[qubes-users] Memory balancing - security

2016-08-18 Thread admixior
Hi,
What do you think about using memory balancing between several VMs.
Is it security risk?
If someone exploited two VM (for example with tor and without), he can fill all 
accessible memory on one VM and release them and then other suspected vm can 
reserve all memory and look for a pattern.
The malicious program without access to other VM can also reserve memory from 
time to time and looking for sensitive data from other VM.

Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e3404544-2a9f-4ec6-a989-1f9c6c091fc4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Screen corruption on nvidia

2016-08-18 Thread johnyjukya
This problem persists in 3.2rc2.

JJ

>>> However, under Qubes, I experience random screen corruption.
>>>
>>> See: https://i.imgur.com/ovEFgYO.png
>
>> Looks like it could be this issue:
>>
>> https://github.com/QubesOS/qubes-issues/issues/1028
>>
>> As you can see from the qubes-builder-github comments, some patches for
this
>> are already in the testing repos. You may want to give those a try.
>
> Awesome!  Will give that a shot.  Thanks for the reply!  :)
>
> --
> You received this message because you are subscribed to the Google
Groups "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send
an email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com. To
view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/2380dfd0340bdf4025341dff82056852.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.
>




-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dba3a9f5755b9793d82e810521492df3.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Unable to Remove Template / Preun: Domain not found

2016-08-18 Thread 3n7r0py1
On Thursday, August 18, 2016 at 5:41:58 AM UTC, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-08-17 12:17, entr0py wrote:
> > New Qubes 3.1 installation with Advanced (No Configuration)
> > option.
> > 
> > After restoring dom0 + serviceVMs + serviceTemplates, tried to 
> > `sudo yum remove qubes-template-fedora-23`
> > 
> > Received: Error in PREUN scriptlet in rpm package... 
> > libvirt.libvirtError: Domain not found [from libvirt.py line 4066
> > lookupByName]
> > 
> > `sudo yum list qubes-template-fedora-23` shows template installed
> > from @anaconda/R3.1 repo.
> > 
> > `sudo qubes-dom0-update qubes-template-fedora-23` returns "No Match
> > for argument qubes-template-fedora-23"
> > 
> > Thanks for help.
> > 
> 
> Just a quick check: If you do "qvm-prefs -l fedora-23" (in dom0), is
> the value for installed_by_rpm "True"?
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJXtUqHAAoJENtN07w5UDAwelUQALeJbgBQc/IHuqOldGA4P3kS
> Cq8fsWe9pqQiTWDWUP2HMPEcONXkxEHbq3PdZofYkiyBkDlBLu58F1a7cTFgGpfU
> ToS+DK2od1Cax9rKKLnUef2LYE5BpMGsNn7QEdOt6xZPCeluRlANIm4kMDWkLTFP
> xzgWpjZ1SwhQF1ahv6vMGq0V+NjMujP8ecvR85P5JVTABvEQSnhhasu5qB/qUl7e
> PtRuR3KncS2dURBxLEiUew+I+nWkW65lARX5X/OB2lYu2TeOT9CWSkjzfllacTtH
> KVDJE9nL3TnKpYt0h2e2qrka5XjeGkzi1K1cxcBXZqWkz5gd397W0Xcz5fBn3Vgl
> aYs53VnvM5aAZemqa5+vYEATCRHB1ourRSddWYTIDKEI2gtfEu0j4eDwG8ZTL8gR
> CdTxzEGHrZLEoxNdata8L/p4FiCgW8YHFOQg1n5H6n6PTQwYr3jJty1nYMfvXWr0
> +Tbv5uQTPFa22oiOVEHJQ3yrHjeSv85KPf/8S25WhffPMImn0oMMOUUDcioG28c5
> jw9037MWER0c5fsjrBOewvlUnyldXILhPa+3ZQvWJvTKtFpsUoucM7skDej8Ugn3
> TLoShOqcpsq8UQiOTB5NtkhwTbfnBwWVHsSpGaiMzC9zZclCGv2p8w2J6rvjJVlh
> 5HNY970p/HtWs1JTNpOa
> =CQ+x
> -END PGP SIGNATURE-


Yes, `installed_by_rpm : True`

Does this have to do with the fact that the template was installed by the 
installer without any pre-configuration?

Is the preun script necessary? Can't find the thread where Marek suggested 
--no-script...

Or maybe some way to reset rpm?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4472a3cf-4a4c-4456-972b-be2ed01871d6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] OwnCloud-Client - wrong credentials

2016-08-18 Thread Robin Schneider
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 18.08.2016 19:00, angelo "angico" costa wrote:
> Hi, all!
> 
> - Qubes-os 3.1 - debian 8 based vm - owncloud-client 1.77
> 
> I can quickly and easily login to my OwnCloud account using a webbrowser,
> whatever password I set on it, but I just can't connect using
> owncloud-client 1.77 -- it refuses the connection yelling "Error: Wrong
> credentials".
> 
> Does anybody have any hint?
> 
> TIA,
> 
> Angico.
> 

Hi

Have you tried 2.1.1 from Backports yet?

https://packages.debian.org/jessie-backports/owncloud-client

- -- 
Live long and prosper
Robin `ypid` Schneider
-BEGIN PGP SIGNATURE-
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=9YIT
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7390a7d1-c93f-5ed6-c7a0-8bd717bb3fdb%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Routing network traffic in sys-usb using multiple devices

