Re: [qubes-users] Re: Android Emulator
On 08/04/2016 07:51 PM, Torsten Grote wrote: > I tried it now and it works, but is barely usable, because it is > very(!!!) slow. On top of running ARM emulation in an AppVM, I needed > to turn on software graphic rendering, because hardware rendering > didn't work. Yeah, it's quite slow, but depending on your app it may suffice - my apps are "companions" for business applications, so there are no speed requirements nor fancy graphics to display. > It would be nice if Android guests would be officially supported by > Qubes OS, but until that's the case, maybe there's a way of running > Android guests in the meantime. > > An Android image comes with these files: > > kernel-qemu ramdisk.img system.img userdata.img > > Shouldn't it be possible somehow to create a XEN guest VM with these > files mounted, so Android can actually boot? While an Android x86 HVM guest may boot, would it work as an emulator suitable for debugging? There may be some work to do to route tcp port 5554 from the debuggee (server) to the debugger. I don't think a PV situation could easily work, because Qubes would like to have its tools installed in the VM to be able to compose windows coming from all the VMs in the system, while Android does not easily allow for such a modification. But an HVM may boot, with its own windowed fullscreen. -- Alex -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/109e5728-9aca-4f36-3629-0c493f40852a%40gmx.com. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Configuring OpenDNS in Qubes
Ok, thanks a lot for your help. I'll try it. On Aug 5, 2016 00:04, "Qubed One" wrote: > m...@lamarciana.com: > >> eth0 is an uplink to sys-net. And /etc/resolv.conf there indeed is > >> generated, so manual changes will be lost. There is a way to avoid this > >> using /etc/qubes/protected-files.d/, but I think it isn't the way to go. > >> Better adjust NetworkManager settings in sys-net, using standard > >> connection editor GUI. The DNS servers in any other VM are in the end > >> pointing to what you have in sys-net(*) (using DNAT redirections). > >> > >> (*) unless you use Tor/Whonix - in which case those are redirected to > >> tor process. > > > > Thanks for your answer. > > > > Does it mean that all VM have to share the same DNS settings (except > Tor/Whonix)? What I was trying to do is routing only one of them through > OpenDNS, while keeping the rest with my ISP DNS server (and I would like to > avoid an HVM just for that). > > > > I see I can create a new "NetVM" but I'm not sure if it is full > supported. If I create a new one, is the GUI adapted so that I can > configure both (sys-net and my custom one)? I prefer to ask before trying > it and risking leaving something in an inconsistent state. > > > > > > I would suggest trying to completely disable or get rid of > NetworkManager in that ProxyVM (you shouldn't need it, especially just > to redirect DNS), then see if /etc/resolv.conf changes become > persistent. If not, you could still use /rw/config/rc.local to replace > /etc/resolv.conf on boot. > > -- > You received this message because you are subscribed to a topic in the > Google Groups "qubes-users" group. > To unsubscribe from this topic, visit https://groups.google.com/d/ > topic/qubes-users/Q0kLzqD1ir4/unsubscribe. > To unsubscribe from this group and all its topics, send an email to > qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/ > msgid/qubes-users/a038a41c-61c1-da76-225e-68600908de45%40riseup.net. > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJzvRW9N7DsuScqixQURMPWdN6WVShp6_zccnQLM4a7DgQO3aw%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Attaching a webcam from sys-usb to other appvm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-08-04 07:28, Marek Marczykowski-Górecki wrote: > On Thu, Aug 04, 2016 at 02:02:59PM +, 46l47g+27idcs742td9g via > qubes-users wrote: >> Hi, > >> I finally managed to put this to work, the missing part was to install >> the qubes-usb-proxy also on the sys-usb as well (mea culpa) :) I'm now >> able to attach the webcam to any AppVM, unfortunately the only caveat is >> that when I unassigned the device from the AppVM back to the sys-usb I'm >> not able to get the camera working again on the sys-usb - the device >> doesn't seem to be present. > > Indeed this is how it is working now. Mostly because device is still > connected to usbip-host driver and isn't switched back to the original > one. > >> Is this the expected behavior? > > That's a good question. I think the most common use case would be to > either: - use device directly in sys-usb all the time - for example if you > use a different mechanism to make it available to other VMs - like > qvm-block, or simply mount it there and copy to/from files using qubes file > copy - don't use it in sys-usb at all and only attach to some VM when > needed - like for webcam - you don't have your video call credentials in > sys-usb, but in some other dedicated VM > > Generally it is based on assumption that sys-usb serves only as an > interface to the devices, but all the data is stored in some AppVM. > > If this is correct, switching device driver back to the original one is > just waste of time. > > Joanna, Andrew, what do you think? > I agree. We should assume that sys-usb is compromised (due to the existence of things like BadUSB). We certainly don't want the user's webcam spying on him or her from sys-usb, so the safe default would be not to switch the device driver back to sys-usb (at