[qubes-users] Qubes 3.2-rc3 RAID and nvme
I installed Qubes 3.2-rc3 on my Lenovo P50 (Xeon ECC laptop) It works, but I had to disable RAID in the bios and use lvm striping. The raid disks don't seem to show up at all. The bios doesn't have a storage remapping option ( https://communities.intel.com/thread/102395 ) I'm guessing this is a bios issue. I installed with software RAID and lvm raid0 with success, expect the EFI won't boot. I was able to boot with rEFInd on a USB, but I can't figure out how to install it permanently. ( https://www.reddit.com/r/Qubes/comments/4onsfe/qubes_os_32_rc1_has_been_released/d4mi1mn ) I'm installing Qubes 3.1 now to see if it will work. Hopefully the final 3.2 can EFI boot on nvme SSDs. Any help is greatly appreciated. I'm loving this software!! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/806b5285-fb41-412d-9cd8-b037ab107a16%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't connect a VPN before Tor
On 09/08/2016 04:41 AM, nishiwak...@gmail.com wrote: Hello, I am struggling to have VPN work while using it with Tor, I can't have both work. I tried first to follow Mrs. Rutkowska's tutorial on setting up a clear Tor proxyVM https://theinvisiblethings.blogspot.de/2011/09/playing-with-qubes-networking-for-fun.html but unfortunately I can't make it work. "QUBES_IP=$(xenstore-read qubes_ip)" line doesn't seem to work. If I replace "(xenstore-read qubes_ip)" with proxyVM's IP then script works but then I have to set up /etc/tor/torrc to achieve to connect Tor Browser in another AppVM. I guess this setup is too complicated for me. Then I read whonix documentation https://www.whonix.org/wiki/Tunnels/Connecting_to_a_VPN_before_Tor, to check what I need to do to avoid reinstalling my VPN into a whonix gateway and just use it as a proxy VM before Tor. Although its straightforward to get the opposite working (Tor -> VPN -> Internet -- just follow the Qubes vpn doc and connect sys-whonix to the vpn vm) there are wrinkles to iron out when getting it to work as you describe. Since the solution is Tor-specific, probably the best place to start is trying create the whole setup in Whonix-Qubes using the Whonix doc you referenced. The Whonix forum should be able to help you with any specific issues when following their directions. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/eb206f33-67e9-5ddb-f59b-26a4d4df09fa%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Start VM automatically on boot not working
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-09 15:00, kotot...@gmail.com wrote: > Searching in the output of journactl gives the following errors: > > Failed to start Start Qubes VM Unit entered failed state Failed > with result 'exit-code' internal error: Unable to reset PCI device > [...] no FLR, PM reset or bus reset available. > Try this: https://www.qubes-os.org/doc/user-faq/#i-created-a-usbvm-and-assigned- usb-controllers-to-it-now-the-usbvm-wont-boot - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX0zwDAAoJENtN07w5UDAw9f0P/j3mHmZCxLH0w5nqXo94unmi fj7c12nMOM7yVA6IOYbq2xEQ1/UHfqcM/Fj0Im3GIb39Ny7t8Jt8mC7byZ51IkNY 6JNJAeqzFJyqsTT95PHyCgBobqEGBDfoIpwhBHmWnT6D7EF6P9kLOOH7XyA1JQ/N kGXqLgh+0wpOKHuA6yc+6mcxorU/L5s24e4Qp7HMkJ8bYPemaQASOsyq3aOilu9S BkEkXXZO4msJEbJEEEpTRKgNaiwJjmsDjGkvYXydKk53Ji2yj1L8yA+iIzU2RjzO /Saiv++BwFHP722nxYei3Q6InsQ6FtHifLFqMRdaIxIi3AOweFmDF/m0FghixKuU /RFrSKYub6UekFvGuYK5tekRtZUvMTTHGmSDPyMy9Ra30qIYvuqoacqeDVqh9X3J bEMreuEaZ3uK9Oh+PXb6uFpW4MAFkXZRh6MSNqZuKsTIz6HwGXxFRRqsDQbJCsXA odCvfPeBNg2jYpVs9eOqpmDnchNFVGf5fXI+/QLdJJRkAFdFiQZNa4Qq3i2ZH4px +bT0+cqXs0ZPhPRukystoDvtfkCcz7GjvkSfdcDhF6hf388ifJVp/UAaHoFzvphs drfwBmWL9HUW+pzwRll4HbDRH1pr2OvEBvxrAzprxilWeFJklMJD/elRspENE3S5 IiHkReOKV28uOTVplxr1 =odQW -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d9478879-894f-2fd3-f09c-5a1e35f5145a%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Installation problems?