7O+ SfMQCpDHNqv7/zZS3hZRpOLcXQ0dEj4gKdZSOm/H2ixe81SIQUzNvsBD3L1XtyqE OpTIhQSC6zXw33mmVNPgzADJLPAk1VjZqLsb0c5dH3oLZp4Yjm1a/aKgEcQWz5hP i/uNtpauQtilggNMZ1YGUqAracTIQLd7tAdQtdFLmZvsFDEjhh1qCP4EtKvWrGcE WuN6CEXFZiKngNKm5vu3v5m1Nee036byGWNKYxbTnOGhfuWB2wGSsWjp+aGTVO/h qddOLx44x4Gwl1H3RyEiD0tRRTOWvWXoYKDTTBbVv7sTDjmehy7ynELTU6hdiqYH brXqK5ZC1pWXkOtdpvWt =e0/z -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ffabf9d0-9657-43e5-e097-75c905f65019%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [mail list] Can not write by email
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/04/2016 01:04 PM, Eva Star wrote: > Want to setup Thrunderbird to read and write to the maillist. I do > all like qubes docs said: Testing from mail. -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXejUxAAoJEGSin3PC/C0AqQwQAI4xIV6Kjr5mOFlIJAu9q8yU yjGVrdftzgtRjgizlRlr88mg+Pz4xL2tpQaOKa6ZtNRhZJq9Nz+HYk1QhI7CP15V 11Vdr5KLDIWvDBjwvI6eVqAtpxY9hx1orpWoc+2/bZ2kTOQizSI9kfQ3x4KfD7R7 F34ls95JV4G0zRLkQlW9c0mq2bqSQgoM1CEnL7chBAMYjT/7Ath0njKuwTNnWIAc dJnHJiB3O5N78KN7325QblaB4NccuH2yGhEPAQAcZlyYdzlrSIIFdoT6AgUWJheY 3pzC8/OKMc496lBQ59D2H7lz98dhC68HN6vg7425tCPvpwwkf7a3k5A/JUbZx5FX sPE3fR874piXa2bGCrFHKr/JWG6Nz3AqX/ePuGiCbVDwN+6e37OAossG6p9kpZzZ uCQHs8fs3RSd9L8gAXk8jWVE1rAd0j1clswhE6T260VKDRhTRyFNfVHSZhZJ0NuF gwWXjPIaLC6JWTU16Uu+4KMLMQi8z7AWuZeVOZ2g2hrjvzj+LkUvzocE7LvAei/8 oGvIXfkWz/7seo2dH45s+Iy78rbwjpU2giOJnkfHmnzClRpLJOstck4/Q4yCRgg0 vGgQPq7R0XrtIZY582Wxu7zw1D0BUG+Low5R8O1n4qPZkh6sSBPV0v62wynn5pZ+ CTB5l2I7hbOJZOnTeJrv =UpiQ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5ab368ca-14cb-4eca-acdf-22e29ccd9323%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to correctly install software to template from binary archives
> Those links are generated from standard location: /usr/share/applications > You need to put .desktop file for your application. Take a look at > existing files there for examples. > > After you create new file there, execute `qvm-sync-appmenus` in dom0 > (with template VM name as an argument). Thanks for the information Seems its works only for TemplateVM? Is it possible to somehow add custom links from AppVM to Start menu -> AppVM(domain)? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8c142c19-6433-fa12-f9d8-942e736e79e0%40openmailbox.org. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] [mail list] Can not write by email
> > Please make sure you follow the instructions here precisely: > > https://www.qubes-os.org/mailing-lists/ > > Did you send a blank email to qubes-user...@googlegroups.com ? > > > Did you try different methods of confirming in response to the > confirmation email (replying, clicking the link)? > > (It's also possible that your email got caught in the spam filter, in > which case it should show up once Marek has a chance to get to it.) > Yes, sure. All done as described. And I receive notification from google about "You have joined the group". But can not send replies and create new thread. First, I was thinking that is because I start with the thread that contain links to imgurl, but clean test also ignored. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3cb45e25-369d-4a28-8aef-7d452cffdc84%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [mail list] Can not write by email
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-04 03:04, Eva Star wrote: > Want to setup Thrunderbird to read and write to the maillist. I do > all like qubes docs said: > > 1. I subscribe from other email to qubes-users 2. send replies and > they do not appear on the qubes maillist > > I also tried to do the same via news.gname I receive confirmation > email, send confirmation answer... but my reply still not on the > mail list. > > What I do wrong??? > Please make sure you follow the instructions here precisely: https://www.qubes-os.org/mailing-lists/ Did you send a blank email to qubes-users+subscr...