2016-08-18 Thread Adrian Rocha
El jueves, 18 de agosto de 2016, 10:50:14 (UTC-6), Marek Marczykowski-Górecki 
escribió:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Thu, Aug 18, 2016 at 09:12:35AM -0700, Adrian Rocha wrote:
> > El jueves, 18 de agosto de 2016, 9:45:44 (UTC-6), Marek 
> > Marczykowski-Górecki escribió:
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA256
> > > 
> > > On Thu, Aug 18, 2016 at 08:25:34AM -0700, Adrian Rocha wrote:
> > > > El viernes, 12 de agosto de 2016, 2:34:52 (UTC-6), Marek 
> > > > Marczykowski-Górecki escribió:
> > > > > -BEGIN PGP SIGNED MESSAGE-
> > > > > Hash: SHA256
> > > > > 
> > > > > On Thu, Aug 11, 2016 at 11:07:54AM -0700, Adrian Rocha wrote:
> > > > > > Hi,
> > > > > > 
> > > > > > I have two network devices and one only USB controller, so both 
> > > > > > devices are in the same VM (sys-usb). I want to route some app-VMs 
> > > > > > by one network and the rest by the other network, for that I have 
> > > > > > created two firewall VMs but both are connected to the same network 
> > > > > > VMs because, as I commented, I can not divide the network devices 
> > > > > > in different VMs.
> > > > > > By default all the traffic is going by only one network device. 
> > > > > > This is the configuration in my sys-usb:
> > > > > > 
> > > > > > [user@sys-usb ~]$ ip route list 
> > > > > > default via 172.20.1.1 dev enp0s0u2  proto static  metric 100 
> > > > > > default via 192.168.8.1 dev enp0s0u3  proto static  metric 101 
> > > > > > 10.137.4.8 dev vif2.0  scope link  metric 32750 
> > > > > > 10.137.4.29 dev vif9.0  scope link  metric 32743 
> > > > > > 172.20.0.0/21 dev enp0s0u2  proto kernel  scope link  src 
> > > > > > 172.20.2.255  metric 100 
> > > > > > 192.168.8.0/24 dev enp0s0u3  proto kernel  scope link  src 
> > > > > > 192.168.8.100  metric 100 
> > > > > > 
> > > > > > The firewall IPs are 10.137.4.8 and 10.137.4.29
> > > > > > 
> > > > > > I know how to route a traffic to an specific IP using "ip route 
> > > > > > add" to a determined device network, but How can I route the 
> > > > > > complete traffic from one firewall VM by one device network and the 
> > > > > > traffic from other firewall VM by the other device network?
> > > > > 
> > > > > Source based-routing is tricky in Linux in general. You can search for
> > > > > some guides on the internet.
> > > > > 
> > > > > But alternatively, on Qubes R3.2, you can assign one of those USB
> > > > > devices to different VM - some separate netvm, or even one of those
> > > > > firewallvms directly (and do not attach this firewallvm to any netvm).
> > > > > It may work slightly slower, but should be much easier.
> > > > 
> > > > Thanks for your tip Marek, but I am having an error with the USB assign:
> > > > 
> > > > The ethernet adapter in the sys-usb VM:
> > > > [user@sys-usb ~]$ lsusb
> > > > ...
> > > > Bus 005 Device 002: ID 0b95:1790 ASIX Electronics Corp. AX88179 Gigabit 
> > > > Ethernet
> > > > ...
> > > > 
> > > > And when I try to assing them to the sys-net VM in dom0:
> > > > [user@dom0 ~]$ qvm-usb 
> > > > sys-usb:4-6 06cb:1ac3 SYNAPTICS_Synaptics_Large_Touch_Screen
> > > > sys-usb:5-2 0b95:1790 ASIX_Elec._Corp._AX88179_:9
> > > > sys-usb:4-9 8087:07dc 8087_07dc
> > > > sys-usb:4-110bda:573c 
> > > > CN0Y2TKG7248741DA3RDA00_Integrated_Webcam_HD_200901010001
> > > > [user@dom0 ~]$ qvm-usb -a sys-net sys-usb:5-2
> > > > ERROR: Device attach failed: /usr/lib/qubes/usb-import: line 51: 
> > > > printf: write error: Invalid argument
> > > > 
> > > > Any idea or a detailed reference about this functionality?
> > > 
> > > Check kernel messages in sys-net. It looks like kernel driver rejects
> > > this device for some reason.
> > > 
> > 
> > This is the message in sys-net:
> > [ 3116.501714] vhci_hcd: Failed attach request for unsupported USB speed: 
> > super-speed
> > 
> > And I see this in sys-usb:
> > [ 3095.918081] usbip-host 5-2: stub up
> > [ 3095.920893] usbip-host 5-2: recv a header, 0
> > [ 3096.023678] usbip-host 5-2: reset SuperSpeed USB device number 2 using 
> > xhci_hcd
> > [ 3096.038562] usbip-host 5-2: device reset
> 
> Ok, so the reason is the device being USB3.0, which isn't supported by
> the driver, unfortunately. Try plugging it into USB2.0 port.
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJXtec+AAoJENuP0xzK19csRRQH/3RZvDbnNoPIDu27fOQz4Ef3
> acENkrr6Or7Pw09eRLitxG+RfrNsAAVsCs0ohpm7qrlXYZW0F0D3xFsHwAeDEs94
> QzAqdMjUfQorDJRqriPQwoGiBENKbp0pyDPGh8i25j4GdJV86A/2in+3dgCkeLT9
> MX++fId0aQKVfu+4NTsF9dbizNWF3y12kpjCEyam12exT9n+4Zj1+Uc2XBfAW2B6
> OAlzYfnOslaTKk+dn/gsDJlsBfrkUh+3z1FQodFOOf41HfCsN7rYuoJF5KUcA3vM
> WFCfXBKa0pEpnXPwJkdGnvf3Yk9rb03oB84cvRjuQfGmAI9+USro9hpjxjMrdI8=
> =Gqjj
> -END PGP SIGNATURE-