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-09 13:48, Jodie wrote: > Version 3.1. What's annoying me is that I can't figure out why this > is happening. I even have a terrible photo of the install error if > you want to see it. > > I'm inclined to think that I'm doing something wrong, but can't > tell what it is that I'm doing wrong. > Yes, please share the photo of the error. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX0zueAAoJENtN07w5UDAwLvoQAMwMe9q/Ka/2Thu2Xjp8ED8o p8gSbI02mPYan/Ze9MgaC70uQmrKL/rGmZbn0BqisrdzavjZmdwK266BjpnTF3Fj zmeqUidw6v2+cXE118B6m/Js4+x86dP9aR2iExAYMaOpoDlfg2LdQ1GuMxBTZvT2 F7/Nic38pG/7MbCLN+awea2NOjqDbNUNLIiHbMHi6NjXSBf/LNLhKMMQI8OW lIF4/y9JNG6wKeTBRxBY25cCZ/PQGJEW4W1dN8b7XBfzl0Nqw6mw6msvMiEcm8lf G2I/lMYtsE9/XX6KzXk5J5aU87bx4vLG3KnJ71qHaT6NWb+0k62ebn8XTWlkRxC8 R95bn9y0qRUknwPgEV8nIHCA8JfTX7HifW98t60CIhjaUGSGrvCIbYN/kEAbpD0T Sp8o8C3hW0rAc5Jy8uY+4uybZGnxY1E0fXCnXZM/SdwUVmhbHEZdxQ03hQOFLG96 fy47mXaBs4IIsInnGXdDw2hX3unEnaG/WOe/PyV0OjFuoObuGYsrZaUEmoi04y2Q pZ++nW02BRVgnAJmO3Qkw8++qKjBwdAxlE9YhmURw6T/qrm6POQR0pEFvr2tTxfm XLtDb11HI31JOxraD0TbEyqgNywS+/bDAhE/wE4+I1Wxmor1Ok63Rh8lUdFz8nmp FcM9IZB9JozLqrZ+WCtU =BQvH -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dadc8854-a8a3-d1d1-d3b7-131709696568%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Start VM automatically on boot not working
and further: libvirt.libvirtError: Requested operation is not valid: Domain is already running. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a473a522-c780-498c-b110-493a375d5c88%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Installation problems?
Version 3.1. What's annoying me is that I can't figure out why this is happening. I even have a terrible photo of the install error if you want to see it. I'm inclined to think that I'm doing something wrong, but can't tell what it is that I'm doing wrong. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/93bf1165-16fc-423c-a91f-1b7e66079f48%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Fresh Install - Cannot Ping out
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-09 13:31, Eric Herron wrote: > Forgive me, I have tried to check the documentation but I am not > getting anywhere. > > I am testing out Qubes and I have a fresh install. > > When pinging out from any VM, I dont get anywhere. I cannot browse > or anything. > Does that include sys-net? If so, it's possible that you're missing drivers for your NIC, for example. You may have to download the packages from a different machine, then manually transfer them over to install in the TemplateVM on which sys-net is based. > The ifconfig of the VMs show a 10.137.3.x network where my actual > network is the standard 192.168.1.x > This is normal. It has to do with Qubes' internal networking. > Am I missing something in enabling the network interfaces? > It should normally "just work." If it's not, then it's likely a hardware compatibility issue (see above). - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX0x3AAAoJENtN07w5UDAwHOAP/3bVzVMHZJ/1U3xPt0scyCDY