[qubes-users] Qubes 3.2-rc3 RAID and nvme

2016-09-09 Thread joseph . yarbrough
I installed Qubes 3.2-rc3 on my Lenovo P50 (Xeon ECC laptop)

It works, but I had to disable RAID in the bios and use lvm striping.

The raid disks don't seem to show up at all. The bios doesn't have  a storage 
remapping option ( https://communities.intel.com/thread/102395 )

I'm guessing this is a bios issue. I installed with software RAID and lvm raid0 
with success, expect the EFI won't boot.

I was able to boot with rEFInd on a USB, but I can't figure out how to install 
it permanently. ( 
https://www.reddit.com/r/Qubes/comments/4onsfe/qubes_os_32_rc1_has_been_released/d4mi1mn
 )

I'm installing Qubes 3.1 now to see if it will work. Hopefully the final 3.2 
can EFI boot on nvme SSDs.

Any help is greatly appreciated. I'm loving this software!!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/806b5285-fb41-412d-9cd8-b037ab107a16%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't connect a VPN before Tor

2016-09-09 Thread Chris Laprise

On 09/08/2016 04:41 AM, nishiwak...@gmail.com wrote:

Hello,

I am struggling to have VPN work while using it with Tor, I can't have both 
work.

I tried first to follow Mrs. Rutkowska's tutorial on setting up a clear Tor 
proxyVM 
https://theinvisiblethings.blogspot.de/2011/09/playing-with-qubes-networking-for-fun.html
 but unfortunately I can't make it work.

"QUBES_IP=$(xenstore-read qubes_ip)" line doesn't seem to work. If I replace 
"(xenstore-read qubes_ip)" with proxyVM's IP then script works but then I have to set up 
/etc/tor/torrc to achieve to connect Tor Browser in another AppVM. I guess this setup is too 
complicated for me.

Then I read whonix documentation 
https://www.whonix.org/wiki/Tunnels/Connecting_to_a_VPN_before_Tor, to check 
what I need to do to avoid reinstalling my VPN into a whonix gateway and just 
use it as a proxy VM before Tor.


Although its straightforward to get the opposite working (Tor -> VPN -> 
Internet -- just follow the Qubes vpn doc and connect sys-whonix to the 
vpn vm) there are wrinkles to iron out when getting it to work as you 
describe.


Since the solution is Tor-specific, probably the best place to start is 
trying create the whole setup in Whonix-Qubes using the Whonix doc you 
referenced. The Whonix forum should be able to help you with any 
specific issues when following their directions.


Chris


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eb206f33-67e9-5ddb-f59b-26a4d4df09fa%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Start VM automatically on boot not working

2016-09-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-09 15:00, kotot...@gmail.com wrote:
> Searching in the output of journactl gives the following errors:
> 
> Failed to start Start Qubes VM Unit entered failed state Failed 
> with result 'exit-code' internal error: Unable to reset PCI device
>  [...]  no FLR, PM reset or bus reset available.
> 

Try this:
https://www.qubes-os.org/doc/user-faq/#i-created-a-usbvm-and-assigned-
usb-controllers-to-it-now-the-usbvm-wont-boot

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJX0zwDAAoJENtN07w5UDAw9f0P/j3mHmZCxLH0w5nqXo94unmi
fj7c12nMOM7yVA6IOYbq2xEQ1/UHfqcM/Fj0Im3GIb39Ny7t8Jt8mC7byZ51IkNY
6JNJAeqzFJyqsTT95PHyCgBobqEGBDfoIpwhBHmWnT6D7EF6P9kLOOH7XyA1JQ/N
kGXqLgh+0wpOKHuA6yc+6mcxorU/L5s24e4Qp7HMkJ8bYPemaQASOsyq3aOilu9S
BkEkXXZO4msJEbJEEEpTRKgNaiwJjmsDjGkvYXydKk53Ji2yj1L8yA+iIzU2RjzO
/Saiv++BwFHP722nxYei3Q6InsQ6FtHifLFqMRdaIxIi3AOweFmDF/m0FghixKuU
/RFrSKYub6UekFvGuYK5tekRtZUvMTTHGmSDPyMy9Ra30qIYvuqoacqeDVqh9X3J
bEMreuEaZ3uK9Oh+PXb6uFpW4MAFkXZRh6MSNqZuKsTIz6HwGXxFRRqsDQbJCsXA
odCvfPeBNg2jYpVs9eOqpmDnchNFVGf5fXI+/QLdJJRkAFdFiQZNa4Qq3i2ZH4px
+bT0+cqXs0ZPhPRukystoDvtfkCcz7GjvkSfdcDhF6hf388ifJVp/UAaHoFzvphs
drfwBmWL9HUW+pzwRll4HbDRH1pr2OvEBvxrAzprxilWeFJklMJD/elRspENE3S5
IiHkReOKV28uOTVplxr1
=odQW
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9478879-894f-2fd3-f09c-5a1e35f5145a%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installation problems?