Ahh ok, I tried in the 

[qubes-users] Qubes 3.2RC2, AMD / IOMMU weirdness

2016-08-18 Thread Foppe de Haan
(XEN) PCI add device :00:09.0
(XEN) PCI add device :00:10.0
(XEN) PCI add device :00:10.1
(XEN) SR-IOV device :00:11.0 has its virtual functions already enabled 
(01ab)
(XEN) PCI add device :00:11.0
(XEN) PCI add device :00:12.0
(XEN) PCI add device :00:12.2
(XEN) PCI add device :00:13.0
(XEN) PCI add device :00:13.2
(XEN) PCI add device :00:14.0
(XEN) PCI add device :00:14.1
(XEN) PCI add device :00:14.2
(XEN) PCI add device :00:14.3
(XEN) PCI add device :00:14.4
(XEN) PCI add device :00:14.5
(XEN) PCI add device :00:18.0
(XEN) PCI add device :00:18.1
(XEN) PCI add device :00:18.2
(XEN) PCI add device :00:18.3
(XEN) PCI add device :00:18.4
(XEN) PCI add device :00:18.5
(XEN) PCI add device :01:00.0
(XEN) PCI add device :02:00.0
(XEN) PCI add device :03:00.0
(XEN) PCI add device :03:00.1
(XEN) PCI add device :04:06.0
Architecture:  x86_64
CPU op-mode(s):32-bit, 64-bit
Byte Order:Little Endian
CPU(s):4
On-line CPU(s) list:   0-3
Thread(s) per core:1
Core(s) per socket:4
Socket(s): 1
NUMA node(s):  1
Vendor ID: AuthenticAMD
CPU family:21
Model: 96
Model name:AMD Athlon(tm) X4 845 Quad Core Processor
Stepping:  1
CPU MHz:   3493.540
BogoMIPS:  6987.08
Hypervisor vendor: Xen
Virtualization type:   none
L1d cache: 32K
L1i cache: 64K
L2 cache:  1024K
NUMA node0 CPU(s): 0-3
Flags: fpu de tsc msr pae mce cx8 apic mca cmov pat clflush mmx 
fxsr sse sse2 ht syscall nx mmxext fxsr_opt lm constant_tsc rep_good nopl 
nonstop_tsc extd_apicid eagerfpu pni pclmulqdq ssse3 fma cx16 sse4_1 sse4_2 
movbe popcnt aes xsave avx f16c rdrand hypervisor lahf_lm cmp_legacy extapic 
cr8_legacy abm sse4a misalignsse 3dnowprefetch xop fma4 tce tbm perfctr_core 
perfctr_nb bpext arat cpb hw_pstate vmmcall fsgsbase bmi1 avx2 bmi2 xsaveopt
00:00.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 1576
00:00.2 IOMMU: Advanced Micro Devices, Inc. [AMD] Device 1577
00:02.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 157b
00:02.4 PCI bridge: Advanced Micro Devices, Inc. [AMD] Device 157c
00:02.5 PCI bridge: Advanced Micro Devices, Inc. [AMD] Device 157c
00:03.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 157b
00:03.1 PCI bridge: Advanced Micro Devices, Inc. [AMD] Device 157c
00:08.0 Encryption controller: Advanced Micro Devices, Inc. [AMD] Device 1578
00:09.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 157d
00:10.0 USB controller: Advanced Micro Devices, Inc. [AMD] FCH USB XHCI 
Controller (rev 03)
00:10.1 USB controller: Advanced Micro Devices, Inc. [AMD] FCH USB XHCI 
Controller (rev 03)
00:11.0 SATA controller: Advanced Micro Devices, Inc. [AMD] FCH SATA Controller 
[AHCI mode] (rev 40)
00:12.0 USB controller: Advanced Micro Devices, Inc. [AMD] FCH USB OHCI 
Controller (rev 11)
00:12.2 USB controller: Advanced Micro Devices, Inc. [AMD] FCH USB EHCI 
Controller (rev 11)
00:13.0 USB controller: Advanced Micro Devices, Inc. [AMD] FCH USB OHCI 
Controller (rev 11)
00:13.2 USB controller: Advanced Micro Devices, Inc. [AMD] FCH USB EHCI 
Controller (rev 11)
00:14.0 SMBus: Advanced Micro Devices, Inc. [AMD] FCH SMBus Controller (rev 13)
00:14.1 IDE interface: Advanced Micro Devices, Inc. [AMD] FCH IDE Controller
00:14.2 Audio device: Advanced Micro Devices, Inc. [AMD] FCH Azalia Controller 
(rev 01)
00:14.3 ISA bridge: Advanced Micro Devices, Inc. [AMD] FCH LPC Bridge (rev 11)
00:14.4 PCI bridge: Advanced Micro Devices, Inc. [AMD] FCH PCI Bridge (rev 40)
00:14.5 USB controller: Advanced Micro Devices, Inc. [AMD] FCH USB OHCI 
Controller (rev 11)
00:18.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 1570
00:18.1 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 1571
00:18.2 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 1572
00:18.3 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 1573
00:18.4 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 1574
00:18.5 Host bridge: Advanced Micro Devices, Inc. [AMD] Device 1575
01:00.0 Network controller: Qualcomm Atheros AR93xx Wireless Network Adapter 
(rev 01)
02:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 
PCI Express Gigabit Ethernet Controller (rev 0c)
03:00.0 VGA compatible controller: NVIDIA Corporation GM206 [GeForce GTX 950] 
(rev a1)
03:00.1 Audio device: NVIDIA Corporation Device 0fba (rev a1)
04:06.0 Mass storage controller: Promise Technology, Inc. PDC20268 [Ultra100 
TX2] (rev 02)


Qubes-HCL-BIOSTAR_Group-TA70U3_LSP-20160818-130127.yml
Description: Binary data
host   : dom0
release: 4.4.14-11.pvops.qubes.x86_64
version: #1 SMP Tue Jul 19 01:14:58 UTC 2016
machine: x86_64
nr_cpus: 4
max_cpu_id 

[qubes-users] OwnCloud-Client - wrong credentials

2016-08-18 Thread angelo "angico" costa
Hi, all!

- Qubes-os 3.1
- debian 8 based vm
- owncloud-client 1.77

I can quickly and easily login to my OwnCloud account using a webbrowser, 
whatever password I set on it, but I just can't connect using owncloud-client 
1.77 -- it refuses the connection yelling "Error: Wrong credentials".

Does anybody have any hint?