least not without explicit user consent). - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXo+xzAAoJENtN07w5UDAwMLQP/iOIsSfBG6WbwEyxNNxMkPb6 RebJeHc86PL+UnVz8VIPEmn0Lwu8we19TCjCUYfR/gvXx1Ey012oOAWJPpwCuRcz jr+64C7ol9pDsw50k1rZprzV5gHxQYgjsPPrPg004CjuTR2Fm2wq/6oY7hTTXNPi eWeXKK+cah92pF+mqqKaxKog+DGI2uDjCDhrR1Utbjfijt8KQUeUMEeybDljB6Qj HaIC+jsDlZi4NPwOduJdpqzjGauXl/ms/0UwmrWRk22MlQXbDZOqN3mPpxWNHv0t 5bRZKVmvF+Ag6p8ZfdXBCxffZaclPA7Y+pPIVbAePiCGXF0xqI9L9kdoufwxb2Zq wH1ow0ocwIk4AyCMiwTco2tx5xfCCrq5or/kF24wRtBlVInJf3G2PlKCUk0NP1wp H2yaoxx1kqGWGm08SX1vL/QJ+yL+vCkjuf9fmlngIJCrqCwtUdyhj5kBfz1XkQXZ 9htHkqblCX9WJcR6O6SVpSvKTcE84bkPGqyjygA3kgFH/X3Er1ACQ2VpzmdXdnwk 2/gnueLRA6g0JYICuJ+FiRBOLNtIf9ziqrsJGe7NuvSMim0ObBeG68fq2MYJ6+Tn zbfINKHMAR2CK7n1NBv5hYSrxlq7p4M7ibh1Bq/s8m6owc3K7GMyE6dAUNMI8UN/ 2GOaV0djCayOtihVnhcI =yeA+ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/32fe844e-e075-c6d6-a96e-40140318df2c%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't boot from USB
Hi everyone, I'm trying to install Qubes onto a 64GB USB - I downloaded the ISO, verified, used Rufus to install to the USB, but when I boot up and select the USB (I'm using a PC with windows installed but selecting the USB from the boot menu), I see a few penguins dancing around at the top of the screen followed by a bunch of error messages. I can't find a way to attach an image so have uploaded on a file site and linked here; https://postimg.org/image/viqhl2ybl/ If posting links is not allowed - first off sorry! I think the main issue it says is: Dracut Warning Could not boot. Dracut Warning dev/root does not exist I'm sure I'm doing something painfully stupid, but I really am so new too all of this and am trying my best to get to grips with it but can't seem to bloody boot or install! Any help would be much appreciated; Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cb822f87-816c-4131-9f40-3918b517acd7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Configuring OpenDNS in Qubes
m...@lamarciana.com: >> eth0 is an uplink to sys-net. And /etc/resolv.conf there indeed is >> generated, so manual changes will be lost. There is a way to avoid this >> using /etc/qubes/protected-files.d/, but I think it isn't the way to go. >> Better adjust NetworkManager settings in sys-net, using standard >> connection editor GUI. The DNS servers in any other VM are in the end >> pointing to what you have in sys-net(*) (using DNAT redirections). >> >> (*) unless you use Tor/Whonix - in which case those are redirected to >> tor process. > > Thanks for your answer. > > Does it mean that all VM have to share the same DNS settings (except > Tor/Whonix)? What I was trying to do is routing only one of them through > OpenDNS, while keeping the rest with my ISP DNS server (and I would like to > avoid an HVM just for that). > > I see I can create a new "NetVM" but I'm not sure if it is full supported. If > I create a new one, is the GUI adapted so that I can configure both (sys-net > and my custom one)? I prefer to ask before trying it and risking leaving > something in an inconsistent state. > I would suggest trying to completely disable or get rid of NetworkManager in that ProxyVM (you shouldn't need it, especially just to redirect DNS), then see if /etc/resolv.conf changes become persistent. If not, you could still use /rw/config/rc.local to replace /etc/resolv.conf on boot. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a038a41c-61c1-da76-225e-68600908de45%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
On Thursday, August 4, 2016 at 3:44:05 PM UTC+3, donoban wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 08/04/2016 02:16 PM, Jeral wrote: > > On Thursday, August 4, 2016 at 11:08:32 AM UTC+3, Marek > > Marczykowski-Górecki wrote: On Wed, Aug 03, 2016 at 07:05:00AM > > -0700, Michael wrote: > Have a Broadcom BCM43602 Wifi Card in my dell xps 15 9950 > > and I downloaded Qubes Release 3.2-rc2 > > Problem: I can not connect to the internet cause my wifi card > is not working with qubes: "If BCM43602, the wireless card is > disabled in BIOS, installation succeeds, and afterwards it's > possible to re-enable BCM43602 in BIOS and boot Qubes. > However, subsecuantly adding BCM43602 device to the sys-netvm > freezes the computer." > > -my boot setup has VT and VT-d options activated > > how can I make my network function ? > > > > Do you have serial console in this computer (for example in > > docking station)? That would greatly ease collecting more > > information. > > > > > > I tried to compile and install wl driver into sys-net VM. > > Unfortunately it didn't solve the problem, dom0 still freezes... > > :( > > > > I guess you have already tried with permissive mode, right? It seems > complicated to achieve. Also it is more related to Xen, Linux and the > card vendor than to Qubes. > > Regards. > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQIcBAEBCAAGBQJXoziQAAoJEBQTENjj7QilhBoP/Rbf0Gdot6gHgFWQ0LYp/J0I > FT6T2FPp22KyA66TDxmJ2hHrb5t/q/boZW7RFO0xBO9/S9X6Ixml6YoaLy91aIeG > 3g7znHxBhHDPaUAqbrQDfVeL9lr4qul3qZivinbpI/giUCmHyLATlgtnBbWrYP4n > kQVxfhAUo0Wm/KPE0Ai0z3GWJ7Zcttzm4gmJOygpv+hczqD0UMYgL4+BaPNK+Ql8 > umLK1nm2D1ASLfHEzphbZrXeNWcHOAgkPW/5P6xm1snS91oV2bqmmCGAl525Q0YT > xptIfxcmBOFGZ+4eyq5/L422U9EAcOxsMGlAJKAWGSAG6nBkqxQO8CoLs+YG/SNy > 4Ktjfu8fCeMShdkCXbVv5aZ+HYay9u70Mk4EhrNm92/F4WBOJf9qNJHMOc6aW2CN > guW5103Ott8Q55S66yuqzK5YKkCoQJhSCDZqkxyZzorx19/gGWiZqcKqlVITnr87 > zfqTweP5AS5tnH9kItWmVGFWpHglogrwdLYD+S+Vu1w8uiIDbiEvyhzxxthxr80Q > 1/rcaybKB+LSZhus2b9jSonAtN1AjRqCGbYohfLxRmuls/PNgYmGgAjO9j/LybwC > wZ6Pw0Cew4E3+C7Bit42DxViw4jvREE29EqTkJVNMJsD0BFT6yjhIXInzZ4jCsTA > sOlajHZER0hTlXQIyiSh > =TivY > -END PGP SIGNATURE- Sure, I tried to solve this problem with permissive mode — dom0 still freezes... Is it possible to install Ubuntu on HVM VM, and then set this VM as my default sys-net? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ee925425-9835-43d8-8161-65ef74291100%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: SUCCESS: GPU passthrough on Qubes 3.1 (Xen 4.6.1) / Radeon 6950 / Win 7 & Win 8.1 (TUTORIAL + HCL)