KZzK3oTMJLkq4FbtjrbxJ7O0Vf+BqWBfEfjNi4y7pyAUykIGFCF5tBdgaw6m5wrq qD7QF1SRVO5/tmd6LRvt8hNc3FIu+Fx70RlOgWdUD9PF8nhkwFTuisQ5lZ/+BH/f narRHuUjT7BaM0red3attuj8dSCYVDB807cYuuFZbaWwn2hSNKlFraDr/8BciAJN uBjpHIjxZ4G2elntLZEQZmF8rw1QbW9WUFFz74OeqwkPe+wNDVb0ngLIlBBBqbDy YstsXeWc0eV11x0pAiYv0ruyBaaAldJ8v4/ZhdulpVmEX2E0fOlvqsAjWfm2wBOF PBDxCF2UCZZnGwOrmdWadwqTyZWx09AduGvNeB51S1x3ilzuaLY2kBDJjG2gM87A uu9coQ3NrwoaL2sTqnVi7HB0CwgrqIk+FRZkY8mbn4HAEtFNDoY3IUwNcO5P7xhZ r2V1Sd0jXX2yWotqjIg7Io4fuAeCnba9wyR8CLEkt2Vz8dgf6qBiKbrFQdscOBVO jV+ohJzY8IO9VWylH9Tjo2VxVwE48Ha5Ymr9RiWCS9hKwCZh2GlBCzFbhp8v9C9t SMqy46LPZjuzAoaUEJrvXJajgNiJvKsv+U3tTrhHgrV6gAZjYVN4Rr3p2YcK4PCu V5Lt/0dJ46qH6xFn0h9M =XCww -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/370ef180-30fc-bfa7-0bac-96b48a541f5d%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Start VM automatically on boot not working
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-09 13:30, kotot...@gmail.com wrote: > Hello, > > After cloning sys-firewall into sys-vpn-firewall with qvm-clone in > dom0, and selection "Start VM automatically on boot not working " > in the preferences of sys-vpn-firewall, the VM does not start > automatically after reboot/ new starts. > > It does however start when a VM using it as a NetVM is started. > > What is happening here? > Try un-setting and re-setting it again: $ qvm-prefs -s sys-vpn-firewall autostart false $ qvm-prefs -s sys-vpn-firewall autostart true - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX0x0rAAoJENtN07w5UDAwmb4P/jppKIev49AavGHoxBB9uLVq lvgYXzqvxhNEQcAHipIiozi7sdOp/bSPtudEgkVtpykBGu2C/svPF6RGJHsVETjm zwzjWKLKUmKCmJwtyDtuinnKCSJ3d+smyUxcOl1fyKnrtnHU+W3lDLrLtFc7urF/ nYl+IN5v0YfmxOBr4y0RG3ffw2a0PKAy91deoM3162tyWkc6wPSb96zd165c8YKD KC1EYUasG94Py9GoQPjBq+nmIMD/vx1H4mOrhKKREFpkSLr4bv2qo+VrKq2si6aD UXEo7rdMKvjmUj1ah7fkkn48AN2DlSce+XetxOg1y0xKouczBHNKyUrGI8oFNxLg f+c41mLdMhIKfrLCsonK1Idqi/zAxgAjzpa8/lNdP9++yAj6ZJ/1xBpMMQDsetTm En1IxnMtZX/vE48Ihzj1SA1hTzU5RgjPusrXCRWHiS7YpaAhPxx2YE70+rtk8zyt JVVPfhc08zi+yNQ6tbhHHp3VTKPsp4iok/EsWJsMd98trn9ctOKx48ECA4MDoHeU 9qU36SAl80juGkob38UfJvu0tCeQ2WrZDgJ6bMiDCRCRCSNUUiwT0oenGmxyOc48 Ti7zdIdbhMXBv8C2yVv98Pl1UR9bQIRiiPHkDOpYFGK0PQYpEsXKgWM3nZlVF9EL DhtirPbjkLA3UgJZRYJ7 =Wpod -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/eec14c31-94d9-9690-5515-157841e15aa0%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Fresh Install - Cannot Ping out
Forgive me, I have tried to check the documentation but I am not getting anywhere. I am testing out Qubes and I have a fresh install. When pinging out from any VM, I dont get anywhere. I cannot browse or anything. The ifconfig of the VMs show a 10.137.3.x network where my actual network is the standard 192.168.1.x Am I missing something in enabling the network interfaces? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ca503887-e24e-4614-a649-a1704a5263b5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Start VM automatically on boot not working
Hello, After cloning sys-firewall into sys-vpn-firewall with qvm-clone in dom0, and selection "Start VM automatically on boot not working " in the preferences of sys-vpn-firewall, the VM does not start automatically after reboot/ new starts. It does however start when a VM using it as a NetVM is started. What is happening here? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5c6778c1-a5b8-4313-98c9-9f944d809d77%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Installation problems?