TIA,

Angico.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9c28591b-e0d7-45ee-94bb-44f8fb66bc8b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Building Archlinux Template Error

2016-08-18 Thread 'Jovan Miloskovski' via qubes-users
Hi,
I'm really learning all of this template building stuff right now but I've 
stumbled upon an error in the Archlinux qubes template building process I can't 
find a solution for.
Here is the segment of the error in my terminal output:

-> Building vmm-xen (archlinux) for archlinux vm (logfile: 
build-logs/vmm-xen-vm-archlinux.log)
--> build failed!
gcc -D_FORTIFY_SOURCE=2 -march=x86-64 -mtune=generic -O2 -pipe 
-fstack-protector-strong -O2 -fomit-frame-pointer -m64 -fno-strict-aliasing 
-std=gnu99 -Wall -Wstrict-prototypes -Wdeclaration-after-statement 
-Wno-unused-but-set-variable -Wno-unused-local-typedefs   -O2 
-fomit-frame-pointer -m64 -fno-strict-aliasing -std=gnu99 -Wall 
-Wstrict-prototypes -Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -D__XEN_TOOLS__ -MMD -MF .subdirs-install.d 
-D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE   -O2 -fomit-frame-pointer -m64 
-fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes 
-Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -D__XEN_TOOLS__ -MMD -MF .subdir-install-libxl.d 
-D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE   -O2 -fomit-frame-pointer -m64 
-fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes 
-Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -D__XEN_TOOLS__ -MMD -MF .libxl_create.o.d 
-D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE   -Werror -Wno-format-zero-length 
-Wmissing-declarations -Wno-declaration-after-statement -Wformat-nonliteral -I. 
-fPIC -pthread 
-I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/libxc/include
 -I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/include 
-I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/libxc/include
 -I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/include 
-I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/xenstore/include
 -I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/include   
-Wshadow -include 
/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/config.h  -c 
-o libxl_create.o libxl_create.c 
gcc -D_FORTIFY_SOURCE=2 -march=x86-64 -mtune=generic -O2 -pipe 
-fstack-protector-strong -O2 -fomit-frame-pointer -m64 -fno-strict-aliasing 
-std=gnu99 -Wall -Wstrict-prototypes -Wdeclaration-after-statement 
-Wno-unused-but-set-variable -Wno-unused-local-typedefs   -O2 
-fomit-frame-pointer -m64 -fno-strict-aliasing -std=gnu99 -Wall 
-Wstrict-prototypes -Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -D__XEN_TOOLS__ -MMD -MF .subdirs-install.d 
-D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE   -O2 -fomit-frame-pointer -m64 
-fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes 
-Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -D__XEN_TOOLS__ -MMD -MF .subdir-install-libxl.d 
-D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE   -O2 -fomit-frame-pointer -m64 
-fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes 
-Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -D__XEN_TOOLS__ -MMD -MF .libxl_dm.o.d 
-D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE   -Werror -Wno-format-zero-length 
-Wmissing-declarations -Wno-declaration-after-statement -Wformat-nonliteral -I. 
-fPIC -pthread 
-I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/libxc/include
 -I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/include 
-I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/libxc/include
 -I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/include 
-I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/xenstore/include
 -I/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/include   
-Wshadow -include 
/home/user/qubes-src/vmm-xen/src/xen-4.6.1/tools/libxl/../../tools/config.h  -c 
-o libxl_dm.o libxl_dm.c 
gcc -D_FORTIFY_SOURCE=2 -march=x86-64 -mtune=generic -O2 -pipe 
-fstack-protector-strong -O2 -fomit-frame-pointer -m64 -fno-strict-aliasing 
-std=gnu99 -Wall -Wstrict-prototypes -Wdeclaration-after-statement 
-Wno-unused-but-set-variable -Wno-unused-local-typedefs   -O2 
-fomit-frame-pointer -m64 -fno-strict-aliasing -std=gnu99 -Wall 
-Wstrict-prototypes -Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -D__XEN_TOOLS__ -MMD -MF .subdirs-install.d 
-D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE   -O2 -fomit-frame-pointer -m64 
-fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes 
-Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -D__XEN_TOOLS__ -MMD -MF .subdir-install-libxl.d 
-D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE   -O2 -fomit-frame-pointer -m64 
-fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes 
-Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   