On Monday, August 1, 2016 at 10:24:32 PM UTC+3, tom...@gmail.com wrote: > Hi Marcus, > > I'm bit confused with this > > Edit /etc/default/grub and add following options (change the pci address if > > needed) > > Which version of Qubes is this? Aint 3.1 EFI-only? > And EFI version of kernel args are to be passed via /boot/efi/EFI/qubes > (kernel=)? > > regards, > Tom Hi Tom, I use 3.1 and 3.2 rc2. Actually I haven't thought about this before. It seems on my system the default state is 'BIOS compatibilty mode' even though it's a new motherboard which is running on UEFI firmware. As for the partition table type on my SDD, it has always been 'dos' type MBR and that was never converted to GPT by Qubes Installer. I'm not familiar how to configure EFI type bootloader, but it seems editing /boot/efi/EFI/qubes/xen.cfg should work. There's lots of discussion about it here: https://github.com/QubesOS/qubes-issues/issues/794 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b5d085b6-8517-4cc7-9da3-4c2fb8c54eac%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Android Emulator
On 08/03/2016 12:10 PM, Torsten Grote wrote: > Oh thanks! I didn't try using an ARM image. If you ever find out how to > run an x86 image with Qubes, please let me know. I tried it now and it works, but is barely usable, because it is very(!!!) slow. On top of running ARM emulation in an AppVM, I needed to turn on software graphic rendering, because hardware rendering didn't work. It would be nice if Android guests would be officially supported by Qubes OS, but until that's the case, maybe there's a way of running Android guests in the meantime. An Android image comes with these files: kernel-qemu ramdisk.img system.img userdata.img Shouldn't it be possible somehow to create a XEN guest VM with these files mounted, so Android can actually boot? Kind Regards, Torsten -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3200476a-9bcc-e1b2-cf77-74dc3606d101%40grobox.de. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Re: Can't find Fedora 23 minimal template
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Aug 04, 2016 at 04:55:51PM +, Francisco Muniz wrote: > Thanks! I didn't try that. > Since qubes-templates.repo wasn't on sys-firewall, is the repo info > forwarded along with the command? Yes. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXo3ymAAoJENuP0xzK19csj94H/3Ka2w+3SdRrhEtcGtLQC4by XObfkF6wB8PHTTHb7pemjDkyW+EGZEAD7xmlXzqisSlzDRv4lYrRVuP1REQeA1gC McNnlVIL0Fv31IpESOAg4wNAVwWOkjmwOdThElqP7F1rJkGVD0LCdgzBz/MVOyg7 Sk9Pisq8scmsrWDozNiE7FUSLEROD0R5nwEaVRy7ilG3w/lKn/JnBSWf0Zi23UL2 03Za3f2rrBwyf1uFD81d2XwESQkY48JFRylv9zvdtJCM6XddM4BydNSFmDuVjfYU TpKxAOlIggxYslezbfCTJDr5nLCfOj0nRGqixqXQ4vbzhod9DnQPh62aIINLEKI= =3Z/l -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160804173429.GD32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can't find Fedora 23 minimal template
Thanks! I didn't try that. Since qubes-templates.repo wasn't on sys-firewall, is the repo info forwarded along with the command? El jue., ago. 4, 2016 12:41, Marek Marczykowski-Górecki < marma...@invisiblethingslab.com> escribió: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Thu, Aug 04, 2016 at 09:20:19AM -0700, fmu...@gmail.com wrote: > > Ok, got it working. > > I copied /etc/yum.repos.d/qubes-templates.repo to sys-firewall, same > place; then on sys-firewall I edited the file and put 3.2 where it said > $releasever (it didn't work otherwise) and finally I run "dnf -v --refresh > makecache" to refresh dnf. > > After that I run qubes-dom0-update qubes-template-fedora-23-minimal and > it installed the package. > > If that was a problem with old metadata cached, simply adding a --clean > option to qubes-dom0-update should be enough. > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJXo3BAAAoJENuP0xzK19csbQ0H/2t32pCerfiSUYMYUzA+Zq4M > Suj7mtJ85zaVOOJrtrNvgo71UyAQjcn+Kwn08J+EXL6zYhpLeph2tKGB45u27txf > TB/bS/6erWm659WsaqTyQ+LuuakmONw/e+iFxRXesZI9ufKmjhaQvvHJHaxxQ8Ng > ec/hz5xKBaHwa4gc8DdvMtOh3BDrfcPY0sjbG2qCvxENvT3fWT7c+kybisRVxgJK > xNDAvoWF4h3JwueC69bgwDq+ftPX/O3fJu1YRUmahrZZDX4AMe9P10hsXHGnMs4F > 1XewYQK+saxscYbBvcy7FbvOYKuQTWZrUyWBJzJGBy75Vz9Cz64TNR9V7V/58g4= > =8Lhm > -END PGP SIGNATURE- > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAKXLZdSKq9j-zxSi85ih4RMsjEdpnr3dEfnYZpWWN6Cmd09Jgg%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can't find Fedora 23 minimal template