2016-09-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-09 13:48, Jodie wrote:
> Version 3.1. What's annoying me is that I can't figure out why this
> is happening. I even have a terrible photo of the install error if
> you want to see it.
> 
> I'm inclined to think that I'm doing something wrong, but can't
> tell what it is that I'm doing wrong.
> 

Yes, please share the photo of the error.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=BQvH
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dadc8854-a8a3-d1d1-d3b7-131709696568%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Start VM automatically on boot not working

2016-09-09 Thread kototamo
and further:

libvirt.libvirtError: Requested operation is not valid: Domain is already 
running.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a473a522-c780-498c-b110-493a375d5c88%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installation problems?

2016-09-09 Thread Jodie
Version 3.1. What's annoying me is that I can't figure out why this is 
happening. I even have a terrible photo of the install error if you want to see 
it.

I'm inclined to think that I'm doing something wrong, but can't tell what it is 
that I'm doing wrong.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/93bf1165-16fc-423c-a91f-1b7e66079f48%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fresh Install - Cannot Ping out

2016-09-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-09 13:31, Eric Herron wrote:
> Forgive me, I have tried to check the documentation but I am not
> getting anywhere.
> 
> I am testing out Qubes and I have a fresh install.
> 
> When pinging out from any VM, I dont get anywhere. I cannot browse
> or anything.
> 

Does that include sys-net? If so, it's possible that you're missing
drivers for your NIC, for example. You may have to download the
packages from a different machine, then manually transfer them over to
install in the TemplateVM on which sys-net is based.

> The ifconfig of the VMs show a 10.137.3.x network where my actual
> network is the standard 192.168.1.x
> 

This is normal. It has to do with Qubes' internal networking.

> Am I missing something in enabling the network interfaces?
> 

It should normally "just work." If it's not, then it's likely a
hardware compatibility issue (see above).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=XCww
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/370ef180-30fc-bfa7-0bac-96b48a541f5d%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Start VM automatically on boot not working

2016-09-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-09 13:30, kotot...@gmail.com wrote:
> Hello,
> 
> After cloning sys-firewall into sys-vpn-firewall with qvm-clone in
> dom0, and selection "Start VM automatically on boot not working "
> in the preferences of sys-vpn-firewall, the VM does not start
> automatically after reboot/ new starts.
> 
> It does however start when a VM using it as a NetVM is started.
> 
> What is happening here?
> 

Try un-setting and re-setting it again:

$ qvm-prefs -s sys-vpn-firewall autostart false
$ qvm-prefs -s sys-vpn-firewall autostart true

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=Wpod
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eec14c31-94d9-9690-5515-157841e15aa0%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fresh Install - Cannot Ping out

2016-09-09 Thread Eric Herron
Forgive me, I have tried to check the documentation but I am not getting 
anywhere.

I am testing out Qubes and I have a fresh install.

When pinging out from any VM, I dont get anywhere. I cannot browse or anything.

The ifconfig of the VMs show a 10.137.3.x network where my actual network is 
the standard 192.168.1.x

Am I missing something in enabling the network interfaces?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ca503887-e24e-4614-a649-a1704a5263b5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Start VM automatically on boot not working

2016-09-09 Thread kototamo
Hello,

After cloning sys-firewall into sys-vpn-firewall with qvm-clone in dom0, and 
selection "Start VM automatically on boot not working " in the preferences of 
sys-vpn-firewall, the VM does not start automatically after reboot/ new starts.

It does however start when a VM using it as a NetVM is started.

What is happening here?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5c6778c1-a5b8-4313-98c9-9f944d809d77%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installation problems?