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-09 13:10, Jodie wrote: > As strange as it sounds, I'm getting it during installation. > Ok, I'll file an issue for this. Which version of Qubes are you trying to install? - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX0xtBAAoJENtN07w5UDAwTNYP+wbKVF1t720K6Ns8iT1XvKeT 7nAW8TlqKPvgLQDWGI2DARZ3wgWuFRquX5hdQlb7FTc4i31pac+v9G7Vr4QbkBjI gzNK3ogjSmk4uMtVszkRcsfm3BtbhM225cd8ysgcBYvHXxskXyIdluOJOvEBYiEA D7ZdhndqOfug3sOuLL2RaLSBIIAcMNETfI0TTYx9B6xF3nZUlKJ7RwxZPi2Znd89 6jRUM1vtfCo8yDzA7aJIhtAQiwZBMxwqion24huox/mKtUuAA0f1thgqQHarOfjb bxW2GUrDbjlds4pLW2bKEhEfTGT7Bo8Ux8QWSnHlWjD303lZQOf4+AIaysmPq+GG nW3avuO6Rkn+QsXwS3pIUqD6DLDF5TbwQJbSOuuRFKaEZRjs58meoCytWJvYXkaO 38LQSyFG/ck5yly0II37FtIXAIn28KOyHEtnd9I/C7e1MuhJRhQkPztXuqTUi0Nh 6ZALLRdblWgmpROAobRMIY+q8VjrNqPLJABenHrqWH5+rGiVRvFNvlEd2FrnfRiY 8JIjAl5e4rYdF0NqS7AOeRpASHvvVlKyBehKc66wQm5i7BzPecLGfCMEJX2FuPk3 A06gMcFjQ183ZaO9iSYu8gw4LoX+kllaHjMeWo3IDIlAwvCTSyFPNdwyCRsqneoC Rs1MaGRcPQDiBbOP7zzA =xaVK -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fb86e8df-0f94-db95-83ae-00889ed40523%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: Request for test: Re: [qubes-users] Fedora 24?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-08 05:14, pixel fairy wrote: > On Wednesday, September 7, 2016 at 6:40:24 AM UTC-7, Marek > Marczykowski-Górecki wrote: > >> >> For Qubes 4.0 it hasn't been decided yet (most likely will be >> Fedora 23 too). But hopefully we'll have newer kernel there. I'd >> aim for 4.8. > > looks like fedora 23 will be EOL in 3-4 months. > https://fedoraproject.org/wiki/End_of_life > I've just added this note regarding the safety of using an EOL base OS in dom0 to our Supported Versions page:[1] "Note: Dom0 is isolated from domUs. DomUs can access only a few interfaces, such as Xen, device backends (in the dom0 kernel and in other VMs, such as the NetVM), and Qubes tools (gui-daemon, qrexec-daemon, etc.). These components are security-critical, and we provide updates for all of them (when necessary), regardless of the support status of the base distribution. For this reason, we consider it safe to continue using a given base distribution in dom0 even after it has reached end-of-life." This is from a reply Marek gave about the same issue with Fedora 20 reaching EOL approximately four months before the release of R3.0.[2] (Note that we've continued to use Fedora 20 in dom0 ever since, in both R3.0 and R3.1.) [1] https://www.qubes-os.org/doc/supported-versions/#tocAnchor-1-1-2 [2] https://groups.google.com/d/msg/qubes-users/D8CvUWYpQxk/VYFLp7raI_IJ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX0xpbAAoJENtN07w5UDAwPOIP/1ENQeJz5y/7amzioScLTzVj jt84fGJ62eY+n1QNTYAWLa/90JjI++52Nvqn+CZ3LFIV/MKzyKf31LeIMrhH5w+I X1PT6MIw5xFMxeIqKYCaLORnUrgZQg4Lu2UXWiCGJoOjgb8XuBHjre2XL/LYp2Fr X//n5j8TfoWC6JsAVDxrQ6GVw5BTJowcBG0a2dOll/01qCDhxX8r8SuFwaGbbfsc N5Vaqt0BbJvQI5GN0dyNRxIjl98sJymWf4SRJ5QW+zT0FU2QBLi9GP2OMHqR3JPv D70fZS8xyAyUIUQNRdUEOdYCKLWereSi/EMaZOsBfA+n6LTAZmtmlqKKJQ/6+gEc 7iFFzIbj7j2xZOZC4z6uPT0kbEPRpp1bB2bpwlYOE5MepGY1+N1s3fuExf30lSD3 fX0sl0Ae9Yrf10wjC7xdKUxt2o5+9ocLFZK31fJ6pH1vb6UvvjMgw3S9d+Qkz4S1 1h8jQmwsxAd+42dAbQ05vpuxYLAKiMyzeTacOFmad9qv/QyF4bp8WzYheJ5VCfOY eZlk64o4kFSSbsB3cSgywyLuWD+zRlIXPNOxt+WPN+DcDWMahpOkN2ApdfWwg92U YBsSopAMzReNU1FtoVuVMZU2WWCAWKASWgb33CmFwErLPrJGn2R7hpSywGiXRR6+ ijTKNBgs66YJLBKhf+0C =obj3 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/81317c0b-58d8-db2b-a0f5-7a7bd89c22aa%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Installation problems?