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Aug 04, 2016 at 09:20:19AM -0700, fmu...@gmail.com wrote: > Ok, got it working. > I copied /etc/yum.repos.d/qubes-templates.repo to sys-firewall, same place; > then on sys-firewall I edited the file and put 3.2 where it said $releasever > (it didn't work otherwise) and finally I run "dnf -v --refresh makecache" to > refresh dnf. > After that I run qubes-dom0-update qubes-template-fedora-23-minimal and it > installed the package. If that was a problem with old metadata cached, simply adding a --clean option to qubes-dom0-update should be enough. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXo3BAAAoJENuP0xzK19csbQ0H/2t32pCerfiSUYMYUzA+Zq4M Suj7mtJ85zaVOOJrtrNvgo71UyAQjcn+Kwn08J+EXL6zYhpLeph2tKGB45u27txf TB/bS/6erWm659WsaqTyQ+LuuakmONw/e+iFxRXesZI9ufKmjhaQvvHJHaxxQ8Ng ec/hz5xKBaHwa4gc8DdvMtOh3BDrfcPY0sjbG2qCvxENvT3fWT7c+kybisRVxgJK xNDAvoWF4h3JwueC69bgwDq+ftPX/O3fJu1YRUmahrZZDX4AMe9P10hsXHGnMs4F 1XewYQK+saxscYbBvcy7FbvOYKuQTWZrUyWBJzJGBy75Vz9Cz64TNR9V7V/58g4= =8Lhm -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160804164135.GC32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Can't find Fedora 23 minimal template
Ok, got it working. I copied /etc/yum.repos.d/qubes-templates.repo to sys-firewall, same place; then on sys-firewall I edited the file and put 3.2 where it said $releasever (it didn't work otherwise) and finally I run "dnf -v --refresh makecache" to refresh dnf. After that I run qubes-dom0-update qubes-template-fedora-23-minimal and it installed the package. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3be58d0e-0ab3-4a54-9c86-ebf0a2770c1d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: ssh-agent, gnome-keyring, ed25519 keys
On Wednesday, August 3, 2016 at 8:21:03 PM UTC-7, pixel fairy wrote: > out of the box, fedora23 template, ssh-agent works fine with rsa keys, but > not ed25519. > > could not add identity "/home/user/.ssh/id_ed25519": communication with agent > failed > > running "ssh-agent bash" and then adding both keys works fine. is there a > clean way to disable this keyring? its not like we need it. so in ubuntu this is easy to disable. "gnome-session-properties" and uncheck "ssh key agent". you get back the real ssh-agent. none of the methods ive found online work to disable it in the fedora or debian appvms. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9b963f7f-1107-443c-8918-d95a48b5433b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: black screen after installation v3.1 on dell XPS 15
is it a dell xps 15 9950 , the newest edition? if yes does your network card get detected by qubes 3.1 and work properly? do you have any issues with a 4k display? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fdcec0c5-30b3-49ed-bd42-532784e8a214%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
anyone knows a solution to get it working somehow with this specific dell xps 15 wirless card the Broadcom BCM43602 . Im not an expert with anything terminal related. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/331db64a-2efd-43c6-9b87-1bb64b4d040d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't find Fedora 23 minimal template
Hi, I can't find the fedora 23 minimal template. Qubes-dom0-update can't find it and I don't see on the web page for the repository either. Anyone knows where I can download it? Thanks, Francisco -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dae0ab8f-b88f-4581-a07b-58c97994a05b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Attaching a webcam from sys-usb to other appvm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Aug 04, 2016 at 02:02:59PM +, 46l47g+27idcs742td9g via qubes-users wrote: > Hi, > > I finally managed to put this to work, the missing part was to install the > qubes-usb-proxy also on the sys-usb as well (mea culpa) :) > I'm now able to attach the webcam to any AppVM, unfortunately the only caveat > is that when I unassigned the device from the AppVM back to the sys-usb I'm > not able to get the camera working again on the sys-usb - the device doesn't > seem to be present. Indeed this is how it is working now. Mostly because device is still connected to usbip-host driver and isn't switched back to the original one. > Is this the expected behavior? That's a good question. I think the most common use case would be to either: - use device directly in sys-usb all the time - for example if you use a different mechanism to make it available to other VMs - like qvm-block, or simply mount it there and copy to/from files using qubes file copy - don't use it in sys-usb at all and only attach to some VM when needed - like for webcam - you don't have your video call credentials in sys-usb, but in some other dedicated VM Generally it is based on assumption that sys-usb serves only as an interface to the devices, but all the data is stored in some AppVM. If this is correct, switching device driver back to the original one is just waste of time. Joanna, Andrew, what do you think? - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXo1EfAAoJENuP0xzK19csFzEIAJi9bEBcN7RjhNsFa4IGhYBt uNS9679m9xuHvaIMydLfDVOzYmV98YXix25K8MpzbUbqY4+0aHXvVPmv7jIBem0v 1gCFDIt8v9tl9r0b3XYfP7zgEdoosyyz1FB/fHFAHMHogJs//+F3DxysoA/DLL8i JMamHvegtunzVq3iJDkSpckFo6MCgBkqb1q4RUkS2F7ZRq5ZpkjE+jL38mCKJVK1 USoGod8fYPMewhGMPs0GABzMzZHdarZU5SyySFWdEfy2/GwSgWQCpMn9WpaGqSSw qDCHuCpZrwMnRCsPyBGkEP3ZJjtmOKZbHO4LRAZ/hQmyxGxMoH93oqGG5GENBFY= =yw18 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160804142847.GB32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Attaching a webcam from sys-usb to other appvm