2016-09-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-09 13:10, Jodie wrote:
> As strange as it sounds, I'm getting it during installation.
> 

Ok, I'll file an issue for this. Which version of Qubes are
you trying to install?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=xaVK
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fb86e8df-0f94-db95-83ae-00889ed40523%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: Request for test: Re: [qubes-users] Fedora 24?

2016-09-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-08 05:14, pixel fairy wrote:
> On Wednesday, September 7, 2016 at 6:40:24 AM UTC-7, Marek
> Marczykowski-Górecki wrote:
> 
>> 
>> For Qubes 4.0 it hasn't been decided yet (most likely will be
>> Fedora 23 too). But hopefully we'll have newer kernel there. I'd
>> aim for 4.8.
> 
> looks like fedora 23 will be EOL in 3-4 months.
> https://fedoraproject.org/wiki/End_of_life
> 

I've just added this note regarding the safety of using an EOL base OS
in dom0 to our Supported Versions page:[1]

"Note: Dom0 is isolated from domUs. DomUs can access only a few
interfaces, such as Xen, device backends (in the dom0 kernel and in
other VMs, such as the NetVM), and Qubes tools (gui-daemon,
qrexec-daemon, etc.). These components are security-critical, and we
provide updates for all of them (when necessary), regardless of the
support status of the base distribution. For this reason, we consider
it safe to continue using a given base distribution in dom0 even after
it has reached end-of-life."

This is from a reply Marek gave about the same issue with Fedora 20
reaching EOL approximately four months before the release of R3.0.[2]
(Note that we've continued to use Fedora 20 in dom0 ever since, in
both R3.0 and R3.1.)


[1] https://www.qubes-os.org/doc/supported-versions/#tocAnchor-1-1-2
[2] https://groups.google.com/d/msg/qubes-users/D8CvUWYpQxk/VYFLp7raI_IJ

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=obj3
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/81317c0b-58d8-db2b-a0f5-7a7bd89c22aa%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installation problems?

2016-09-09 Thread Jodie
As strange as it sounds, I'm getting it during installation.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ba92c3da-0ffb-49a3-8a95-88bbadb38cfa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Installation problems?

2016-09-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-09 12:54, Jodie wrote:
> I've already done that, but I can redo that as well.
> 

If you've already done it, then that's fine.

> Question out of curiosity: wouldn't the test media verification
> fail if the ISO is corrupted?
> 

If it's just "normal" corruption, then probably. But one can imagine a
modified ISO that always returns "success" when the test media
verification is run, even though it shouldn't.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=O2qI
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/74e67592-1669-8134-43f3-8882d37ef7ac%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Installation problems?

2016-09-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-09 04:39, Jodie wrote:
> On Friday, September 9, 2016 at 1:47:52 AM UTC-4, Foppe de Haan 
> wrote:
>> On Friday, September 9, 2016 at 5:17:14 AM UTC+2, Jodie wrote:
>>> Hi all,
>>> 
>>> I've been trying to install Qubes on a Thinkpad T430. As far as
>>> I can tell, support for this should be good.
>>> 
>>> I get past the configuration window, but the install is 
>>> currently failing on the installation of the 
>>> qubes-template-fedora-23 package, with this error message:
>>> 
>>> "The following error occurred while installing. This is a
>>> fatal error and installation will be aborted.
>>> 
>>> getPackage error: failure: 
>>> Packages/q/qubes-template-fedora-23-3.0.5-201603081705.noarch 
>>> .rpm from anaconda: [Errno 256] No more mirrors to try."
>>> 
>>> Any ideas on how to debug this?
>>> 
>>> Jodie
>> 
>> my first guess would be defective usb drive / bad download / 
>> corrupted copy.
> 
> I used the "Test media and install option" when booting. That 
> succeeded.
> 
> In addition to this, when selecting the installation source, I
> went for the "Verify" option (the one right next to the detected 
> installation media option). This also succeeded.
> 
> Anything else I can do?
> 

Yes, please verify your ISO according to these instructions:

https://www.qubes-os.org/doc/verifying-signatures/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=yAVB
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/45ca0b25-428f-db0a-d207-f9f9ee749a80%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.1 and 3.2 beta both fail in post-install configuration

