[qubes-users] grub2-mkconfig not found
Hi all, I'm a new qubes user and have been following the guides to get trim enabled for the dom0. Everything seems to have gone smoothly until the grub steps. I can't find a grub.cfg file anywhere. The only abnormality to my installation is that it's UEFI. So the closest thing I did find to this was /boot/efi/EFI/qubes/xen.cfg which had the kernel line referenced in the trim guide. However, when I attempt to run grub2-mkconfig -o /boot/efi/EFI/qubes/xen.cfg I get "grub2-mkconfig: command not found" All that is present in the /boot/grub2 folder is a themes folder. I am using the main dom0 terminal for all of this. Considering that everything boots fine, I'm hesitant to reinstall grub2 (I assume it would need to be grub2-efi in this case). Any clue as to what's going on? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7ac23634-8b0e-41b4-9000-e2a740c54d62%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 3.2(R2) USB Connecting to DOM0 by Default
On 08/12/2016 01:27 PM, johnroberts19...@gmail.com wrote: > On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote: > On 2016-08-11 05:08, amad...@riseup.net wrote: My understanding is that by default Qubes Dom0 is protected from USB attacks by disallowing access to USB's. To the contrary,on my system, USB's have direct access to Dom0 - I plug in a usb -popup shows it's connected to dom0 - i have direct access via dom0 to the files on the usb. Is it just me? or it it a system failure? > > Pleas read this page: > > https://www.qubes-os.org/doc/usb/ > > Without a USB qube, the USB controllers are left in dom0, which sounds like > your situation. Depending on the version of Qubes you're using and whether > you're using a USB keyboard and/or mouse, you should have been prompted during > installation to create a USB qube. However, you can also create one yourself > by following the instructions on that page. > > > So i use R 3.1 and have a usb mouse and keyboard but nothing about usb > mention while the installation. i wonder the same as the author after i > insert usb stick to my system and it's at dom0. > Do you have a USB Qube? If not, you need to make on following Axon's instructions above. Otherwise, I would check your USB Qube's attached devices with Qubes VM Manager (the Devices tab in the USB Qube's settings) and make sure your USB Controllers are selected. -- kulinacs-- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/799e56e8-8afc-1bdb-08a6-4cbfe66b688f%40kulinacs.com. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Qubes 3.2(R2) USB Connecting to DOM0 by Default
On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-08-11 05:08, amad...@riseup.net wrote: > > My understanding is that by default Qubes Dom0 is protected from USB > > attacks by disallowing access to USB's. To the contrary,on my system, USB's > > have direct access to Dom0 - I plug in a usb -popup shows it's connected to > > dom0 - i have direct access via dom0 to the files on the usb. > > > > Is it just me? or it it a system failure? > > > > Pleas read this page: > > https://www.qubes-os.org/doc/usb/ > > Without a USB qube, the USB controllers are left in dom0, which sounds like > your situation. Depending on the version of Qubes you're using and whether > you're using a USB keyboard and/or mouse, you should have been prompted during > installation to create a USB qube. However, you can also create one yourself > by following the instructions on that page. > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJXrMkGAAoJENtN07w5UDAw2SkQAKE230GVdVVTj6ds7dH2m7ua > LJfdrLATMfXiCc8ua0GCPB/LFlBHua39LJDowL0okeX7UZfh6mPS+iQ51wEDVHU1 > Mox/PaEqkKpv7QnIj/6XSV3sIhwYqTIL+5HFBhd3IE8Psj2NCb30fYFJgoOdcpR6 > /8Y2huXCxCIvlsuTnxaa9/xvwZXKaN7eB00OMrk2pzRBfNOTedMIONzy5pPOvF2Q > X0cOln+U7s2iu0s+WmZWtcgX82qKpTWa07r96WcTU262e8+TXvH8umZZtIlJLwLU > eJxucUJFaNOGYGUL9dx6zaFiQ5WmOpCQ37Awh/3m/iVgL6FrpUlX+z66ZCpC6UZG > pwjHKcv3jRyxNIXTu6ROwjPzjjuHx8xuKAP1cIhU/EsQi+k6goWXeIalwO2lmDy1 > +lZwm3oHN1w2BEtPBthB+GDEsVjCzlUKnZSPZzj9rSMNW5CkYuw/KLXtKKhm2jcy > 7sSAk8zZ320NA0OeLcMR485QFaQ3HPtVoWdaA2aHjV/bTtMQMR72rgUZGXI3jntB > kFnQfa255+IQN8+WH6goHypuunSz3od3HH1ChlSnO2slzykMRiy51bHvLGnyNILN > TuKSTBTzqHxeV242NoqJye+zVTm5Ka1V43MTjIO6vhLCFz5HN6ezViT3GX/Eehah > nrDdi2shrGFOzLwP7Zea > =ZISO > -END PGP SIGNATURE- So i use R 3.1 and have a usb mouse and keyboard but nothing about usb mention while the installation. i wonder the same as the author after i insert usb stick to my system and it's at dom0. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/505ef430-be83-4168-a013-79a1d208bf3d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Unable to install R3.1 / media check failure
Hello, I have exactly the same problem. This is what I did: 1. I downloaded the Qubes-R3.1-x86_64.iso ISO from the Torrent. 2. I checked the signature and the hash values in the DIGEST file (I checked just the hash values in a second PC) and everything was fine. 3. I used dd to copy the ISO in a USB flash drive (Sony 8Gb) 4. When I booted from the USB I tried the “Verify and Install” option but, exactly at 4,8% (as for Cory Nelson) the check failed. There was a message of this type (copied by hand): Failed to start media check on /dev/sdc See 'systemctl status checkisomd5@-dev-sdc.service' and 'journal.ctl-xn' for details 5. I couldn't check anything because the system was halted What can I do? Thank you in advance! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6cf64646-8d0e-4339-ada4-ef26e0ebfe47%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 3.1 - Fedora update check disabled but still check
Hello i disable all the option auto update options but qubes still pop the update icon in my qubes vm manager. qubes vm manager "System - Global Settings" Disable dom0 and VM updates Fedorar 23 Template VM disable firewall rule "Allow connections to Updates Proxy" and even then from time to time it says new updates. i want to control back about when i check for updates. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/29f2f02b-fa8f-4357-ae3e-bcc9ece93b76%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to remove KDE from dom0?
Hi all, I installed Qubes 3.2 with KDE and XFCE with the intention of continuing to use KDE as I did before. However, there were so many problems and bugs that I decided to use XFCE in the hope of having less of those. Although, it is not bug free, it works a lot better, so I would like to remove KDE from dom0 now. I already tried removing the @kde-desktop-qubes group, but that wants to remove all sorts of other rather essential packages. Kind Regards, Torsten -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1d33cc7f-8870-be38-4735-65b82b17b031%40grobox.de. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
[qubes-users] Manual https://www.qubes-os.org/doc/templates/archlinux/ does not work.
Hi guys, it doesn't work on a step 9 after compiling. :: Running post-transaction hooks... (1/2) Updating manpage index... mandb: can't set the locale; make sure $LC_* and $LANG are correct -- bsdtar: Failed to set default locale ==>Starting build() /home/user/qubes-src/vmm-xenPKGBUILD: line 49: autoreconf: command not found ==> ERROR: A failure occurred in build(). Aborting... /home/user/qubes-builder/qubes-src/builder-archlinux/Makefile.archlinux:120: recipe for target 'dist-package' failed make[2]:***[dist-package] Error 2 Makefile.generic:139: recipe for target 'packages' failed make[1]: *** [packages] Error 1 Makefile:208: recipe for targert 'vmm-xen-vm' failed make: *** [vmm-xen-vm] Error 1 -- So, i can't install archlinux template step by step :( Script doesn't work. Please fix it. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f08ab15f-09c8-443c-aa1a-be3993e0f2fb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Tool to record Whonix / Tor browsing history..?
I would like to be able to do something like: 1. Use Whonix/Tor as a disposable VM 2. Record browsing history using an external software One of the reasons I don't use Tor that much (other than slow speed, captchas etc) is because I actually want to have a record of the websites I have visited. We know that it could be risky to have the Tor browser itself record history, if it gets hacked. But to have some tool running outside of the VM would be useful.. Is that possible..? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/72cae3bb-8359-49b3-91db-12e3b9e12c2a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to install "tl-wn823n" wlan mini usb stick in qubes ?
this is the instructions in the driver files from the tl-wn823n website. I have no success so far how to do it with qubes ? want to attach the usb wifi stick to my sys net. this device does not even get recognized by qubes but lsusb shows there is a device plugged in. 1. Development Environment System version: Ubuntu 14.04.1 Kernel version: 3.16.0-30-generic Gcc version:4.8.2 2. Compile the Driver 2.1. Compilation tool and kernel sources Before you compile the driver, please make sure you have the correct compile tool and kernel sources. We can install compile tool gcc by command “apt-get install gcc” Note : We recommend you use a suitable compile tool to compile our driver. For example: According to the command “cat /proc/version”, we could see your linux system is compiled by gcc4.8.2. So we recommend you use gcc4.8.2 to compile our driver if possible. 2.2. Compile and install the Driver 1. Access the directory of driver. 2. Before compile, make sure the parameters in “makefile.c” is suitable for your compile environment of your Linux system. ifeq ($(CONFIG_PLATFORM_I386_PC), y) EXTRA_CFLAGS += -DCONFIG_LITTLE_ENDIAN SUBARCH := $(shell uname -m | sed -e s/i.86/i386/) ARCH ?= $(SUBARCH) CROSS_COMPILE ?= KVER := $(shell uname -r) KSRC := /lib/modules/$(KVER)/build MODDESTDIR := /lib/modules/$(KVER)/kernel/drivers/net/wireless/ INSTALL_PREFIX := endif Explanation: · KSRC is used to specify the kernel source path for driver compilation. · CROSS_COMPILE is used to specify the toolchain. · ARCH is used to specify the target platform's CPU architectures such as arm, mips, i386 and so on. 1If your Linux kernel does not support 802.11, please annotate macro “CONFIG_IOCTL_CFG80211” in “makefile.c”. CONFIG_IOCTL_CFG80211=n ifeq ($(strip &(CONFIG_IOCTL_CFG80211)),y) EXTRA_CFLAGS + = -DCONFIG_IOCTL_CFG80211 = 1 EXTRA_CFLAGS + = -DRTW_USE_CFG80211_STA_EVENT = 1 endif 3. Type “sudo make” to compile the driver file. 4. Type “sudo make install” to install the driver file. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a58f6a29-b0be-4e99-b5cc-9fbf33e38047%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 3.1, Debian Stretch VM: audio not working
On Fri, 12 Aug 2016 00:37:59 -0700 Andrew David Wongwrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-08-10 04:32, RSS wrote: > > Everything should be update, with Qubes stretch "testing" sources > > turned on. > > > > This has been broken for a while, is it a known problem? If I try > > to start it manually with debug turned on, there seems to be zero > > useful information: > > > > $ pulseaudio --start --log-level=debug -n > > --file=/etc/pulse/qubes-default.pa > > > > D: [pulseaudio] conf-parser.c: Parsing configuration file > > '/etc/pulse/client.conf' > > > > D: [pulseaudio] conf-parser.c: /etc/pulse/client.conf.d does not > > exist, ignoring. > > > > E: [pulseaudio] main.c: Daemon startup failed. > > > > Yes, this is being tracked here: > > https://github.com/QubesOS/qubes-issues/issues/1927 Cool, and the workaround mentioned there sudo ln -s /usr/lib/pulse-8.0/modules/module-vchan-sink.so /usr/lib/pulse-9.0/modules/module-vchan-sink.so still works like a charm. Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160812170542.7e88e230%40armor-mail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: usb 3.0
Andrew, THANK YOU very much. I really really appreciate your work, your answers. wish there are more people like you that helps other people getting a clearer idea how to do jobs correct. thank you again and again Nick -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/637778f5-9240-4f3f-a247-d0b8c1ad1584%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.