Hi, I finally managed to put this to work, the missing part was to install the qubes-usb-proxy also on the sys-usb as well (mea culpa) :) I'm now able to attach the webcam to any AppVM, unfortunately the only caveat is that when I unassigned the device from the AppVM back to the sys-usb I'm not able to get the camera working again on the sys-usb - the device doesn't seem to be present. Is this the expected behavior? Thank you. Sent using GuerrillaMail.com Block or report abuse: https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/70fc21853cae5c404e2d9366ffe315e97f74%40guerrillamail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/04/2016 02:16 PM, Jeral wrote: > On Thursday, August 4, 2016 at 11:08:32 AM UTC+3, Marek > Marczykowski-Górecki wrote: On Wed, Aug 03, 2016 at 07:05:00AM > -0700, Michael wrote: Have a Broadcom BCM43602 Wifi Card in my dell xps 15 9950 and I downloaded Qubes Release 3.2-rc2 Problem: I can not connect to the internet cause my wifi card is not working with qubes: "If BCM43602, the wireless card is disabled in BIOS, installation succeeds, and afterwards it's possible to re-enable BCM43602 in BIOS and boot Qubes. However, subsecuantly adding BCM43602 device to the sys-netvm freezes the computer." -my boot setup has VT and VT-d options activated how can I make my network function ? > > Do you have serial console in this computer (for example in > docking station)? That would greatly ease collecting more > information. > > > I tried to compile and install wl driver into sys-net VM. > Unfortunately it didn't solve the problem, dom0 still freezes... > :( > I guess you have already tried with permissive mode, right? It seems complicated to achieve. Also it is more related to Xen, Linux and the card vendor than to Qubes. Regards. -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXoziQAAoJEBQTENjj7QilhBoP/Rbf0Gdot6gHgFWQ0LYp/J0I FT6T2FPp22KyA66TDxmJ2hHrb5t/q/boZW7RFO0xBO9/S9X6Ixml6YoaLy91aIeG 3g7znHxBhHDPaUAqbrQDfVeL9lr4qul3qZivinbpI/giUCmHyLATlgtnBbWrYP4n kQVxfhAUo0Wm/KPE0Ai0z3GWJ7Zcttzm4gmJOygpv+hczqD0UMYgL4+BaPNK+Ql8 umLK1nm2D1ASLfHEzphbZrXeNWcHOAgkPW/5P6xm1snS91oV2bqmmCGAl525Q0YT xptIfxcmBOFGZ+4eyq5/L422U9EAcOxsMGlAJKAWGSAG6nBkqxQO8CoLs+YG/SNy 4Ktjfu8fCeMShdkCXbVv5aZ+HYay9u70Mk4EhrNm92/F4WBOJf9qNJHMOc6aW2CN guW5103Ott8Q55S66yuqzK5YKkCoQJhSCDZqkxyZzorx19/gGWiZqcKqlVITnr87 zfqTweP5AS5tnH9kItWmVGFWpHglogrwdLYD+S+Vu1w8uiIDbiEvyhzxxthxr80Q 1/rcaybKB+LSZhus2b9jSonAtN1AjRqCGbYohfLxRmuls/PNgYmGgAjO9j/LybwC wZ6Pw0Cew4E3+C7Bit42DxViw4jvREE29EqTkJVNMJsD0BFT6yjhIXInzZ4jCsTA sOlajHZER0hTlXQIyiSh =TivY -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5bc7bf98-e930-c773-f741-077f19207ef8%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
On Thursday, August 4, 2016 at 11:08:32 AM UTC+3, Marek Marczykowski-Górecki wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Wed, Aug 03, 2016 at 07:05:00AM -0700, Michael wrote: > > Have a Broadcom BCM43602 Wifi Card in my dell xps 15 9950 > > > > and I downloaded Qubes Release 3.2-rc2 > > > > Problem: I can not connect to the internet cause my wifi card is not > > working with qubes: > > "If BCM43602, the wireless card is disabled in BIOS, installation succeeds, > > and afterwards it's possible to re-enable BCM43602 in BIOS and boot Qubes. > > However, subsecuantly adding BCM43602 device to the sys-netvm freezes the > > computer." > > > > -my boot setup has > > VT and VT-d options activated > > > > how can I make my network function ? > > Do you have serial console in this computer (for example in docking > station)? That would greatly ease collecting more information. > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJXovf6AAoJENuP0xzK19cszGgIAJBIKc8ja2GP4y2GZxSqnuHu > NMEceDcOOcHqOz8Pq/xFjzP6dBiof9R5ITZeUl7+Nol0vtN6sX/zXGrQu1ZvblxG > MnTCEzkQ6ZdAm0rwoaKykvblHeNyfZnk3jnrFImqyktIBqJoWa4gpBvz3eTfWOUE > vgsSxbmFlblzXt2SQuNlbRRI/UgqNx3GXRnJpUFNGfDWoW6sYTj/Re4LumF4bK4S > zU8rG5w6x3q2B35SotACdGDGgJhThDcR9rX0LfmBDljqyqYTCNtXfpGynUyycSq4 > 1t3BT1kfdsDAalKuoDjszW27bqLGlCbzJ4/JSYWku/aciLVksZdqa6BpcCRq3HI= > =cfQk > -END PGP SIGNATURE- I tried to compile and install wl driver into sys-net VM. Unfortunately it didn't solve the problem, dom0 still freezes... :( -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7442a4d6-e62f-4d45-a7a3-0b273fa5ca78%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Aug 04, 2016 at 12:39:35PM +0200, donoban wrote: > > > On 08/04/2016 12:24 PM, vincent.maximus.c...@gmail.com wrote: > > the wlan card is the > > > > broadcom bcm43602 > > > > in all Dell xps 15 9950 machines > > > > it works on ubuntu for me but not with qubes ? > > > > Because Ubuntu adds a lot of proprietary drivers which most major > distributions don't. > > As you can see here > wireless.kernel.org/en/users/Drivers/b43#Supported_devices , most > bc4360 cards are supported only by the proprietary wl driver. > > You need to compile the module for your sys-net kernel, or the VM you > want to use for run it. > > I suggest you to do an standalone VM and let it use his own kernel > instead the dom0 provided. It's a pretty complicated process It's slightly easier thanks to PV Grub support: https://www.qubes-os.org/doc/managing-vm-kernel/#tocAnchor-1-1-3 But still requires some work. > , you can > also buy a cheap (and compatible) USB dongle and connect it directly > to sys-net. Or different miniPCIe wireless card... - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXox+ZAAoJENuP0xzK19cs5LsIAI+9VtpeeqFLfZkHJfQY77Ek wKB/FjLxwIUJdN1oDmzpYIAWvVjXCtgcD3oAjMbgW7MX9/QMLa8cSD1xzIG9PxXs AOKBRBbZ0Gt+iCmltgCIebmA1PQ01LwLog+D7I1fKSUfUYtwfkqxpvzhi5n4Huex CfF8ti3yYPxuEi5tw1kGMeVA6lBf+06ghUwbwcT+Ym2OR3catvpKbGowBxXFiJDg AWafsmrdtGieI5yWOj41Ap6rQKJQrB8aQJImEznQl5sjNTMOZMNRAtivTu4EmhPF NHa6EwVfa2t/tHchwTNvmKSKo4CZoKXkyxwOhwiHmYot0yAesWCPdLNRnNamzIo= =+Tmb -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160804105728.GA32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] stickers and glitter for physical evil maid detection?