Re: [qubes-users] Routing network traffic in sys-usb using multiple devices

2016-08-18 Thread Adrian Rocha
El jueves, 18 de agosto de 2016, 9:45:44 (UTC-6), Marek Marczykowski-Górecki 
escribió:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Thu, Aug 18, 2016 at 08:25:34AM -0700, Adrian Rocha wrote:
> > El viernes, 12 de agosto de 2016, 2:34:52 (UTC-6), Marek 
> > Marczykowski-Górecki escribió:
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA256
> > > 
> > > On Thu, Aug 11, 2016 at 11:07:54AM -0700, Adrian Rocha wrote:
> > > > Hi,
> > > > 
> > > > I have two network devices and one only USB controller, so both devices 
> > > > are in the same VM (sys-usb). I want to route some app-VMs by one 
> > > > network and the rest by the other network, for that I have created two 
> > > > firewall VMs but both are connected to the same network VMs because, as 
> > > > I commented, I can not divide the network devices in different VMs.
> > > > By default all the traffic is going by only one network device. This is 
> > > > the configuration in my sys-usb:
> > > > 
> > > > [user@sys-usb ~]$ ip route list 
> > > > default via 172.20.1.1 dev enp0s0u2  proto static  metric 100 
> > > > default via 192.168.8.1 dev enp0s0u3  proto static  metric 101 
> > > > 10.137.4.8 dev vif2.0  scope link  metric 32750 
> > > > 10.137.4.29 dev vif9.0  scope link  metric 32743 
> > > > 172.20.0.0/21 dev enp0s0u2  proto kernel  scope link  src 172.20.2.255  
> > > > metric 100 
> > > > 192.168.8.0/24 dev enp0s0u3  proto kernel  scope link  src 
> > > > 192.168.8.100  metric 100 
> > > > 
> > > > The firewall IPs are 10.137.4.8 and 10.137.4.29
> > > > 
> > > > I know how to route a traffic to an specific IP using "ip route add" to 
> > > > a determined device network, but How can I route the complete traffic 
> > > > from one firewall VM by one device network and the traffic from other 
> > > > firewall VM by the other device network?
> > > 
> > > Source based-routing is tricky in Linux in general. You can search for
> > > some guides on the internet.
> > > 
> > > But alternatively, on Qubes R3.2, you can assign one of those USB
> > > devices to different VM - some separate netvm, or even one of those
> > > firewallvms directly (and do not attach this firewallvm to any netvm).
> > > It may work slightly slower, but should be much easier.
> > 
> > Thanks for your tip Marek, but I am having an error with the USB assign:
> > 
> > The ethernet adapter in the sys-usb VM:
> > [user@sys-usb ~]$ lsusb
> > ...
> > Bus 005 Device 002: ID 0b95:1790 ASIX Electronics Corp. AX88179 Gigabit 
> > Ethernet
> > ...
> > 
> > And when I try to assing them to the sys-net VM in dom0:
> > [user@dom0 ~]$ qvm-usb 
> > sys-usb:4-6 06cb:1ac3 SYNAPTICS_Synaptics_Large_Touch_Screen
> > sys-usb:5-2 0b95:1790 ASIX_Elec._Corp._AX88179_:9
> > sys-usb:4-9 8087:07dc 8087_07dc
> > sys-usb:4-110bda:573c 
> > CN0Y2TKG7248741DA3RDA00_Integrated_Webcam_HD_200901010001
> > [user@dom0 ~]$ qvm-usb -a sys-net sys-usb:5-2
> > ERROR: Device attach failed: /usr/lib/qubes/usb-import: line 51: printf: 
> > write error: Invalid argument
> > 
> > Any idea or a detailed reference about this functionality?
> 
> Check kernel messages in sys-net. It looks like kernel driver rejects
> this device for some reason.
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJXtdghAAoJENuP0xzK19csjmEH/RKN1Wo8EsllAJ0jUfHcp4AP
> GtjhLUYdU+zM2b+h37CLqGCLJ98Eeh4J/CMTH4B7MD6Y5TbCsJNfSxlLYfduPC4Y
> zQa/MCDQ09Rof/iipT6SSXX/vRG+NyO+ssMWZM2URjGO0/IXyf0+RM7BI8syPq/L
> FoNXyJU36F8BNAcihQZIJ1pDwj1gfEz8JJUEhX1rQgSvjUm7mmdpV2DCF1fYZ/OS
> LsIBGrz+Ugja7dcYhwcxz1VkpXwPvExI/JceiLvlNxILwRaBtaBPMbX23CmknvB8
> T31N1IgJSxUQDgcPEhgu8MpHFyHmR5XhCQZmAJ+eMimhDdv4faLTCr2NKvXCSlg=
> =/uUW
> -END PGP SIGNATURE-

This is the message in sys-net:
[ 3116.501714] vhci_hcd: Failed attach request for unsupported USB speed: 
super-speed

And I see this in sys-usb:
[ 3095.918081] usbip-host 5-2: stub up
[ 3095.920893] usbip-host 5-2: recv a header, 0
[ 3096.023678] usbip-host 5-2: reset SuperSpeed USB device number 2 using 
xhci_hcd
[ 3096.038562] usbip-host 5-2: device reset

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77b825ce-54ed-4b2e-bf47-734c6b58cacc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Routing network traffic in sys-usb using multiple devices

2016-08-18 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Aug 18, 2016 at 08:25:34AM -0700, Adrian Rocha wrote:
> El viernes, 12 de agosto de 2016, 2:34:52 (UTC-6), Marek Marczykowski-Górecki 
> escribió:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> > 
> > On Thu, Aug 11, 2016 at 11:07:54AM -0700, Adrian Rocha wrote:
> > > Hi,
> > > 
> > > I have two network devices and one only USB controller, so both devices 
> > > are in the same VM (sys-usb). I want to route some app-VMs by one network 
> > > and the rest by the other network, for that I have created two firewall 
> > > VMs but both are connected to the same network VMs because, as I 
> > > commented, I can not divide the network devices in different VMs.
> > > By default all the traffic is going by only one network device. This is 
> > > the configuration in my sys-usb:
> > > 
> > > [user@sys-usb ~]$ ip route list 
> > > default via 172.20.1.1 dev enp0s0u2  proto static  metric 100 
> > > default via 192.168.8.1 dev enp0s0u3  proto static  metric 101 
> > > 10.137.4.8 dev vif2.0  scope link  metric 32750 
> > > 10.137.4.29 dev vif9.0  scope link  metric 32743 
> > > 172.20.0.0/21 dev enp0s0u2  proto kernel  scope link  src 172.20.2.255  
> > > metric 100 
> > > 192.168.8.0/24 dev enp0s0u3  proto kernel  scope link  src 192.168.8.100  
> > > metric 100 
> > > 
> > > The firewall IPs are 10.137.4.8 and 10.137.4.29
> > > 
> > > I know how to route a traffic to an specific IP using "ip route add" to a 
> > > determined device network, but How can I route the complete traffic from 
> > > one firewall VM by one device network and the traffic from other firewall 
> > > VM by the other device network?
> > 
> > Source based-routing is tricky in Linux in general. You can search for
> > some guides on the internet.
> > 
> > But alternatively, on Qubes R3.2, you can assign one of those USB
> > devices to different VM - some separate netvm, or even one of those
> > firewallvms directly (and do not attach this firewallvm to any netvm).
> > It may work slightly slower, but should be much easier.
> 
> Thanks for your tip Marek, but I am having an error with the USB assign:
> 
> The ethernet adapter in the sys-usb VM:
> [user@sys-usb ~]$ lsusb
> ...
> Bus 005 Device 002: ID 0b95:1790 ASIX Electronics Corp. AX88179 Gigabit 
> Ethernet
> ...
> 
> And when I try to assing them to the sys-net VM in dom0:
> [user@dom0 ~]$ qvm-usb 
> sys-usb:4-6 06cb:1ac3 SYNAPTICS_Synaptics_Large_Touch_Screen
> sys-usb:5-2 0b95:1790 ASIX_Elec._Corp._AX88179_:9
> sys-usb:4-9 8087:07dc 8087_07dc
> sys-usb:4-110bda:573c 
> CN0Y2TKG7248741DA3RDA00_Integrated_Webcam_HD_200901010001
> [user@dom0 ~]$ qvm-usb -a sys-net sys-usb:5-2
> ERROR: Device attach failed: /usr/lib/qubes/usb-import: line 51: printf: 
> write error: Invalid argument
> 
> Any idea or a detailed reference about this functionality?