@googlegroups.com? Did you try different methods of confirming in response to the confirmation email (replying, clicking the link)? (It's also possible that your email got caught in the spam filter, in which case it should show up once Marek has a chance to get to it.) - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXejvbAAoJENtN07w5UDAw9sMQAJGIbkybVb9fy0DBUZXalRT+ x0ykZLcFfZ16U/ekC5Qhn+Jgn1/BbYtpK8xd28qm4TjeMjSMqPR3VHC9w5bGlm/u zM2WFuj08OXxmOgxFIf9cIMA9FS2NprqXYi3qEnSFBxokRT9zmNrckVXp/vKSDWg QxKx75Ekdwir41bMFFZXnqo3hvu4ir8/oMVQ6Jz5PppJ9V7gmo9F+2bNBo94MLOo gSXdOtKpME+YpygmMoQbJord7lSXL6yLMBC5e7gnloyF165ch3daJm3WUoibyEiz i/dhGoFiVZOPrxy2bmhPbcIau5xfFWiKFAEhWm46pI7grWYnqksdSg5SpjXmGLv2 tXXoYAVdOAk8Fw2h7cMDdt9+k7Fo+IVsTaS72LENf5PsavPVvBKZTHP3H6qU8lbu ZhN8KvlC9u2tL4B/zPp5VuANbBLhFRLOv72Mu6fxxGlFx8VC0VjQSSJyLQevJnOa bWWL+YX3X1ELrgIKPOEEcW/Wias0/+B7T8J0Z5lG0cKp6JTp2Aqd7mUbz7uDUdgi gweuTwmCuFOoVxPUbnnyh8Nh8DNv3Zc5luwaMgPz9HsWX+wJBfntAF6dDUbY8kmp f0zkPQ99sPsOeHcFX9mQqK36qBlSelrzYjkqmwcL1Bg9KvqCqXnSxwo7jB0Og9b8 WjM0J+pJ/RLvlqTCVBVO =0e0F -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/950235be-4cd9-9d56-13ab-b4f82f3526fc%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Networking problem with Windows 7 HVM (with PVM parts)
Hi! In order to get things a bit less messy I asked the IT department of a customer who handed me a VM for personal use to add XEN PV network drivers to the VM. Since adding the driver I've got network problems on every second boot as the network interface could not be started. Going to the device manager I can deactivate and reactivate it which cuases it to apear as a new LAN connection (... #) or just resign and reboot after which it will be working until the next reboot. The device this network connection is attached to is always "XEN PV Network Device #0". Obviously the idea of cluttering up the registry with more and more LAN connections doesn't seem too appealing. The LAN adapter doesn't seem to be changing in any obvious way every time I boot. What could be different each time the VM is started? Achim -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d128b41b-01c6-623c-ad7f-e2f93952d68e%40noses.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] [mail list] Can not write by email
Want to setup Thrunderbird to read and write to the maillist. I do all like qubes docs said: 1. I subscribe from other email to qubes-users 2. send replies and they do not appear on the qubes maillist I also tried to do the same via news.gname I receive confirmation email, send confirmation answer... but my reply still not on the mail list. What I do wrong??? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/480c3431-3877-42bd-9a48-d6e0508c2f67%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes R3.1 : black screen at luks prompt at first reboot after install
writes: > > Hello. > > I have installed a couple of times Qubes R3.1 on my machine without > problem. I messed around with those installs and therefore decided to > clean install again. > > The install process still terminates correctly but on first boot i just > get a warm black screen. When i press [echap] i get to the text mode > prompt of luks which doesn't seem to respond to keyboard input. > > I have checked my bios settings : all virtualization tech enabled > including IOMMU ; legacy+uefi mode ; IGP mode (i disabled my strong GPU > in favor of the iGPU solution but did not physically uninstall strong > GPU ; want to play with PCIE passthrought) ; i installed from a usb 2 > stick on a usb 2 port (but did not disable usb 3 support in bios). > > Thank you ; ask me for any missing information. > Hello. I have physically uninstalled my dedicated GPU and it works. Most things are not worth preserving. Althought it would be cool to run D3D heavy games in domU. Label device as "dirty" and do not allow for it to attach to dom0. Just som random noise I guess.. Good luck. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/loom.20160704T100104-456%40post.gmane.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qubes and sugarsync
Hi Andrew, thank you for your answer and your time. I'm not sure to understand what you say, but doing that means I double the space of the data (redundancy of data) between VM. If I share the data from one VM, the data will be only in one place. thank you very much best regards Nick On Saturday, July 2, 2016 at 3:59:20 AM UTC+2, Andrew David Wong wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-07-01 08:01, Nicola Schwendener wrote: > > Hello all, I wish to move away from my windows pc to qubes os. in > > my configuration I still will use windows HVM because I need to run > > some software (and some office macro) in it. I've some questions > > about storages and cloud accounts. I've a crashplan account that I > > wish to continue using in linux. I saw that there is the crashplan > > linux version and I wish to know how to create a storagevm that > > shares via NFS to windows VM and some other VM the content > > available in the storageVM (should be attached to some external > > disks and the NAS). then there is sugarsync. this software provides > > a synchronization between different PC I've on different locations. > > for this software there is a windows only version. what I wish is > > that this software should run (I guess via wine) in the storageVM > > in order to not duplicate data between VMs. is it feasable? could > > someone explain me how to create a storage VM and share data to > > other VMs? thank you very much best regards Nick > > > > Since you say you're new to Qubes, I hope you don't mind me asking: > Have you considered that it might not be optimal to attempt to > reproduce your current setup in Qubes? Many users (myself included) > have found that the functionality offered by Qubes is very different > from that of a conventional OS, so much of what we used to do on > conventional OSes no longer makes sense (or can be accomplished in > better ways). > > For example, instead of sharing files via NFS directly between your > CrashPlan VM and your Windows VM (which is possible [1]), you could > consider storing your files in your Windows VM, where you use them, > then sending your Qubes backups [2] to your CrashPlan VM. > > This is just one example. It may not apply to your specific situation, > but that's ok. It's mean to illustrate a more general point, which is > that you should be open to considering the new possibilities that > Qubes enables, rather than insisting on replicating old systems (that > were built on the assumption of a single, monolithic OS) in Qubes, > since doing so usually results in compromising the security by > compartmentalization Qubes provides. > > [1]: https://www.qubes-os.org/doc/qubes-firewall/#tocAnchor-1-1-4 > [2]: https://www.qubes-os.org/doc/backup-restore/ > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJXdx/uAAoJENtN07w5UDAw5NkQAMePYiAGe6rvgmzuTd/qB1RJ > DYxZDMbLCvnf2lgbRBcjwRDtieS7r5+/YW4wg43GBoloI/rRh8tZ+DhexhQitX/H > E0uE1Zlh9V0jdRSfNmiddc32EQlHFTgAlXNev6yp9+ltAKBxxEWNaIzxbrjj+eWa > Ci6ADB+oYSR+u0twHGLjRk9/8sMCUQeoIUUQJ9gjJ9cAPwE8QeJOd/e3hJ3XOaRt > sK0bLDXlXkFLQZP9oKZwcg8U4/oVRInIQcBLZcBHqDsePLQGczFbMc78pv6f7BWE > I9EOL3bGJvX/IaIyI7km58QMrxVHld21fjfziqnOEvNpsEi9nF8/MqcQkqSgh7xv > nVcvfUMKWGf7EiY/yX4sNv3sOoUuEIPInvrVnzqrNZBDeMKiSYS7R/BNqeJne5GP > 2VjD5Yd9KjfeXg5cId0pVliRieFZ2qBvL5jrPsl9ISB5Y7v7JaJilxmI42pDcdyr > IJQwM2opY8ZRZmQYWF7TfJyv1Q+/72Q1g56XpCW9v4eFUaOShDNH8/JS1EhgA//8 > 6e5qXeCt8A1ah+cYL2A3k+Hz+2AC/crAUSaVu0n4LAqX64SyX8Ud2YOdUoBe7GKp > lpcvroXyZTnxUZTE9HWYpLd7C5hN6FX/0EQsKamLuRp1tojrItJzs9NZPszKJ2VE > ufXw0znuJkhG6SVHM8sF > =R/Nn > -END PGP SIGNATURE- > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7ae0df46-3b1d-4049-9473-3e9fe2115f30%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.