any recommendations on stickers/glitter for physical tamper detection (or deterrence?) the nail polishes ive tried so far havent worked well, and the stickers were too easy to replace without looking out of place. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d9ffc082-09a4-48e0-9358-dbffa36a6199%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Attaching a webcam from sys-usb to other appvm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Aug 03, 2016 at 06:35:16PM +, 46h6sk+9aybfqrmo0zwg via qubes-users wrote: > Thank you for the reply. I tried to follow the instructions on the > documentation (as illustrated for the conference AppVM) however that does not > work. I get a message stating - ERROR: qubes-usb-proxy not installed in the > VM - which is not true, I've installed the package and the message is still > displayed. > > What I'm doing wrong? Do you have it installed in both sys-usb and target AppVM? Or rather - respective template(s)? - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXoxvFAAoJENuP0xzK19cs8DoH/iQIXhiixF6O9VlaLckR4N7k Ytrc7VjjhG7g+1GNLsVIGzCaiurndsKrmgD0p+McT3hIhmlRckh/uHSGuwQGOEeK MYJcKoyWLXnxpg7wjiFh+GNlD12DvyzjNT+eB8JVmWx4VMcBVeUmRfA7p52KNuke o8mL+V79Xgj3MMurMU1d5ZQ3cx26/gSsGOAffplNXrilSczN54Z6D1fQCx3Tzn9W 65aYijzUlhlc1Okv4MRu4pl+aj29XamsFpnwIo/AuiIR9Ct9j8+RrJZTINlz6qKU ibfOVv2dsdcIXCHn83CStAKwrImiYkm6p3InImGIbS5D86xEuT146qnyYcErjlA= =Yip+ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160804104108.GY32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/04/2016 12:24 PM, vincent.maximus.c...@gmail.com wrote: > the wlan card is the > > broadcom bcm43602 > > in all Dell xps 15 9950 machines > > it works on ubuntu for me but not with qubes ? > Because Ubuntu adds a lot of proprietary drivers which most major distributions don't. As you can see here wireless.kernel.org/en/users/Drivers/b43#Supported_devices , most bc4360 cards are supported only by the proprietary wl driver. You need to compile the module for your sys-net kernel, or the VM you want to use for run it. I suggest you to do an standalone VM and let it use his own kernel instead the dom0 provided. It's a pretty complicated process, you can also buy a cheap (and compatible) USB dongle and connect it directly to sys-net. Regards. -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXoxtnAAoJEBQTENjj7QilSOoP/0JoPS5o3W/gjh1EJR/U4rVG fumEkt1aHeQteZH4NoQssCHFaeWJ1uW5cBj0sDEMyJZd33W1v4iJ16evD8kbjl+w YPmfnMt6xFdijWaC735mtcmRs7CghH4sVzrJs1eK2p84spNc9Qg5x+IAK8TYuZM7 x0PvLhI/14yXjISdIJO61qxz5Jf/9m+PoH9wF5YKuFpJcYFCYmzNS9B7kz8sQJSB f35corkVdC8qRv9P3EdJPr7yAeqbOb3AKnG97Nz1z/GGgWMhafTTWk61o767eFfB 7raFELn4RgNUxSp7xPtjRPUmjF6S5pcTcfDehRs4t7kMTzto09qV7keyulBqh19W lAW9Gy6SjOyxCwnCuVmFUAQPEuVkapAw3KgW+vnNkvL41uDI/zkdkLmneko+Elcc uKQuTY+S75PTF/cFZ01cGWVKOG9KFoYx98gJHA+2NS6AHhtzCindfDPE4FVYI0pJ JT5F1X2r5RP1I+nzCjJoWK5zZO/oNw5s+9NZdj8TAUpQ83Xzbedlk02RbLppwqKc hSS5cHHz3Uqw7mg1S9AtysZ/Yyg0NA5Jsw2vaFrQYnKwjHjjohs6GFS8P1X74n1v ihtzkIybJA7BcSLfp7wsALro/xh4biNxmo/p56/3lIHMz6A8xN0I8rabUnph8mXM DoWyF6ib/Kyb8TBtfSb+ =iA/s -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0a3390f1-b7ad-62c9-f207-314d23d5717f%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Please make a better Scaling for 4K screens - Zoom, DPI
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Aug 04, 2016 at 03:16:24AM -0700, Smithy wrote: > I have a 4K screen and the layout in qubes R3.2 is unusable > even with the DPI scaling and the text size modification tool. > > -qubes manager is tiny and can not be scaled > -debian and other vms are tiny VM support is tracked here: https://github.com/QubesOS/qubes-issues/issues/1951 > the qubes manager tab should be able to be zoomed in and scaled > same with any other window there is with settings that can be saved. Qubes manager does respect global font DPI setting, so it shouldn't be a problem. It isn't ideal tough: https://github.com/QubesOS/qubes-issues/issues/2033 > ubuntu does a great job with that. > it would be great if that can be put inside the next release. > - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXoxnjAAoJENuP0xzK19csfUYH/RMUAhJiu2HwYhMbb/ypUbTS BiXMgUWkfeGCtlC7jwxyYxT3GhCh/xCskpflufkzgtL02KLzL0U8qs9DCjG/MkL3 Mm4MneiLaHE81OlDV16rmvruxbCxFlna+zjrZ12xRDh1XXI0afoYWEzca1/b00bt tCoqrbQvRYorPVth7uvtcofx8m/gbCQF6PbTzajkQovc8R7+dfI78bmErsVTkprh hcndRCalEewKK0dS+gM0csvOpzvUFz2tVG4nbfhgqI1U2/KpiBylNYECz1D0V+SS YRFS/9iY8G1K1cbByX+2dkydL2UCASF+FtinVT14qrt4TyWUvXZaMJbJyegsUMM= =0FQo -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160804103305.GX32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
the wlan card is the broadcom bcm43602 in all Dell xps 15 9950 machines it works on ubuntu for me but not with qubes ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/abdef991-7cd0-460e-9e52-3231d8c55a6d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
the wlan card is the broadcom bcm43602 in all Dell xps 15 9950 machines -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/14f36ce9-2853-41a8-97dd-d27222c3f212%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
On Wednesday, August 3, 2016 at 4:05:01 PM UTC+2, Michael wrote: > Have a Broadcom BCM43602 Wifi Card in my dell xps 15 9950 > > and I downloaded Qubes Release 3.2-rc2 > > Problem: I can not connect to the internet cause my wifi card is not working > with qubes: > "If BCM43602, the wireless card is disabled in BIOS, installation succeeds, > and afterwards it's possible to re-enable BCM43602 in BIOS and boot Qubes. > However, subsecuantly adding BCM43602 device to the sys-netvm freezes the > computer." > > -my boot setup has > VT and VT-d options activated > > > how can I make my network function ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a724df5e-79f9-4b25-bdc9-ae17a4243b5e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Please make a better Scaling for 4K screens - Zoom, DPI
I have a 4K screen and the layout in qubes R3.2 is unusable even with the DPI scaling and the text size modification tool. -qubes manager is tiny and can not be scaled -debian and other vms are tiny the qubes manager tab should be able to be zoomed in and scaled same with any other window there is with settings that can be saved. ubuntu does a great job with that. it would be great if that can be put inside the next release. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/44cb94f7-9c0e-4cad-b361-ba9aead2dc3f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Microphone attached hides reboot needed icon - Minor Bug - Qubes 3.2-rc2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-08-03 23:44, donoban wrote: > Hi, > > yesterday I noticed that the reboot needed icon is not visible if you have > the microphone attached to a Domain. > > Regards. > Thanks. Tracking: https://github.com/QubesOS/qubes-issues/issues/2226 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXowt6AAoJENtN07w5UDAwVjIQAK5MyNgnCqNiHSaELbj92W9h 6UfsL4n5qTmcUoYz3BHDrxPwQccLJ0zof7f/wdG+fZaOh6mZpYN0LE3ZItfjNF0X NF3Yh+Z5YTFo8jb3GFw75uYU7XyaS8hFoz78aeHHk+QHz3HCRFhIA14CIL94IAph v7jBk+pmAXAyxsonzC0K4CHyBxzsV/VlciZzgr+PqdwCCnXYsC9Cow7hlRhRfAsq Tzj4MkenD3HjUYZ6gLQo6imsuKKj/9EjhFi0JIJVWQ0e2oCvfRv+r9ULTkZB6G9/ bOeFkskRkIXJqqs5fPZ6PeCp12+Tn6O4avQBP2mNIfdO4+LnBNvcbgJ/jeASkBMJ lc+Tq89AcNiiN39nUGKv2swYrIrJJ+kppBsJ+6pODEdTPoMifAtxPkynvbER/+7U RgrsCQxeS5venOKmoQWdrdcLo4KD8C6rLRxnP5ejHvAqv0ecxc/zIptGsOyQt6fR bJWHi/TYIzDGBJwqIMLWW5LFnsixtJPRxkiZtTkoCJgIbePy2NpRENBF/aXbLhsW L8hXK76oM/OpXXYziI7AZEp/WXjQn64ma6NYs7YVzSiDhmFbG8r5lp0Kg+XI0qD2 UCj98ZORF3FwC03842wxxGB1Kx0lLurO7GUoaeZA9ej1uCIE/q3N7ORO0f0UyKtJ umAKObl3B9ZTkJkyR5QQ =O3ea -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e360ef2a-270c-c317-bda2-75c83131fe83%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Aug 03, 2016 at 07:05:00AM -0700, Michael wrote: > Have a Broadcom BCM43602 Wifi Card in my dell xps 15 9950 > > and I downloaded Qubes Release 3.2-rc2 > > Problem: I can not connect to the internet cause my wifi card is not working > with qubes: > "If BCM43602, the wireless card is disabled in BIOS, installation succeeds, > and afterwards it's possible to re-enable BCM43602 in BIOS and boot Qubes. > However, subsecuantly adding BCM43602 device to the sys-netvm freezes the > computer." > > -my boot setup has > VT and VT-d options activated > > how can I make my network function ? Do you have serial console in this computer (for example in docking station)? That would greatly ease collecting more information. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXovf6AAoJENuP0xzK19cszGgIAJBIKc8ja2GP4y2GZxSqnuHu NMEceDcOOcHqOz8Pq/xFjzP6dBiof9R5ITZeUl7+Nol0vtN6sX/zXGrQu1ZvblxG MnTCEzkQ6ZdAm0rwoaKykvblHeNyfZnk3jnrFImqyktIBqJoWa4gpBvz3eTfWOUE vgsSxbmFlblzXt2SQuNlbRRI/UgqNx3GXRnJpUFNGfDWoW6sYTj/Re4LumF4bK4S zU8rG5w6x3q2B35SotACdGDGgJhThDcR9rX0LfmBDljqyqYTCNtXfpGynUyycSq4 1t3BT1kfdsDAalKuoDjszW27bqLGlCbzJ4/JSYWku/aciLVksZdqa6BpcCRq3HI= =cfQk -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160804080825.GW32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Unable to get right X display for kali on HVM
On Thursday, August 4, 2016 at 5:29:45 AM UTC, J. Eppler wrote: > On Monday, August 1, 2016 at 8:58:56 AM UTC-5, NewbieG wrote: > > Hello list, > > > > I'm running Qubes OS 3.1 and I'm trying to have a Kali VM (2016.1). > > > > I've tried both methods suggested in: > > > > https://www.qubes-os.org/doc/pentesting/kali/ > > > > First one, works ok if you run kali from DVD without installing it. If I > > try to install it, login window flickers and once logged on, the desktop > > shows up 'misplaced' (see attach). > > I was first able to install and run kali without the above problems, but > since Kali is a rolling distribution, I will test it again. It might just don't like my video card (Nvidia GF108M). > > > Second one, as someone already pointed out in the list, introduces > > conflicts between X packages from kali and X packages from the debian-9 > > template. > > For the second method there are two paths, one which uses kali repos directly > and another is based on katoolin (which is a helper script). > > Use the katoolin one, that method works well. thanks for your suggestion. I've tried both, manual and katoolin ways. If you try to install everything (kali-full) X-based conflicts show up, hash mismatches, etc. Cheers -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/230f7e55-91b7-4046-8ece-23c62f2cdf0c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
Have the same issue on my XPS 9550. I tried to solve the problem via "PCI passthrough issues", but it didn't help... Still looking for a solution -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6d90cc9f-dd78-4ddf-a3f5-d670b5157fd8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] FREE WESTERN UNION HACK TRANSFER- SELLING CC - PAYPAL - RDP - BANK LOGINS - ATM
Worldwide CVVs Shop | VERIFIED SELLER | Hello all buyer : i'm a professional Hacker and i have for all goods good and fresh live cc my CVV are the best for you. with up to $3500 inside each of them I'm Seller for: CC, CVV US,UK,CA, EURO,AU, Italian,Japan,France,...all cc. Paypal verify, Software Spam mail mail list, CC fullz info, CC DOB, Dump sell cvv.i can also Hack money to your private bank account with the bank not nowing,i can also transfer money that is up to $5,000 to your cc,visa, master card or any other card. i can also Hack thousands of dollars to your paypal account, Perfect money account Alert pay account or any online account. we also sale money pack in a very low rate. ( NOTE ) : We use only one Email to support. Please be careful of this. Because there are so many people fake us to commit fraud. EMAIL ADDRESS... wu.credits...@gmail.com skype.. …. wu.creditshop ICQ... . 677283827 --- === ( Western Union Transfer / Software Bug 2014 : ) === + Selling code MTCN of Western Union Transfer : fee $150 for MTCN $1500 ( get code MTCN and Sender's details ) fee 200$ for MTCN $2500 ( get code MTCN and Sender's details ) fee $300 for MTCN $3000 ( get code MTCN and Sender's details ) fee $500 for MTCN $6000 ( get code MTCN and Sender's details ) fee $700 for MTCN $9000 ( get code MTCN and Sender's details ) fee $900 for MTCN $15.000 ( get code MTCN and Sender's details ) -I tranfer minimum 1500$ with price 150$ first for u trust -Western Union Online Software(Western Union Bug(WU Bug):800$ After 20 mins you payment for me.I tracking if real.i will do hack transfer money and send you MTCN now. --- - You make payment then send me payment info and your WU details (First name + Last name + Country) - If I check you have sent money then I will done transfer for you - After transfers completed, about 20 minutes you will get code MTCN + Information to pick up, it is very easy cash money --- Please don’t ask me about transfer with small amount … all must know transfer very hard so if you want let’s pay for me with minimum You can pick up at all Western Union office in 1 hours … I hope all must read clear before contact me .. ok ??? --- + Selling the Software + Activation Code : price $500 for 1 activation ( Activities in 1 year ) + chat with me to know more details: ( My ID Yahoo : ) === ( SElling New CC,CVV... All Countries And All Kinds : ) === ___ Cvv Us : ___ Us random : $6 per (one), Us fullz info : $25 per (one) Us with bin $10 per (one), Us with dob $15 per (one) ___ Cvv Uk : ___ Uk random : $8 per (one), Uk fullz info : $30 per (one) Uk with bin $15 per (one), Uk with dob $20 per (one) ___ Cvv Ca : ___ Ca random : $12 per (one), Ca fullz info : $30 per (one) Ca with bin $15 per (one), Ca with dob $20 per (one) ___ Cvv Au : ___ Au random : $12 per (one), Au fullz info : $30 per (one) Au with bin $17 per (one), Au with dob $20 per (one) ___ Cvv Euro : ___ Eu random : $20 per (one), Eu fullz info : $40 per (one) Eu with bin $25 per (one), Eu with dob $30 per (one) .. . Cvv Italy random : $20 per (one), Italy fullz info : $35 (one) Cvv Spain random : $20 per (one), Spain fullz info : $35 (one) Cvv Denmark random : $25 per (one), Denmark fullz info : $35 (one) Cvv Sweden random : $20 per (one), Sweden fullz info : $35 (one) Cvv France random : $20 per (one), France fullz info : $35 (one) Cvv Germany random : $20 per (one), Germany fullz info : $35 (one) Cvv Ireland random : $20 per (one), Ireland fullz info : $35 (one) Cvv Mexico random : $15 per (one), Mexico fullz info : $30 (one) Cvv Asia random : $15 per (one), Asia fullz info : $30 (one) - And many country orther... let me know if have i will sell for you. - All my cvv very good and fresh , work 100% with hight balance. - I ready change cvv if not good or dont work. - Contact US to create orders + chat with me to know more details: ( My ID Yahoo : ) === ( Selling Card Dumps With Pin + Track 1/2 : ) === - Card Dumps from Us : ( 101 ) Card Visa Classic , Master Card Standart : $70 / 1 piece Card Visa, Amex, Disco, Master Gold / Platinum : $80 / 1 piece Card Business, Cooperation : $90 / 1 piece Card Discover, Amex, Debit card : $90 / 1 piece Card American Express : $100 / 1 piece - Card Dumps from Uk : ( 101 ) ( 201 ) Card Visa / Master Standart : $85 / 1 piece Card Visa / Master / Amex / Discover Gold , Platinum : $90 / 1 piece Card Business / Signature / Purchase / Cooprate / Word : $120 / 1 piece - Card Dumps from Canada : ( 101 ) ( 201 ) Card Visa / Master Classic + Standart : $80