Check kernel messages in sys-net. It looks like kernel driver rejects
this device for some reason.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXtdghAAoJENuP0xzK19csjmEH/RKN1Wo8EsllAJ0jUfHcp4AP
GtjhLUYdU+zM2b+h37CLqGCLJ98Eeh4J/CMTH4B7MD6Y5TbCsJNfSxlLYfduPC4Y
zQa/MCDQ09Rof/iipT6SSXX/vRG+NyO+ssMWZM2URjGO0/IXyf0+RM7BI8syPq/L
FoNXyJU36F8BNAcihQZIJ1pDwj1gfEz8JJUEhX1rQgSvjUm7mmdpV2DCF1fYZ/OS
LsIBGrz+Ugja7dcYhwcxz1VkpXwPvExI/JceiLvlNxILwRaBtaBPMbX23CmknvB8
T31N1IgJSxUQDgcPEhgu8MpHFyHmR5XhCQZmAJ+eMimhDdv4faLTCr2NKvXCSlg=
=/uUW
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160818154536.GJ9166%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Routing network traffic in sys-usb using multiple devices

2016-08-18 Thread Adrian Rocha
El viernes, 12 de agosto de 2016, 2:34:52 (UTC-6), Marek Marczykowski-Górecki 
escribió:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Thu, Aug 11, 2016 at 11:07:54AM -0700, Adrian Rocha wrote:
> > Hi,
> > 
> > I have two network devices and one only USB controller, so both devices are 
> > in the same VM (sys-usb). I want to route some app-VMs by one network and 
> > the rest by the other network, for that I have created two firewall VMs but 
> > both are connected to the same network VMs because, as I commented, I can 
> > not divide the network devices in different VMs.
> > By default all the traffic is going by only one network device. This is the 
> > configuration in my sys-usb:
> > 
> > [user@sys-usb ~]$ ip route list 
> > default via 172.20.1.1 dev enp0s0u2  proto static  metric 100 
> > default via 192.168.8.1 dev enp0s0u3  proto static  metric 101 
> > 10.137.4.8 dev vif2.0  scope link  metric 32750 
> > 10.137.4.29 dev vif9.0  scope link  metric 32743 
> > 172.20.0.0/21 dev enp0s0u2  proto kernel  scope link  src 172.20.2.255  
> > metric 100 
> > 192.168.8.0/24 dev enp0s0u3  proto kernel  scope link  src 192.168.8.100  
> > metric 100 
> > 
> > The firewall IPs are 10.137.4.8 and 10.137.4.29
> > 
> > I know how to route a traffic to an specific IP using "ip route add" to a 
> > determined device network, but How can I route the complete traffic from 
> > one firewall VM by one device network and the traffic from other firewall 
> > VM by the other device network?
> 
> Source based-routing is tricky in Linux in general. You can search for
> some guides on the internet.
> 
> But alternatively, on Qubes R3.2, you can assign one of those USB
> devices to different VM - some separate netvm, or even one of those
> firewallvms directly (and do not attach this firewallvm to any netvm).
> It may work slightly slower, but should be much easier.

Thanks for your tip Marek, but I am having an error with the USB assign:

The ethernet adapter in the sys-usb VM:
[user@sys-usb ~]$ lsusb
...
Bus 005 Device 002: ID 0b95:1790 ASIX Electronics Corp. AX88179 Gigabit Ethernet
...

And when I try to assing them to the sys-net VM in dom0:
[user@dom0 ~]$ qvm-usb 
sys-usb:4-6 06cb:1ac3 SYNAPTICS_Synaptics_Large_Touch_Screen
sys-usb:5-2 0b95:1790 ASIX_Elec._Corp._AX88179_:9
sys-usb:4-9 8087:07dc 8087_07dc
sys-usb:4-110bda:573c 
CN0Y2TKG7248741DA3RDA00_Integrated_Webcam_HD_200901010001
[user@dom0 ~]$ qvm-usb -a sys-net sys-usb:5-2
ERROR: Device attach failed: /usr/lib/qubes/usb-import: line 51: printf: write 
error: Invalid argument

Any idea or a detailed reference about this functionality?

> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJXrYojAAoJENuP0xzK19csd1AH/0xLELbOxgJSEbwImKU7OrYM
> JVLl1hqGNx1iAy/6BGiV3IK0/CawomzVtoUcLli20WxTSjMqrrkoet5bRxWmZdYb
> LWg2eHAjbFSL4hi20Rg6VPeYcFSy3BQH42YpfQnU2xlPjSXCCAJHfIbRsQpNJ8i3
> HPXcHfr3Gb1LqljgHjW/wrHzqc7T4uu4wGu28bPwow1EcSuVX8Ag7NZBeeqC1eDa
> TjUOcmRXuY6BB7ofp2qzJQQBPHSMHdGM7G7QEEdxx1xy9E3knfs2i1HWKf2haR2s
> uVfrCqsSjaTaoHFD3QSNk7gM6M6J1Eku9LUA4xosbbvN+H++O1jPfzXw98eXbxE=
> =nMKF
> -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9a28a599-886f-473a-8f3e-62e9dee836e4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 Hardware Requirements

2016-08-18 Thread johnyjukya
The Qubes security team has written:

> Consequently, we have decided to move to hardware memory
> virtualization for the upcoming Qubes 4.0 release [4].

And Joanna has written:

> For Qubes 4 we want to move away from using PV as the default
> method of virtualization in favor of using hw-aided (i.e.
> SLAT-enforced) virtualization, which currently Xen offers as PVH.

I'm currently on an AMD Athlon system.  Does this mean that in order to
use Qubes 4.0, I will have to upgrade my hardware?  ('Cause that would
suck. :) )

Thanks.

JJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/94abcb654fb090a8e6471bc88ef47f53.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] USB Root Drive Corruption

2016-08-18 Thread johnyjukya
This problem persists in 3.2rc2.

(And I get 0 errors on the same USB drive under Tails.  When I can find
the SATA power connector around here somewhere, I'll try moving the drive
direct onto the SATA bus.)