As strange as it sounds, I'm getting it during installation. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ba92c3da-0ffb-49a3-8a95-88bbadb38cfa%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Installation problems?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-09 12:54, Jodie wrote: > I've already done that, but I can redo that as well. > If you've already done it, then that's fine. > Question out of curiosity: wouldn't the test media verification > fail if the ISO is corrupted? > If it's just "normal" corruption, then probably. But one can imagine a modified ISO that always returns "success" when the test media verification is run, even though it shouldn't. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX0xTFAAoJENtN07w5UDAwHMUQAKjB0h77jrt2G554Ob4pGxbK JChx4vRQA/iuYpg/yvKKBRuJZY1+aBNFKIdRtEmYB9ZexWJNX/BMt3WOktgNN3go VfmexuMseUpAwkuEOseaF2EQ67wwHy5XDHBR84910oGOR3Dpp7Emh0fpA+GFZC77 YMCFnSzQ56TecYur5UNaYr/O4UmHkOau5qHBDTI3m3H9GxiTxA26/aUv8+AOw8/H LT/cxNbn2/snT2teGwzo4M0f6VCJ+pFsg9Btfr5Lh/rAIJWVJTYwsgXX4pEe9mq/ fFSsacqPRAJKwwpL6vVlly7Q14lf5juwJMfbgDEYVl8nMfpBEwR5EvNdufvV+oQL RffexOWbs7Z1s6B7GUhSsPzHjRlmH8mQH4BjE8X/5jWobbHdoRuYcwL6vx4TdL8A hzBSvBPd87Rkbfcw+Jkf+sq3aymD4qzWNbmgZPjS7KkVHccsFh0davhan9Zmlx2M OeajBItETkqc0KDB4kFm1mpaOJqZWFCTpEFoGlNEuTNA1msv93Alx3aNE+Y8ekkh 22gNsu6UunBfsGVEW3bOYKXWPfHMc1hkt0P0DPLef9jq8JxeLVTmck5XAqIvHLLz zNHS/nmSXJvNKA60EnADdRM+A4mb8YjfirWyrkYu08JjKpKvLv0Xs4EZjSqyxBZP MXQOe8UsBwMi+ZT4uF34 =O2qI -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/74e67592-1669-8134-43f3-8882d37ef7ac%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Installation problems?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-09 04:39, Jodie wrote: > On Friday, September 9, 2016 at 1:47:52 AM UTC-4, Foppe de Haan > wrote: >> On Friday, September 9, 2016 at 5:17:14 AM UTC+2, Jodie wrote: >>> Hi all, >>> >>> I've been trying to install Qubes on a Thinkpad T430. As far as >>> I can tell, support for this should be good. >>> >>> I get past the configuration window, but the install is >>> currently failing on the installation of the >>> qubes-template-fedora-23 package, with this error message: >>> >>> "The following error occurred while installing. This is a >>> fatal error and installation will be aborted. >>> >>> getPackage error: failure: >>> Packages/q/qubes-template-fedora-23-3.0.5-201603081705.noarch >>> .rpm from anaconda: [Errno 256] No more mirrors to try." >>> >>> Any ideas on how to debug this? >>> >>> Jodie >> >> my first guess would be defective usb drive / bad download / >> corrupted copy. > > I used the "Test media and install option" when booting. That > succeeded. > > In addition to this, when selecting the installation source, I > went for the "Verify" option (the one right next to the detected > installation media option). This also succeeded. > > Anything else I can do? > Yes, please verify your ISO according to these instructions: https://www.qubes-os.org/doc/verifying-signatures/ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX0xHzAAoJENtN07w5UDAwtAsP/iMct7y5f1BLddNATaakM2bN D6MRwxC0Sf4guEfv/M+HjKdKymennPchCSfwenpywY/wvntEqu2pnhlEByteyyLF y/JvD5Dti7mhN1H9Uezrqdh8Ww3viHETxBnPxfYoqSjEsETI2GukoBpREYPC/9BJ dze8BHp02ua0mZqQbQAbSGnZlmNuSZGoegKcoydfBtyCKqQ7QCZhvyPf4DnA4/mj RUFUf6XO8wOkqf89MInkhGTdAb9hRfgDfAD8iqLUh95odYFZP2pcC4hRWsDltTtt kZ+MHdclrNsPvHHuCrLN65tXGH82+oU4gTEfP8OOQZIwiB/+QWNzw1CNEqcbuQKD QbZUUSdb8wblb23P9vX6gNLukju4/+cv/f8bgWCDshEygczeqB6gP9NJk6yrbx1R 6WRZBe//Wy+jJf3T5xJqz4qQHVWfLz4n6jCo6XfWAa+V55rn2JsqjfOXbePhwRyE BXPyG9VaDF9Zb+DNEnpP2Y8PXC5OTaOWXQ6wks+zNrjncTzAClZO0/aoRd7tH137 TfsKGoG/KlG1HuAJu3gGExw6xe4iCk9wzgX+kE9fyifzzTjrgfRJfVUizTz5OF/g F7QaAK4pyx3WKfsqlebfw/6PlFixGRRGE8c+sghwiqXL1KSSVrNYFL3KW+r0S/Ir UfV5TI05V9jf+CyvTZut =yAVB -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/45ca0b25-428f-db0a-d207-f9f9ee749a80%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 3.1 and 3.2 beta both fail in post-install configuration
On Monday, September 5, 2016 at 6:18:50 AM UTC-4, Marek Marczykowski-Górecki wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Mon, Sep 05, 2016 at 02:57:13AM -0700, Bob Newell wrote: > > On Sunday, September 4, 2016 at 2:45:03 PM UTC-4, Marek > > Marczykowski-Górecki wrote: > > > -BEGIN PGP SIGNED MESSAGE- > > > Hash: SHA256 > > > > > > On Sun, Sep 04, 2016 at 11:42:24AM -0700, Bob Newell wrote: > > > > Hello, > > > > I tried installing both Qubes 3.1 and Qubes 3.2 on my Lenovo T420S. > > > > Both exhibit the same problem, during the first-boot setup, after > > > > clicking ok from the checkboxes (I didn't change the defaults), there > > > > is an extremely lengthy error message generated. I think all of it was > > > > captured in the messages I read with journalctl. The bottom line is my > > > > VMs weren't generated. If I try to create a debian or fedora VM from > > > > the Q menu nothing happens. If I try to create a disposable VM for > > > > firefox with the shortcut I get "DVM savefile creation failed." Any > > > > suggestions? > > > > > > > > here are my messages: http://hastebin.com/ixifaqenad.md > > > > > > How are you booting the system? It looks like you have modified > > > bootloader configuration to load Linux directly, excluding Xen. > > > > All I did was manually boot into ubuntu to restore my grub setting that got > > overwritten. Maybe that wiped out some Xen stuff that was in Qubes' grub > > setting. > > Most likely. > > > Is there a way to write Qubes' grub to a partition instead of the MBR? One > > of my biggest beefs with Anaconda is that it just overwrites your MBR and > > doesn't ask you where you want it. I would prefer to install any distro's > > grub to a partition and chainload it, that way, booting another linux > > distribution and updating a kernel doesn't wipe out any established boot > > settings. > > If you select customizing partition layout, you'll also be able to > select where to install bootloader. > > Also take a look here: > https://www.qubes-os.org/doc/multiboot/ > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJXzUZ9AAoJENuP0xzK19csfnIIAIR28VS+/PB96VW33Juc2OMe > X5tXri0Iv9hv0xn9bTQ4ipJqPzbDKo7L8OCxWzSKpHc6CosaTzm60rG3CsF8amKf > odUJ8wvlWaYRz+B6+5jARDGFTIUTHqehDl70c/D92GClb5Xdhhp5owazFySm6k9I > zuq+MADlSo9krzrM8DCwyQsNoVrD3T5wFsKgRDXvipnkUBfcqWMp4OkVEbginivE > QVbYqvk64Brrer8vO2uLhOF5o6ISzc+jPuEVqplqzdsswM/iljyaZijWeZdQ5QmF > iuQpVwZjzyq76MAWWYvdrARAA2UjtWLYBslq6Ag13RmmwXIpWV++SVb3lOqIwnk= > =wR+3 > -END PGP SIGNATURE- I got it to work by letting the Qubes overwrite my Grub configuration. Previously, I tried clicking the box (unchecking the option to install grub) and it failed miserably (same problem as before). Now I just need to import my other grub lines and I'll be in good shape. I do recommend changing the install program to allow installing to a partition, or else make a way to reinstall grub (this last part might already be possible from Dom0). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a922247a-7a5d-4ffd-bea0-83437d5eac5e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Does anyone use a dedicated Tor router box..?
neilhard...@gmail.com: > Does anyone use a dedicated Tor router..? > > The theory is, Tor is secure, but Firefox is not. > > Therefore, you have 1 computer that runs Tor only, and a WiFi hotspot... > Another computer runs Firefox and any other programs. > > So long as the other computer connects to the Tor computer for network > access, it doesn't matter if it gets hacked, because your real IP address > never leaks. > > Qubes implements this somewhat by separating the Whonix Net VM and App VM. > > However, the problem with Qubes, of course, is all the Xen exploits which > make it insecure. > > If you were hacked in Qubes, the hacker could easily then leak out your real > IP address. > > But if you were hacked behind a physical Tor box, your real IP can never > leak, unless the Tor box itself can be compromised... And as far as we know, > there are no exploits for the Tor network itself, only for Firefox. > > I would use Qubes for the Tor box and the other box, if only for the VT-D > protection, although maybe there are other free Linux OSs that have VT-D > protection. > > What do you think...? Has anyone tried doing this..? How did it work out...? I'm pretty sure that I recall the Whonix people doing some experiments with running the Workstation and Gateway on 2 physical machines instead of 2 VM's. I've never tried those instructions, and I don't know if that setup is still maintained, but yes, it has been thought of. Also, I think SecureDrop uses 4 physical machines, 1 of which runs Tor and another of which runs the hidden service, a 3rd of which is offline completely (I can't remember the purpose of the 4th offhand). So it's fairly similar to a Qubes setup in many ways. Cheers, -Jeremy Rand -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bc34773a-c275-b87d-f550-ba2bfd9ed539%40airmail.cc. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Is there any hope for Wayland?
wayland is inevitable. for the vms, this would take the form of a qubes compositor. that said, ive used the gimp, watched movies, even toyed with video editing on a 6 year old laptop running qubes 3.2rc3. also played a bit with blender and it seems fine, but havent tried animating yet. if your primary purpose is art/media i would not use qubes. maybe its ok if thats 2d / light3d. i think video editing should be fine, but id be iffy about high res compositing. in the mean time, you can take a few ideas from qubes. i use vmware-fusion(virtualbox does not support nested virtualization) on my work computer, a macbookpro. all my work is done within virtual machines, most of which run linux. one runs os x, and i also have a vagrantbox of os x for development. all of them are generated with packer and controlled with ansible. theres a special vm called "canary" that gets all the usb devices. it would also be possible to make a network vm to further isolate os x. (you can download updates offline) another special vm is called "vault". the only difference is the script types into the target vm instead of paste, because you can use firejail to protect apps from reading each others keystrokes, by giving all the apps their own x server. clipboard and fileshare is disabled in all the VMs, but i still dont want different apps within a vm reading each others keystrokes. if your going this route, lookup sandbox for os x or firejail for linux. linux + kvm would be better than this vmware nonsense. i plan on trying that with fedora 25. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dea94998-5cc4-4635-8760-f08b5c2174cb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] problem of using PPTP
On 09/05/2016 04:07 PM, one car wrote: Hello, I have problem of using PPTP under Qubes. For example, in this webpage: http://www.vpnbook.com/freevpn I can use the pptp us1.vpnbook.com in my windows10. Then I switch to Qubes OS 3.2 rc2 and I cannot use this PPTP. I set it up in the VPN Connections in the netwokr bar icon in the lower right side of the screen. I created a win10 virtual machine in Qubes too. The windows cannot connect to the PPTP neither. The error message is : Can't connect to VPN connection. A connection to the remote computer could not be established, so the port for this computer was closed. I tried several other online free PPTP service account in the virual windows 10 too. None of them works. It's normal that some are expired and just not working. But I test the one I mentioned (us1.vpnbook.com) and it works. Do you know why? Thanks in advance. OC -- Hi, You could try openvpn instead of PPTP if your VPN service supports it. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/21f3d90d-f7dc-d487-6d3d-e812c76885cf%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Installation problems?