2016-09-09 Thread Bob Newell
On Monday, September 5, 2016 at 6:18:50 AM UTC-4, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Mon, Sep 05, 2016 at 02:57:13AM -0700, Bob Newell wrote:
> > On Sunday, September 4, 2016 at 2:45:03 PM UTC-4, Marek 
> > Marczykowski-Górecki wrote:
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA256
> > > 
> > > On Sun, Sep 04, 2016 at 11:42:24AM -0700, Bob Newell wrote:
> > > > Hello,
> > > > I tried installing both Qubes 3.1 and Qubes 3.2 on my Lenovo T420S. 
> > > > Both exhibit the same problem, during the first-boot setup, after 
> > > > clicking ok from the checkboxes (I didn't change the defaults), there 
> > > > is an extremely lengthy error message generated. I think all of it was 
> > > > captured in the messages I read with journalctl. The bottom line is my 
> > > > VMs weren't generated. If I try to create a debian or fedora VM from 
> > > > the Q menu nothing happens. If I try to create a disposable VM for 
> > > > firefox with the shortcut I get "DVM savefile creation failed."  Any 
> > > > suggestions?
> > > > 
> > > > here are my messages: http://hastebin.com/ixifaqenad.md
> > > 
> > > How are you booting the system? It looks like you have modified
> > > bootloader configuration to load Linux directly, excluding Xen.
> > 
> > All I did was manually boot into ubuntu to restore my grub setting that got 
> > overwritten. Maybe that wiped out some Xen stuff that was in Qubes' grub 
> > setting. 
> 
> Most likely.
> 
> > Is there a way to write Qubes' grub to a partition instead of the MBR? One 
> > of my biggest beefs with Anaconda is that it just overwrites your MBR and 
> > doesn't ask you where you want it. I would prefer to install any distro's 
> > grub to a partition and chainload it, that way, booting another linux 
> > distribution and updating a kernel doesn't wipe out any established boot 
> > settings.
> 
> If you select customizing partition layout, you'll also be able to
> select where to install bootloader.
> 
> Also take a look here:
> https://www.qubes-os.org/doc/multiboot/
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJXzUZ9AAoJENuP0xzK19csfnIIAIR28VS+/PB96VW33Juc2OMe
> X5tXri0Iv9hv0xn9bTQ4ipJqPzbDKo7L8OCxWzSKpHc6CosaTzm60rG3CsF8amKf
> odUJ8wvlWaYRz+B6+5jARDGFTIUTHqehDl70c/D92GClb5Xdhhp5owazFySm6k9I
> zuq+MADlSo9krzrM8DCwyQsNoVrD3T5wFsKgRDXvipnkUBfcqWMp4OkVEbginivE
> QVbYqvk64Brrer8vO2uLhOF5o6ISzc+jPuEVqplqzdsswM/iljyaZijWeZdQ5QmF
> iuQpVwZjzyq76MAWWYvdrARAA2UjtWLYBslq6Ag13RmmwXIpWV++SVb3lOqIwnk=
> =wR+3
> -END PGP SIGNATURE-

I got it to work by letting the Qubes overwrite my Grub configuration. 
Previously, I tried clicking the box (unchecking the option to install grub) 
and it failed miserably (same problem as before). Now I just need to import my 
other grub lines and I'll be in good shape. I do recommend changing the install 
program to allow installing to a partition, or else make a way to reinstall 
grub (this last part might already be possible from Dom0).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a922247a-7a5d-4ffd-bea0-83437d5eac5e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Does anyone use a dedicated Tor router box..?

2016-09-09 Thread Jeremy Rand
neilhard...@gmail.com:
> Does anyone use a dedicated Tor router..?
> 
> The theory is, Tor is secure, but Firefox is not.
> 
> Therefore, you have 1 computer that runs Tor only, and a WiFi hotspot... 
> Another computer runs Firefox and any other programs.
> 
> So long as the other computer connects to the Tor computer for network 
> access, it doesn't matter if it gets hacked, because your real IP address 
> never leaks.
> 
> Qubes implements this somewhat by separating the Whonix Net VM and App VM. 
> 
> However, the problem with Qubes, of course, is all the Xen exploits which 
> make it insecure.
> 
> If you were hacked in Qubes, the hacker could easily then leak out your real 
> IP address.
> 
> But if you were hacked behind a physical Tor box, your real IP can never 
> leak, unless the Tor box itself can be compromised... And as far as we know, 
> there are no exploits for the Tor network itself, only for Firefox.
> 
> I would use Qubes for the Tor box and the other box, if only for the VT-D 
> protection, although maybe there are other free Linux OSs that have VT-D 
> protection.
> 
> What do you think...? Has anyone tried doing this..? How did it work out...?

I'm pretty sure that I recall the Whonix people doing some experiments
with running the Workstation and Gateway on 2 physical machines instead
of 2 VM's.  I've never tried those instructions, and I don't know if
that setup is still maintained, but yes, it has been thought of.

Also, I think SecureDrop uses 4 physical machines, 1 of which runs Tor
and another of which runs the hidden service, a 3rd of which is offline
completely (I can't remember the purpose of the 4th offhand).  So it's
fairly similar to a Qubes setup in many ways.

Cheers,
-Jeremy Rand

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bc34773a-c275-b87d-f550-ba2bfd9ed539%40airmail.cc.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Is there any hope for Wayland?

2016-09-09 Thread pixel fairy
wayland is inevitable. for the vms, this would take the form of a qubes 
compositor.

that said, ive used the gimp, watched movies, even toyed with video editing on 
a 6 year old laptop running qubes 3.2rc3. also played a bit with blender and it 
seems fine, but havent tried animating yet.

if your primary purpose is art/media i would not use qubes. maybe its ok if 
thats 2d / light3d. i think video editing should be fine, but id be iffy about 
high res compositing. 

in the mean time, you can take a few ideas from qubes. i use 
vmware-fusion(virtualbox does not support nested virtualization) on my work 
computer, a macbookpro. all my work is done within virtual machines, most of 
which run linux. one runs os x, and i also have a vagrantbox of os x for 
development. all of them are generated with packer and controlled with ansible. 

theres a special vm called "canary" that gets all the usb devices. it would 
also be possible to make a network vm to further isolate os x. (you can 
download updates offline) another special vm is called "vault". the only 
difference is the script types into the target vm instead of paste, because you 
can use firejail to protect apps from reading each others keystrokes, by giving 
all the apps their own x server. clipboard and fileshare is disabled in all the 
VMs, but i still dont want different apps within a vm reading each others 
keystrokes.

if your going this route, lookup sandbox for os x or firejail for linux. linux 
+ kvm would be better than this vmware nonsense. i plan on trying that with 
fedora 25.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dea94998-5cc4-4635-8760-f08b5c2174cb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] problem of using PPTP

2016-09-09 Thread Chris Laprise

On 09/05/2016 04:07 PM, one car wrote:

Hello,
I have problem of using PPTP under Qubes. For example, in this 
webpage: http://www.vpnbook.com/freevpn
I can use the pptp us1.vpnbook.com in my windows10. Then I switch to 
Qubes OS 3.2 rc2 and I cannot use this PPTP. I set it up in the VPN 
Connections in the netwokr bar icon in the lower right side of the 
screen.  I created a win10 virtual machine in Qubes too. The windows 
cannot connect to the PPTP neither. The error message is  : Can't 
connect to VPN connection. A connection to the remote computer could 
not be established, so the port for this computer was closed.
I tried several other online free PPTP service account in the virual 
windows 10 too. None of them works. It's normal that some are expired 
and just not working. But I test the one I mentioned  
(us1.vpnbook.com) and it works.

Do you know why? Thanks in advance.
OC
--


Hi,

You could try openvpn instead of PPTP if your VPN service supports it.

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21f3d90d-f7dc-d487-6d3d-e812c76885cf%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation problems?

2016-09-09 Thread Jodie
On Friday, September 9, 2016 at 1:47:52 AM UTC-4, Foppe de Haan wrote:
> On Friday, September 9, 2016 at 5:17:14 AM UTC+2, Jodie wrote:
> > Hi all,
> > 
> > I've been trying to install Qubes on a Thinkpad T430. As far as I can tell, 
> > support for this should be good.
> > 
> > I get past the configuration window, but the install is currently failing 
> > on the installation of the
> > qubes-template-fedora-23 package, with this error message:
> > 
> > "The following error occurred while installing. This is a fatal error and 
> > installation will be aborted.
> > 
> > getPackage error: failure: 
> > Packages/q/qubes-template-fedora-23-3.0.5-201603081705.noarch.rpm from 
> > anaconda: [Errno 256] No more mirrors to try."
> > 
> > Any ideas on how to debug this?
> > 
> > Jodie
> 
> my first guess would be defective usb drive / bad download / corrupted copy.

I used the "Test media and install option" when booting. That succeeded.

In addition to this, when selecting the installation source, I went for the 
"Verify" option (the one right next to the detected installation media option). 
This also succeeded.

Anything else I can do?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a94d432c-92ef-41c6-8305-c8f735ef947e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Does anyone use a dedicated Tor router box..?

2016-09-09 Thread Fabian Wloch
I had my raspberry pi configured as tor-wifi-hotspot, which worked fine. 
But its about a year ago, and my raspi died a few months ago after I tried 
some... stupid thing with it.


But it worked without any problems, so if you think it makes sense to you, 
I don't see any problems with this.


I personally didn't thought about it, but now as you write it.. maybe I'll 
give it another try with a new raspberry.


If/How good it works on a real router - no idea. As I wrote, I took my 
rasbperry pi.



Does anyone use a dedicated Tor router..?

The theory is, Tor is secure, but Firefox is not.

Therefore, you have 1 computer that runs Tor only, and a WiFi hotspot... 
Another computer runs Firefox and any other programs.


So long as the other computer connects to the Tor computer for network 
access, it doesn't matter if it gets hacked, because your real IP address 
never leaks.


Qubes implements this somewhat by separating the Whonix Net VM and App VM.

However, the problem with Qubes, of course, is all the Xen exploits which 
make it insecure.


If you were hacked in Qubes, the hacker could easily then leak out your 
real IP address.


But if you were hacked behind a physical Tor box, your real IP can never 
leak, unless the Tor box itself can be compromised... And as far as we 
know, there are no exploits for the Tor network itself, only for Firefox.


I would use Qubes for the Tor box and the other box, if only for the VT-D 
protection, although maybe there are other free Linux OSs that have VT-D 
protection.


What do you think...? Has anyone tried doing this..? How did it work out...?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an 
email to qubes-users+unsubscr...@googlegroups.com.

To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/99f09226-7eb1-48db-8927-a1809a4a0db1%40googlegroups.com.

For more options, visit https://groups.google.com/d/optout.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1570e82a328.2765.db864a7b1d5e2becb017b42ae5cd9fc6%40posteo.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Does anyone use a dedicated Tor router box..?

2016-09-09 Thread nikospg . omics
Seems useless. You got to change router if it leaks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c7cb1331-5da2-4ec2-981d-cecc585be615%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] NVIDIA GeForce

2016-09-09 Thread Thomas Ernst
Hi all,

Does Qubes support NVIDIA GeForce graphics cards? The reason for asking is that 
I am planing to buy a Lenovo ThinkPad T460p Laptop, which has a NVIDIA GeForce 
940MX 2 GB graphics card.

Best,

Thomas

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d1466f70-12dc-4fa7-ae68-f3ceaa1e8516%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Does anyone use a dedicated Tor router box..?

2016-09-09 Thread neilhardley
Does anyone use a dedicated Tor router..?

The theory is, Tor is secure, but Firefox is not.

Therefore, you have 1 computer that runs Tor only, and a WiFi hotspot... 
Another computer runs Firefox and any other programs.

So long as the other computer connects to the Tor computer for network access, 
it doesn't matter if it gets hacked, because your real IP address never leaks.

Qubes implements this somewhat by separating the Whonix Net VM and App VM. 

However, the problem with Qubes, of course, is all the Xen exploits which make 
it insecure.

If you were hacked in Qubes, the hacker could easily then leak out your real IP 
address.

But if you were hacked behind a physical Tor box, your real IP can never leak, 
unless the Tor box itself can be compromised... And as far as we know, there 
are no exploits for the Tor network itself, only for Firefox.

I would use Qubes for the Tor box and the other box, if only for the VT-D 
protection, although maybe there are other free Linux OSs that have VT-D 
protection.

What do you think...? Has anyone tried doing this..? How did it work out...?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/99f09226-7eb1-48db-8927-a1809a4a0db1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.