> Thanks for the feedback.  The fact USB is a bad idea all around for
> security (and potentially stability), and the fact I was getting minor
> corruption, should have been a warning to me to move the drive right onto
> the SATA bus, rather than risking worse corruption.  I guess I only have
> myself to blame.
>
> I guess I'll "get back on the horse," lol, with the 3.2 release candidate,
> and an internal drive.  Qubes offers enough to keep on tryin'.
>
> Thankfully I run things in a relatively "amnesiac" fashion to start with,
> so any useful or valuable data was on a separate, internal, encrypted hard
> drive, and unharmed.
>
> Thanks.
>
>> johnyju...@sigaint.org:
>>> Well, my wild enthusiasm with Qubes has turned into complete
>>> frustration
>>> and exasperation this morning.
>>>
>>> The "mild" corruption I was seeing on boot (running Qubes from a USB
>>> 2.5"
>>> HD) wasn't quite so mild the last time I booted.
>>>
>>> This time, rather than "recovering journal... done," the fsck spewed
>>> more
>>> than I've ever seen an fsck spew, and the filesystem was trashed.  /var
>>> ended up as a symlink to liblber-2.4.so.2.10.2.  I found /var/lib/qubes
>>> in
>>> lost+found (along with 350 other directories).  Argh!
>>>
>>> I'd highly recommend that nobody run Qubes 3.1 from an external USB
>>> drive.
>>>
>>> I'm going back to another OS as my daily system.
>>>
>>> I'll probably give Qubes 3.2rc a try on an internal hard drive, as a
>>> secondary OS, to see if that solves my HD and video corruption issues.
>>> If
>>> not, I'll probably wait for Qubes to mature a bit more before using it
>>> in
>>> any serious manner.
>>
>> I've run Qubes 3.0rc1 and Qubes 3.2rc1 from an external USD hard drive
>> (for about a month each).  3.0rc1 encountered kernel panics about once
>> per day (which wasn't the case when run from an internal drive) and
>> booted much slower than from an internal drive, but I didn't notice any
>> obvious drive corruption from it.  3.2rc1 had no issues whatsoever and
>> wasn't much slower than internal.  I haven't tried any release of 3.1.
>>
>> So, my guess is that the issue you're encountering either was fixed
>> between 3.1 and 3.2rc1 (and didn't seem to exist in 3.0rc1), or is in
>> some way unique to your setup.  Maybe a hardware issue?
>>
>> Cheers,
>> -Jeremy Rand
>>
>> --
>> You received this message because you are subscribed to the Google
>> Groups
>> "qubes-users" group.
>> To unsubscribe from this group and stop receiving emails from it, send
>> an
>> email to qubes-users+unsubscr...@googlegroups.com.
>> To post to this group, send email to qubes-users@googlegroups.com.
>> To view this discussion on the web visit
>> https://groups.google.com/d/msgid/qubes-users/df5ff24c-c6ce-8dda-dfac-5f07bea4f9c0%40airmail.cc.
>> For more options, visit https://groups.google.com/d/optout.
>>
>
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/242ab62b9fdfba9c77ebf9748842b412.webmail%40localhost.
> For more options, visit https://groups.google.com/d/optout.
>


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a81af3ff3636f8193043810d9c82678.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] networking issues

2016-08-18 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Aug 17, 2016 at 02:35:20PM -0700, randallrba...@gmail.com wrote:
> i have a bcm 4360 wireless card  on my motherboard and I cant seam to get the 
> drivers installed. I was told to install this to net vm  [CODE]wget 
> http://git.io/vuLC7 -v -O fedora23_broadcom_wl_install.sh && sh 
> ./fedora23_broadcom_wl_install.sh;[/CODE]  but I ended up getting this mess
> 
> [CODE][user@sys-net ~]$ wget http://git.io/vuLC7 -v -O 
> fedora23_broadcom_wl_install.sh && sh ./fedora23_broadcom_wl_install.sh;

(...)

> Package gcc-5.3.1-6.fc23.x86_64 is already installed, skipping.
> Package kernel-devel-1000:4.1.24-10.pvops.qubes.x86_64 is already installed, 
> skipping.

Here you have kernel-devel for 4.1.24, but ...

(...)

> KBUILD_NOPEDANTIC=1 make -C /lib/modules/`uname -r`/build M=`pwd` clean
> make[1]: *** /lib/modules/4.1.13-9.pvops.qubes.x86_64/build: No such file or 
> directory.  Stop.
> Makefile:165: recipe for target 'clean' failed
> make: *** [clean] Error 2

... you're running 4.1.13-9. You can change kernel version for this VM
in VM settings. Or you can simply update kernel-devel package.

But that's not all:

> install -D -m 755 wl.ko /lib/modules/`uname -r`/kernel/drivers/net/wireless
> install: cannot create regular file 
> ‘/lib/modules/4.1.13-9.pvops.qubes.x86_64/kernel/drivers/net/wireless/wl.ko’: 
> Read-only file system

/lib/modules/(kernel version) is mounted read-only, so you can't modify
it. You can either switch to in-VM kernel[1], or keep that module
(`wl.ko`) in some other directory and load it using `insmod
/path/to/wl.ko`. The former method will require somehow more work, but
will be easier to maintain later.