On Friday, September 9, 2016 at 1:47:52 AM UTC-4, Foppe de Haan wrote: > On Friday, September 9, 2016 at 5:17:14 AM UTC+2, Jodie wrote: > > Hi all, > > > > I've been trying to install Qubes on a Thinkpad T430. As far as I can tell, > > support for this should be good. > > > > I get past the configuration window, but the install is currently failing > > on the installation of the > > qubes-template-fedora-23 package, with this error message: > > > > "The following error occurred while installing. This is a fatal error and > > installation will be aborted. > > > > getPackage error: failure: > > Packages/q/qubes-template-fedora-23-3.0.5-201603081705.noarch.rpm from > > anaconda: [Errno 256] No more mirrors to try." > > > > Any ideas on how to debug this? > > > > Jodie > > my first guess would be defective usb drive / bad download / corrupted copy. I used the "Test media and install option" when booting. That succeeded. In addition to this, when selecting the installation source, I went for the "Verify" option (the one right next to the detected installation media option). This also succeeded. Anything else I can do? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a94d432c-92ef-41c6-8305-c8f735ef947e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Does anyone use a dedicated Tor router box..?
I had my raspberry pi configured as tor-wifi-hotspot, which worked fine. But its about a year ago, and my raspi died a few months ago after I tried some... stupid thing with it. But it worked without any problems, so if you think it makes sense to you, I don't see any problems with this. I personally didn't thought about it, but now as you write it.. maybe I'll give it another try with a new raspberry. If/How good it works on a real router - no idea. As I wrote, I took my rasbperry pi. Does anyone use a dedicated Tor router..? The theory is, Tor is secure, but Firefox is not. Therefore, you have 1 computer that runs Tor only, and a WiFi hotspot... Another computer runs Firefox and any other programs. So long as the other computer connects to the Tor computer for network access, it doesn't matter if it gets hacked, because your real IP address never leaks. Qubes implements this somewhat by separating the Whonix Net VM and App VM. However, the problem with Qubes, of course, is all the Xen exploits which make it insecure. If you were hacked in Qubes, the hacker could easily then leak out your real IP address. But if you were hacked behind a physical Tor box, your real IP can never leak, unless the Tor box itself can be compromised... And as far as we know, there are no exploits for the Tor network itself, only for Firefox. I would use Qubes for the Tor box and the other box, if only for the VT-D protection, although maybe there are other free Linux OSs that have VT-D protection. What do you think...? Has anyone tried doing this..? How did it work out...? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/99f09226-7eb1-48db-8927-a1809a4a0db1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1570e82a328.2765.db864a7b1d5e2becb017b42ae5cd9fc6%40posteo.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Does anyone use a dedicated Tor router box..?
Seems useless. You got to change router if it leaks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c7cb1331-5da2-4ec2-981d-cecc585be615%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] NVIDIA GeForce
Hi all, Does Qubes support NVIDIA GeForce graphics cards? The reason for asking is that I am planing to buy a Lenovo ThinkPad T460p Laptop, which has a NVIDIA GeForce 940MX 2 GB graphics card. Best, Thomas -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d1466f70-12dc-4fa7-ae68-f3ceaa1e8516%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Does anyone use a dedicated Tor router box..?
Does anyone use a dedicated Tor router..? The theory is, Tor is secure, but Firefox is not. Therefore, you have 1 computer that runs Tor only, and a WiFi hotspot... Another computer runs Firefox and any other programs. So long as the other computer connects to the Tor computer for network access, it doesn't matter if it gets hacked, because your real IP address never leaks. Qubes implements this somewhat by separating the Whonix Net VM and App VM. However, the problem with Qubes, of course, is all the Xen exploits which make it insecure. If you were hacked in Qubes, the hacker could easily then leak out your real IP address. But if you were hacked behind a physical Tor box, your real IP can never leak, unless the Tor box itself can be compromised... And as far as we know, there are no exploits for the Tor network itself, only for Firefox. I would use Qubes for the Tor box and the other box, if only for the VT-D protection, although maybe there are other free Linux OSs that have VT-D protection. What do you think...? Has anyone tried doing this..? How did it work out...? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/99f09226-7eb1-48db-8927-a1809a4a0db1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.