[1] https://www.qubes-os.org/doc/managing-vm-kernel/#tocAnchor-1-1-3

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXtXpfAAoJENuP0xzK19csTxYH/3WqnU86tz8zN2XxTWpE9G2+
Ig3ENybBgocEr4CoWxuL2CG0uDVsLDaqsAf/R7YWGJ1SHtFCrBtAVh0RWcQqcuAG
PmnwO5BqcbXJCxyyNZQqzh6c6rWAxd1Hfhs/eTO1l28iAe4UQFTMG3At20kGigVY
A2EYudYPtc54/ByaEYQ9upqmyN9kLmXS+Kuo9mKRn2+A+BvJmzXeJ7iAkeyCtP7N
hJnbvwX0I7rVC1CMPm6yfHp1716klQcI1i1//FmxAEd/kcSXBoMRxjvD6LpIwsF/
sqI16ppiUPc+RHQBp2oO/hhgc2jb8x7L6iKFoeVJFlKJcjx5zaNGdrqWFA4MYm4=
=Dm91
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160818090535.GE9166%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Problems with GUI Agent on Windows (was: Lenovo Thinkpad P50 Qubes)

2016-08-18 Thread anton . doxid
On Friday, July 1, 2016 at 7:27:50 PM UTC+2, Peter M wrote:
> On Sunday, June 19, 2016 at 5:08:09 PM UTC-6, derfa...@gmail.com wrote:hi 
> fellow p50ers,
> 
> 
> 
> On Monday, May 16, 2016 at 2:25:07 PM UTC+2, Achim Patzner wrote:
> 
> > > Am 16.05.2016 um 12:57 schrieb derfa...@gmail.com:
> 
> > > 
> 
> > > on another note, i finally ended up deleting my usbvm. it would only come 
> > > up every third or fourth reboot, and if it didn't, i was not able to 
> > > start it up manually.
> 
> > 
> 
> > The P70 has the same problem after updating the firmware to version 2.00; 
> > there seems to be some race condition affecting bus initialization and 
> > management engine/firmware. Waiting with entering the disk passphrase 
> > helps, turning the machine off before booting helps, too. Not auto-starting 
> > it doesn’t change anything so I’d expect it to be a Xen problem.
> 
> 
> 
> i can happily confirm that this usb-vm issue seems to be resolved in qubes 
> R3.2-rc1. also, i updated the BIOS to 1.26 and, after reading in the lenovo 
> forums, updated the thunderbolt firmware to the latest version, which fixed 
> the HDMI output issue for me.
> 
> 
> 
> Qubes R3.2 will fully support the Lenovo P50 out of the box! :D
> 
> 
> 
> best,
> 
> 
> 
> fake
> 
> 
> 
> 
> 
> 
> Did you install it in EFI mode or without? Did you do clean install or 
> upgrade?
> Tried doing clean install of 3.2 RC1 and it installs fine but when I select 
> Qubes on boot list it comes straight back.
> 
> Any ideas?

I sloved this issue after a HDD change.
The original disk broke so i swapped it for a Skylake compatible NVMe M.2 SSD.
Turns out, the BIOS will treat this drive slightly differently and there for 
qubes will as well.

Either it's because the UUID keeps changing each boot and Qubes old core won't 
deal with this at all, or it's because it's simply the driver that's so "new" 
Fedora doesn't support it.

Either way, this gave me the looping boot option menu when booting.

---

Here's also the BIOS settings I've changed since factory defaults:

Config -> Display:
Total Graphics Memory = 512Mb
Graphics Device = Discrete

Security -> Virtualization:
Virt. Tech. = Enabled
VT-d = Enabled

Security -> Secure Boot :
 Secure Boot = Disabled

Startup -> UEFI/Legacy Boot:
Mode = Both
UEFI/Leg. Prio = Legacy First
CSM Support = Yes


--

Additional note regarding **hybrid vs discrete** graphics.
You can without any "problems" use dedicated discrete graphics, what you might 
need to do is to build qubes on your own and edit 
./qubes-builder/qubes-src/installer-qubes-os/livecd-creator-qubes and on the 
"kernel = " line, at the end add "nomodeset" and you should be fine.

Again, this won't give you the nvidia driver per default from what understand 
but the graphics will be slightly sharper and snappier. It will also drain your 
battery quicker but hey, quick graphics and no lag is kinda awesome.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/133a1644-ba49-4249-ad41-5ed7fd2fb4bb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Altering the backup engine.

2016-08-18 Thread Drew White
On Thursday, 18 August 2016 16:03:26 UTC+10, Alex  wrote:
> It looks like the Qubes Manager has an internal app for backup in
> /usr/lib64/python2.7/site-packages/qubesmanager/backup.py, that manager
> the window-based wizard, and uses the generic backup tool in
> /usr/lib64/python2.7/site-packages/qubes/backup.py to get the job done.
> 
> At the beginning of the latter I can see some definitions like
> "DEFAULT_COMPRESSION_FILTER = 'gzip'", I think you may want to check
> there. The compression filter defined there is passed to the command
> line of various tar executions with --use-compress-program=%s.
> 
> I don't think it is intented to be actually changed by users via the
> GUI, but the fact that it has been moved to a definition at the
> beginning of the file and that it is named "DEFAULT" may indicate that
> is is intended to be customizable in a possible future extension.
> 
> -- 
> Alex

I just didn't understand how it went about it, it actually calls the qvm-backup 
from there. so it's already set up, but I don't think the program will use what 
I want because the tool I use is working differently for the passing of data to 
be compressed.

But now I know how it does it, I will just build a unit for that to work for 
the one I use as well, not just the default.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/13de45d2-e4dd-4567-8802-352f2d19247e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Altering the backup engine.

2016-08-18 Thread Alex
On 08/18/2016 07:52 AM, Drew White wrote:
> Hi folks,
> 
> Any davs here able to tell me how to set Qubes Manager default to use
> a different archiving method other than gzip ?
> 
> gzip is the default, but I don't know how or where to change it in
> the manager code, I've tried to find the command it uses, but I'm
> unable to find the command anywhere. Either I'm not looking in the
> right place, or the command isn't what I believe it is.
> 
> Please help?
> 
> Sincerely Drew.
It looks like the Qubes Manager has an internal app for backup in
/usr/lib64/python2.7/site-packages/qubesmanager/backup.py, that manager
the window-based wizard, and uses the generic backup tool in
/usr/lib64/python2.7/site-packages/qubes/backup.py to get the job done.

At the beginning of the latter I can see some definitions like
"DEFAULT_COMPRESSION_FILTER = 'gzip'", I think you may want to check
there. The compression filter defined there is passed to the command
line of various tar executions with --use-compress-program=%s.

I don't think it is intented to be actually changed by users via the
GUI, but the fact that it has been moved to a definition at the
beginning of the file and that it is named "DEFAULT" may indicate that
is is intended to be customizable in a possible future extension.

-- 
Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7619c646-0f65-ff58-4bee-d12759b8ab3e%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature