Re: [qubes-users] R3.2-rc2: random reboots on Lenovo T520 (workaround)

2016-09-23 Thread Simon

Hello Yaqu,


Does anyone else have similar issue with i915?


I have the impression that latest Qubes OS hardly supports i915 
chipsets.


On my side, on a Lenovo T500 after a normal boot process when the X 
server
should start the screen goes blank and there is no more disk activity 
(no log
either) letting me think of some deep crash / freeze somewhere. 
Hopefully this

laptop offers a second ATI based graphical chipset, so once I solved
Qubes/Fedora over-heating issue with this one (`radeon.dpm=1' for those
interested) I managed to install an use Qubes.

It can be worth to noting that on the same laptop I had no issue to use 
Qubes 2

with Intel i915 graphical chipset (this was actually my first workaround
against the afore mentioned ATI over-heating issue), and that latest 
Fedora
Live CD does not cause any issue either. So this i915 issue is really a 
Qubes

or Xen specific issue.

Moreover, if you check the issue list, you will find yet another issue 
still
related to i915 handling, "Graphic woes / i915 - Intel Graphics 5500 on 
T450s":


https://github.com/QubesOS/qubes-issues/issues/2232

Good luck...

Simon.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ac5051e35648a5adae179654f545f1e8%40whitewinterwolf.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: installing Signal on Qubes mini-HOWTO

2016-09-23 Thread dlmetcalf
On Friday, 23 September 2016 07:56:15 UTC+10, dlme...@gmail.com  wrote:
> On Friday, 23 September 2016 04:11:33 UTC+10, se...@redhat.com  wrote:
> > On Thursday, September 22, 2016 at 3:57:01 AM UTC-4, dlme...@gmail.com 
> > wrote:
> > > On Monday, 15 August 2016 20:43:18 UTC+10, pixel fairy  wrote:
> > > > On Sunday, August 14, 2016 at 3:22:30 PM UTC-7, Alex wrote:
> > > > ...
> > > > > 1. Install the Chromium browser in your appvm template - skip if you 
> > > > > were already using it. Shut down the template VM.
> > > > 
> > > > I keep wondering how safe chromium browser is. do redhat or debian 
> > > > track updates in time with google-chrome?
> > > 
> > > 
> > > Chromium in the supported Fedora template for Qubes (FC23) contains High 
> > > severity security bugs:
> > > 
> > > FC23 = 52.0.2743.116-10.fc23.
> > > FC24 = 53.0.2785.113-1.fc24.
> > > 
> > > See: https://apps.fedoraproject.org/packages/chromium  (for builds)
> > > 
> > > Numerous security vulnerabilities, including High severity CVE's here:
> > > https://googlechromereleases.blogspot.com.au/2016/09/stable-channel-update-for-desktop_13.html
> > > 
> > > Newer RPMs available here, but haven't been tagged to either updates or 
> > > updates-testing for FC23:
> > > 
> > > http://koji.fedoraproject.org/koji/buildinfo?buildID=802754
> > 
> > 
> > So what you're saying is we should move to Fedora 24.
> 
> Sure.  However, FC23 is still listed as a supported release: 
> https://fedoraproject.org/wiki/Releases#Current_Supported_Releases.  Maybe 
> only "Critical" security fixes would make it to FC23 though, not "High" 
> (https://www.chromium.org/developers/severity-guidelines), but people likely 
> assume otherwise.  Note also that Chromium is not listed as a Critical Path 
> package, unlike Firefox.


Qubes 3.1 doesn't have an fc24 template. 
Qubes 3.2 won't be released with fc23 because it's too late in testing, but 
will (does currently for the RC) have an fc24 template available.

It looks like chromium-53.0.2785.116-1.fc23 should now be in 'updates-testing' 
repo (since 2016-09-21 17:43:43Z), but it hasn't propagated far.

Out of 6 mirrors in Australia, only one here even had the previous 
53.0.2785.113-1.fc23.x86_64, in 'updates-testing', which is now ~8 days old.

YMMV, but looks like Fedora needs to drop some consistently slow mirrors: 
https://admin.fedoraproject.org/mirrormanager/propgation

Also, if fc23 users want Chromium, it needs package testers. 
https://fedoraproject.org/wiki/QA:Updates_Testing.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/638ea945-7e38-4d96-9e20-9e6d68e0b35c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] System still freezes, still no resolution.

2016-09-23 Thread Simon

Hello Drew,

I'm tired of having to re-do the work that gets lost if files get 
corrupted
or not saved properly, and also browsing information from things I'm 
doing.


I share your frustration. Which computer are you using? Are your 
applications
still running in the background (ie. only the graphical interface is 
frozen)

or is it a complete system freeze?

On my side I'm running Qubes on a Lenovo Thinkpad T500 and I just wrote 
a

similar request as yours just a few days ago:

https://groups.google.com/forum/#!topic/qubes-users/O4UO9CjO4TM

On my side the graphical display is frozen, and with KDE I managed to
workaround the issue by setting KWin to use XRender instead of OpenGL as
compositing engine. After that the system became rock-solid and I never
encountered such freeze anymore for months, while it happened about once 
a

week until that.

The sad thing is that Qubes has now switched to XFCE, the freezes came 
back

and I do not know any equivalent setting on XFCE. I recently tried to
completely disable compositing and am now crossing my fingers.

Regards,
Simon.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cbcb5184437ac80fb4bead50c187364c%40whitewinterwolf.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Dear qubes-users

2016-09-23 Thread Mr. Harrison
Dear qubes-users, 

I am long time qubes follower and user. I apologize in advance if anyone 
feels this request is spam. 

I am looking for two invite codes needed to sign up to anonymous 
riseup.net email service. 

I am hoping there are some qubes users who are riseup.net account 
holders. 

Can anyone please send me a couple of invite codes that I might be able 
to sign up? 

Thank you in advance.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ba06c510-0fd3-4908-8f8c-802d54e0cb94%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: BTRFS?

2016-09-23 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Connor,

> The tricky bit was to put it on a LUKS partition as somehow the
> installer encrypted only the swap partition.

https://github.com/QubesOS/qubes-issues/issues/2294 has a workaround.

Rusty
-BEGIN PGP SIGNATURE-
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=7Jna
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/527c132e-e52b-51ab-0d35-0449b3d37962%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to mount USB with ISO in Windows-Template

2016-09-23 Thread martin.forum
Hello,

I have successfully installed Qubes 3.2-rc3 (xfce yes) on a Lenovo Thinkpad X1 
Carbon (4th edition / 2016). After the installing issue, I have setup a Win7 
template by following the documentation. By the way - thank you for the 
documentation!

BUT - How can I mount an USB stick with an ISO-File in Win7 (to continue 
installing required software)?

If I have missed this answer in the documentation or my internet searchs, 
please point me towards the answer;-)

Thank you.

Martin

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2D289599-C46C-4F44-B225-B5B98D5ADDA7%40web.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: BTRFS?

2016-09-23 Thread Connor Page
Thanks Rusty. People should be aware of this. I think I did reclaim all space 
but fiddled too much with the settings. Anyway, it was a good excercise, I 
learned about btrfs, LUKS and dracut, that wouldn't happen otherwise.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/395b69cc-e910-4e59-a921-6acdfd6627a2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] BTRFS?

2016-09-23 Thread Chris Laprise

On 09/22/2016 07:12 PM, Marek Marczykowski-Górecki wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Sep 22, 2016 at 03:56:57PM -0700, Connor Page wrote:

In fact, I think the right question is "Will Qubes 4 be compatible with btrfs root 
if vm storage is expected to reside on a LVM thin pool?"

This is a good question. The new storage handling is flexible enough to
allow writing a module to handle btrfs even better than in Qubes 3.x.
But it is unlikely that we'll manage to write such module for 4.0. If
someone would contribute such module, then yes - it will be supported.
Otherwise, probably somehow around 4.1 or later.

- -- 


You realize that some of us have been happily using btrfs features with 
Qubes in a way that produces better work flows?


If ITL desires a modular storage layer, wouldn't the best approach be to 
offer a general image file module *first* to emulate the current 
architecture? That way, people can continue to have the same storage 
choices and backup procedures they already do.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b8adced-078d-8776-93b6-a212eed2e186%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] BTRFS?

2016-09-23 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Sep 23, 2016 at 07:42:07AM -0400, Chris Laprise wrote:
> On 09/22/2016 07:12 PM, Marek Marczykowski-Górecki wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> > 
> > On Thu, Sep 22, 2016 at 03:56:57PM -0700, Connor Page wrote:
> > > In fact, I think the right question is "Will Qubes 4 be compatible with 
> > > btrfs root if vm storage is expected to reside on a LVM thin pool?"
> > This is a good question. The new storage handling is flexible enough to
> > allow writing a module to handle btrfs even better than in Qubes 3.x.
> > But it is unlikely that we'll manage to write such module for 4.0. If
> > someone would contribute such module, then yes - it will be supported.
> > Otherwise, probably somehow around 4.1 or later.
> > 
> > - --
> 
> You realize that some of us have been happily using btrfs features with
> Qubes in a way that produces better work flows?
> 
> If ITL desires a modular storage layer, wouldn't the best approach be to
> offer a general image file module *first* to emulate the current
> architecture? That way, people can continue to have the same storage choices
> and backup procedures they already do.

File backend is also available, but we haven't added new features to it
(like multiple snapshots etc).
Probably it could be easily extended to proper btrfs module (for example
by dropping dm-snapshot over files and simply use cp --reflink=always).

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJX5RlQAAoJENuP0xzK19cs4aoH/05E83Jvm/cfoD8ZHmTRjRfF
1fhgf4BK1ErC38Vt2HlHjTM7aXO84uRrLI7t+gRkJ14KIPu+JAWh7PSwaTummI7j
MH3EYNNEW/dMhm3eODAeLygFx78uhSzBTta0Y84eboe/uO/pLF0DRF2IwMSHOhhc
UVLyRTD/rlJ/0Um95PV8XYd0ZqOyFNgh208yrB36YaxDxlTxeLdHijKsltjqYggh
Z9C+MRwUm1SbPZYHjVMd8FmqJwy8R3dVJcqQzIM1jnO8B5bVULBOYSCxFGO8pX0d
BC6qu92j1nFFELrUDhK/LZtuxbV0P8QMfP//cBAHM9G9Si3+Mjfu1Wgm6hkADCI=
=+F6s
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160923120016.GY31510%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] BTRFS?

2016-09-23 Thread Chris Laprise

On 09/23/2016 08:00 AM, Marek Marczykowski-Górecki wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Sep 23, 2016 at 07:42:07AM -0400, Chris Laprise wrote:

On 09/22/2016 07:12 PM, Marek Marczykowski-Górecki wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Sep 22, 2016 at 03:56:57PM -0700, Connor Page wrote:

In fact, I think the right question is "Will Qubes 4 be compatible with btrfs root 
if vm storage is expected to reside on a LVM thin pool?"

This is a good question. The new storage handling is flexible enough to
allow writing a module to handle btrfs even better than in Qubes 3.x.
But it is unlikely that we'll manage to write such module for 4.0. If
someone would contribute such module, then yes - it will be supported.
Otherwise, probably somehow around 4.1 or later.

- --

You realize that some of us have been happily using btrfs features with
Qubes in a way that produces better work flows?

If ITL desires a modular storage layer, wouldn't the best approach be to
offer a general image file module *first* to emulate the current
architecture? That way, people can continue to have the same storage choices
and backup procedures they already do.

File backend is also available, but we haven't added new features to it
(like multiple snapshots etc).
Probably it could be easily extended to proper btrfs module (for example
by dropping dm-snapshot over files and simply use cp --reflink=always).

- -- 


Good to know there is a file back end.

I also was thinking about having qvm-backup reference a particular 
'backup' pool which points to a subvolume containing all the vms the 
user wishes to backup; Then differential backups could be done quite 
easily with 'btrfs send' without a lot of overhead. And vms could very 
easily be moved in/out of the backup pool/subvolume pairing.


But that may be too filesystem-specific for the new storage layer.

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c91f4586-a8a3-255d-f5fb-d5a177e05355%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] exit code 1 of qubes.RecieveUpdate, what does it mean? Failing to install dev packages in dom0

2016-09-23 Thread tobbeydo
Dear gods,

I'm trying to install zfsonlinux in dom0. One of the first steps is to install 
the packages needed to build the DKMS modules. 

I recieve exit code 1 and I don't know what to do. Needless to say I'm new to 
Qubes.

  '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates 
/usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed 
with exit code 1!

Here are the details

$ cat dom0installdev.sh 
sudo qubes-dom0-update dkms kernel-devel zlib-devel libuuid-devel 
libblkid-devel lsscsi bc autoconf automake binutils bison flex gcc gcc-c++ gdb 
gettext libtool make pkgconfig redhat-rpm-config rpm-build strace 

$ bash dom0installdev.sh 
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some 
time...
Running command on VM: 'sys-firewall'...
Last metadata expiration check: 14:18:18 ago on Thu Sep 22 23:55:13 2016.
Package binutils-2.25-17.fc23.x86_64 is already installed, skipping.
Package gettext-0.19.8.1-1.fc23.x86_64 is already installed, skipping.
Package make-1:4.0-5.1.fc23.x86_64 is already installed, skipping.
Package pkgconfig-1:0.28-9.fc23.x86_64 is already installed, skipping.
Dependencies resolved.

 PackageArch   Version Repository  Size

Installing:
 autoconf   noarch 2.69-21.fc23fedora 709 k
 automake   noarch 1.15-4.fc23 fedora 695 k
 bc x86_64 1.06.95-15.fc23 fedora 122 k
 bison  x86_64 3.0.4-3.fc23updates684 k
 cppx86_64 5.3.1-6.fc23updates8.3 M
 dkms   noarch 2.2.0.3-34.git.9e0394d.fc23 updates 82 k
 dwzx86_64 0.12-1.fc23 fedora 106 k
 elfutils   x86_64 0.166-1.fc23updates304 k
 file   x86_64 5.22-6.fc23 updates 66 k
 flex   x86_64 2.6.0-1.fc23updates315 k
 fpc-srpm-macrosnoarch 1.0-1.fc23  updates7.8 k
 gc x86_64 7.4.2-4.fc23fedora 104 k
 gccx86_64 5.3.1-6.fc23updates 19 M
 gcc-c++x86_64 5.3.1-6.fc23updates9.8 M
 gdbx86_64 7.10.1-31.fc23  updates3.2 M
 ghc-srpm-macrosnoarch 1.4.2-2.fc23fedora 8.2 k
 glibc-develx86_64 2.22-18.fc23updates914 k
 glibc-headers  x86_64 2.22-18.fc23updates497 k
 gnat-srpm-macros   noarch 2-1.fc23fedora 8.4 k
 go-srpm-macros noarch 2-3.fc23fedora 8.0 k
 guile  x86_64 5:2.0.11-7.fc23 updates3.9 M
 islx86_64 0.14-4.fc23 fedora 490 k
 kernel-devel   x86_64 1000:4.4.14-11.pvops.qubes  qubes-dom0-current  10 M
 kernel-headers x86_64 4.7.3-100.fc23  updates1.0 M
 libatomic_ops  x86_64 7.4.2-9.fc23updates 32 k
 libbabeltrace  x86_64 1.2.4-2.fc23fedora 151 k
 libblkid-devel x86_64 2.28-2.fc23 updates 76 k
 libipt x86_64 1.4.3-1.fc23updates 38 k
 libmpc x86_64 1.0.2-4.fc23fedora  55 k
 libstdc++-develx86_64 5.3.1-6.fc23updates1.8 M
 libtoolx86_64 2.4.6-8.fc23updates707 k
 libuuid-devel  x86_64 2.28-2.fc23 updates 87 k
 lsscsi x86_64 0.28-2.fc23 fedora  56 k
 m4 x86_64 1.4.17-8.fc23   fedora 266 k
 mpfr   x86_64 3.1.3-2.fc23updates214 k
 ocaml-srpm-macros  noarch 2-3.fc23fedora 8.1 k
 patch  x86_64 2.7.5-2.fc23fedora 123 k
 perl-Data-Dumper   x86_64 2.158-347.fc23  fedora  55 k
 perl-Math-BigInt   noarch 1.9997-354.fc23 updates189 k
 perl-Thread-Queue  noarch 3.11-1.fc23 updates 22 k
 perl-generatorsnoarch 1.06-2.fc23 updates 15 k
 perl-srpm-macros   noarch 1-17.fc23   fedora 9.7 k
 python-srpm-macros noarch 3-7.fc23updates8.1 k
 redhat-rpm-config  noarch 37-1.fc23.1 updates 59 k
 rpm-build  x86_64 4.13.0-0.rc1.13.f

Re: [qubes-users] exit code 1 of qubes.RecieveUpdate, what does it mean? Failing to install dev packages in dom0

2016-09-23 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Sep 23, 2016 at 05:37:21AM -0700, tobbe...@gmail.com wrote:
> Dear gods,
> 
> I'm trying to install zfsonlinux in dom0. One of the first steps is to 
> install the packages needed to build the DKMS modules. 
> 
> I recieve exit code 1 and I don't know what to do. Needless to say I'm new to 
> Qubes.
> 
>   '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates 
> /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed 
> with exit code 1!
> 
> Here are the details
> 
> $ cat dom0installdev.sh 
> sudo qubes-dom0-update dkms kernel-devel zlib-devel libuuid-devel 
> libblkid-devel lsscsi bc autoconf automake binutils bison flex gcc gcc-c++ 
> gdb gettext libtool make pkgconfig redhat-rpm-config rpm-build strace 
> 
> $ bash dom0installdev.sh 
> Using sys-firewall as UpdateVM to download updates for Dom0; this may take 
> some time...
> Running command on VM: 'sys-firewall'...
(...)
> '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates 
> /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed 
> with exit code 1!

Check /var/log/qubes/qrexec.sys-firewall.log. I'd guess it is something
about package signature verification.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJX5SysAAoJENuP0xzK19csViUH/393OTRWN1Ao73yBJcYP6z+s
3LIRZw1eFHQWXrhscmWU3dIzln03/HVT6TNaTnQ4ropAgZuqjLf7AGG1GeORhA3a
F8GGZ62P+4GtPNll+AQRE94w/nio+towYYR1Jo0xPBa/3ybBtWq6EqqHDhN9i/CA
Mq43IRh2R9t/9Fngw78Tf7YL60DDGbXlRgeW2X/DyTkY9ujr1XDdBjpuN+9NTj6y
fq5BfPfsb3k9+WNyyahCl90/UnaxgbmBsItuYcFPIKko0hd0NKloe3I8a1m9MG7A
vW2o+jVLA8bmCpHK09UR52qvg9a4JRqkIGImjG5jTQ2hxS8GRWqFF+kZo4/RSfQ=
=L0XW
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160923132252.GZ31510%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Nix desktop shortcuts in dom0

2016-09-23 Thread marc
Hi. Finally I get some light from the other side :)

It seems that freedesktop Desktop Menu Specification defines an environment 
variable which should contain a path with all directories with .desktop files:

https://specifications.freedesktop.org/menu-spec/menu-spec-latest.html#paths

$XDG_DATA_DIRS/applications/

This directory contains a .desktop file for each possible menu item. 
Each directory in the $XDG_DATA_DIRS search path should be used (i.e. desktop 
entries are collected from all of them, not just the first one that exists). 
When two desktop entries have the same name, the one appearing earlier in the 
path is used.

The  element in a menu file indicates that this default 
list of desktop entry locations should be scanned at that point. If a menu file 
does not contain , then these locations are not scanned. 

I have looked at `qvm-sync-appmenus` and I don't see it reading that variable. 
Can anyone confirm this point?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b8d872e0-82ef-40d4-84c9-3ec843d9439a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Nix desktop shortcuts in dom0

2016-09-23 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Sep 23, 2016 at 06:45:43AM -0700, m...@lamarciana.com wrote:
> Hi. Finally I get some light from the other side :)
> 
> It seems that freedesktop Desktop Menu Specification defines an environment 
> variable which should contain a path with all directories with .desktop files:
> 
> https://specifications.freedesktop.org/menu-spec/menu-spec-latest.html#paths
> 
> $XDG_DATA_DIRS/applications/
> 
> This directory contains a .desktop file for each possible menu item. 
> Each directory in the $XDG_DATA_DIRS search path should be used (i.e. desktop 
> entries are collected from all of them, not just the first one that exists). 
> When two desktop entries have the same name, the one appearing earlier in the 
> path is used.
> 
> The  element in a menu file indicates that this 
> default list of desktop entry locations should be scanned at that point. If a 
> menu file does not contain , then these locations are not 
> scanned. 
> 
> I have looked at `qvm-sync-appmenus` and I don't see it reading that 
> variable. Can anyone confirm this point?

Yes, I can confirm:

[user@testvm ~]$ cat /etc/qubes-rpc/qubes.GetAppmenus 
find /usr/share/applications/ /usr/local/share/applications/ -name 
'*.desktop' -print0 2>/dev/null | \
 xargs -0 awk '
 BEGINFILE { entry="" }
 /^\[/ { if (tolower($0) != "\[desktop entry\]") 
nextfile } 
 /^Exec=/ { entry = entry FILENAME 
":Exec=qubes-desktop-run " FILENAME "\n"; next }
 /^NoDisplay *= *true$/ { entry=""; nextfile }
 /=/ { entry = entry FILENAME ":" $0 "\n" }
 ENDFILE { print entry }
 ' 2> /dev/null

It uses /usr/share/applications/ /usr/local/share/applications/
directly.

Does Nix set $XDG_DATA_DIRS?

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJX5TSyAAoJENuP0xzK19cscQUIAI2+H8DxFxl8Wd/XyadzMZkZ
fjaPauYubkajzGLCmceuHYriNs1IFEYVTw98aYIq2Z23qdTJvyBt3FaQ6elj40Zr
SSxUmF3b0mBCT428idn3v5LobmMrKNdjaLBZy0MNDY3dxWNRRfzHAuD+4Ohfvtsp
W9UJAmbuivj8DbxG7w3OBMvdlUWBmP7kkcmNlO08557yOvOnA60Z2No3aRBaI6VO
De7KEkM9vak/BFX1T9yHJquuTCQ3QPHM6spN7F2sJmnp5e1CxO00qdNj2FbZEZGF
UcpNtO0Io7Qwefi/UieuFXvBlkny2DQri9Y404GE8xg4P2lRSGvK0oEFbI78b6Y=
=VliW
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160923135706.GA31510%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Nix desktop shortcuts in dom0

2016-09-23 Thread Marc Busqué

It uses /usr/share/applications/ /usr/local/share/applications/
directly.

Does Nix set $XDG_DATA_DIRS?


I think it doesn't. At least, it didn't set it during my installation.
But it could be set manually.

Furthermore, I don't see this variable set in debian and template VMs. I
don't have "canonical" fedora/debian machines to test it there. If it is
set there, I think qubes should follow the convention. But then, that
variable should also be set in debian/fedora VMs.

What do you think?


Marc Busqué
http://waiting-for-dev.github.io/about/

[qubes-users] Re: How to mount USB with ISO in Windows-Template

2016-09-23 Thread grzegorz . chodzicki
W dniu piątek, 23 września 2016 12:58:27 UTC+2 użytkownik martin.forum napisał:
> Hello,
> 
> I have successfully installed Qubes 3.2-rc3 (xfce yes) on a Lenovo Thinkpad 
> X1 Carbon (4th edition / 2016). After the installing issue, I have setup a 
> Win7 template by following the documentation. By the way - thank you for the 
> documentation!
> 
> BUT - How can I mount an USB stick with an ISO-File in Win7 (to continue 
> installing required software)?
> 
> If I have missed this answer in the documentation or my internet searchs, 
> please point me towards the answer;-)
> 
> Thank you.
> 
> Martin

attach the block device to a VM and then use qvm-start Win7VMName 
--drive=NameofVMHoldingUSBStick/path/to/stick

Alternatively create an iso out of it

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7eb93273-e56d-4a8d-acb0-b4014c276f6d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fullscreen mode and/or single mouse pointer with Linux HVM?

2016-09-23 Thread Otto Kratik
On Thursday, September 22, 2016 at 7:54:31 PM UTC-4, Andrew David Wong wrote:
> There are certainly Qubes-specific customizations that will cause a Debian
> TemplateVM (or StandaloneVM created from the Qubes Debian TemplateVM) to
> be different from a Debian HVM. 

Thanks again. Just to clarify, there is no actual step required to create a 
StandaloneVM "from" a TemplateVM, correct? All I am doing is cloning the 
standard Debian 8 TemplateVM and then operating that TemplateVM independently, 
treating effectively it as a StandaloneVM. Meaning, installing software in it 
and then then running that software directly in/from it, instead of creating 
AppVM's based on it and running the software from those.

If there is an extra step needed to transform a TemplateVM into a true 
StandaloneVM (not a full HVM) I am not aware of it, or doing it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51efa6fe-5174-4d1c-b35a-c9e05a569a1b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] 3.0 to 3.1 in place upgrade broke USB VMs

2016-09-23 Thread 'Vincent Adultman' via qubes-users
The in place upgrade from 3.0 to 3.1 broke my two USB VMs (one controller with 
ports, one controller with devices) which were both set to auto start and 
working on 3.0.

The error is similar to that where devices are assigned to another running VM - 
this is not the case however.

livirt.libvirtError: Requested operation is not valid: PCI device xyz is in use 
by driver xenlight, domain usbvm

sys-net still auto starts and everything else seems to work. Both VMs start 
fine without the USB devices assigned.

I've tried hiding the devices from dom0 in case this made any difference using 
the kernel line in the docs, but this has made no difference.

TIA

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ULyzjiM2Df5aepri0VxtxWHI2MoeVyJaqxvwKW3hJdBdKlHVpn5jeDbtZmsk0G69lRRdp-9vAoVpIID2ska-Pgn_pJ8DvJ0BzmrTV3I45sw%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Nix desktop shortcuts in dom0

2016-09-23 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Sep 23, 2016 at 04:53:10PM +0200, Marc Busqué wrote:
> > It uses /usr/share/applications/ /usr/local/share/applications/
> > directly.
> > 
> > Does Nix set $XDG_DATA_DIRS?
> 
> I think it doesn't. At least, it didn't set it during my installation.
> But it could be set manually.

If it doesn't, supporting XDG_DATA_DIRS would not help with Nix.

Current implementation simply assume default value, according to
spec[1]:

If $XDG_DATA_DIRS is either not set or empty, a value equal to
/usr/local/share/:/usr/share/ should be used. 

[1]
https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJX5Zg3AAoJENuP0xzK19cssTkIAJMRv/CE08ujWAtKXH2d6gAa
gLtJ7X+XTOTSRLFlzg6ry7ndiiukFIHFzqmgIoPWTf3+9BpsBJKGWrLyY/hDmx+5
K5iUHkRXSd2DzKmDa6QMNZxsL3+NvIYSZzWxT4k9LJLCCjEWn0r1nX2h7OYcRwwE
Nwhur4i3XouECfJ4iryYcbVkqWG0sVDGbGE1JaGrgtqqtVqNYFAt93wsbJpffIRK
JqmjBTEczlHt+zgXiGJp2//4oXevfAN5ahF6UoGRXvI1AWfwnh0aLvxnCi9id6Mu
3jGttmLPQq85BSu9Klc8gLyrGBIxO2QBBORMdlzSjI+mvEewcR+cRZ+6/7GSn7g=
=UrXO
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160923210143.GE31510%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Is it possible to have 2 Net VMs - one for Ethernet, another for WiFi..?

2016-09-23 Thread neilhardley
I want to have 2 Net VMs running at the same time.

One would hold Ethernet in "Devices"

The other would hold WiFi in "Devices"

Is this possible?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1825a2b3-2e29-4df1-89e5-20c57c37595b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Upgrade fedora 21 to 23

2016-09-23 Thread katerimmel
Hello
After upgrading qubes 3.0 to 3.1 I needed to do the same with fedora
template. I run this command:

sudo qubes-dom0-update qubes-template-fedora-23

and this

sudo yum remove qubes-template-fedora-21

I haven't considered the others explained in the tutorial "Upgrading the
Fedora 21 Template"

Is it the same?

Regards



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/563583566c388917fb75bd549ddccd86.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to add a "sys-firewall" to a NetVM..?

2016-09-23 Thread neilhardley
I created a new NetVM to use debian8, rather than fedora-23

It all works fine.

But I noticed that the original "sys-net" has a "sys-firewall" tied to it.

Do I need to add something like this for my new Net VM, and if so, how do I do 
it..?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/88743796-2866-4900-8ec6-3ced381fc0fc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Adding shortcuts to desktop for commonly used apps like untrusted firefox

2016-09-23 Thread joe yuser
Hi,

I'm a qubes-os newbie, so I'm probably missing something obvious, but am asking 
to be sure.

I can add additional icons in the xfce vm menus with no issues, but I can't 
find a way to send a copy to the desktop. I don't know if I'm having a menu or 
touchpad click issue, but I can only launch the app with a left click, or 
straight into edit mode of the launcher with a right click. 

If I create a new launcher, put in the same values under edit, I can launch the 
app in the vm I want, but the icon isn't available, only generic ones without 
coloring.

This is on an HP Envy 360. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/92d2bc40-c27d-4908-ac49-bc530f33dbe7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Thunderbird: "Open link in DispVM"

2016-09-23 Thread Robert Mittendorf

Hello everyone,

working with Qubes I think it is a good idea to open links from mails 
(Thunderbird) in a DispVM.
This way you can open "verify registration" links without having the 
need to allow full internet access to the mail VM or using cross-VM c&p.
I thought about writing a Thunderbird extension, but in fact it is even 
easier to do that. In settings-> attachments -> receive (or similar, I 
don't use the English Thunderbird version) you can set handlers for 
http, https and ftp.


I could not figure out how to handle parameters properly, so I wrote a 
small "script";


Thunderbird calls (you dont need to enter the %url% string, it is 
appended automatically)


run_dispFox.sh %url%

This script utilizes the cubes tools by calling

/usr/bin/qvm-run --dispvm firefox $1

and Firefox opens up in a DispVM.

Now mail VM only needs access to the webserver and the update-servers of 
the thunderbird add-ons (usually AMO).


BUT: I can only open up 1 URL at a time. If there is an DispVM with 
Firefox already, the URL will not be opened in Firefox in a DispVM (not 
in the existing window and not in a new one).


--
M. Sc. Informatik Robert Mittendorf

DigiTrace GmbH - Kompetenz in IT-Forensik
Geschäftsführer: Alexander Sigel, Martin Wundram
Registergericht Köln, HR B 72919
USt-IdNr: DE278529699

Zollstockgürtel 59, 50969 Köln
Telefon: 0221-6 77 86 95-2
Website: www.DigiTrace.de
E-Mail: i...@digitrace.de

Haben Sie schon den DigiTrace-Newsletter abonniert?
http://www.digitrace.de/de/service/newsletter

DigiTrace ist Partner der Allianz für Cyber-Sicherheit
sowie Mitglied im nrw.units Netzwerk für IT-Sicherheit:
https://www.allianz-fuer-cybersicherheit.de
http://www.nrw-units.de/netzwerk/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/45a823a4-8706-c58b-765d-081346b0ab90%40digitrace.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Adding shortcuts to desktop for commonly used apps like untrusted firefox

2016-09-23 Thread joe yuser
On Friday, September 23, 2016 at 8:52:04 PM UTC-5, joe yuser wrote:
> Hi,
> 
> I'm a qubes-os newbie, so I'm probably missing something obvious, but am 
> asking to be sure.
> 
> I can add additional icons in the xfce vm menus with no issues, but I can't 
> find a way to send a copy to the desktop. I don't know if I'm having a menu 
> or touchpad click issue, but I can only launch the app with a left click, or 
> straight into edit mode of the launcher with a right click. 
> 
> If I create a new launcher, put in the same values under edit, I can launch 
> the app in the vm I want, but the icon isn't available, only generic ones 
> without coloring.
> 
> This is on an HP Envy 360.

update: I am successful with icon & color if I copy launcher from 
/var/lib/qubes/appvms/untrusted/apps/ , just wondering if I'm missing a better 
way.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21ae17b2-20fe-43cd-80e0-697deb9cf706%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to add a "sys-firewall" to a NetVM..?

2016-09-23 Thread Chris Laprise

On 09/23/2016 08:02 PM, neilhard...@gmail.com wrote:

I created a new NetVM to use debian8, rather than fedora-23

It all works fine.

But I noticed that the original "sys-net" has a "sys-firewall" tied to it.

Do I need to add something like this for my new Net VM, and if so, how do I do 
it..?

Thanks



You can just go into the settings for sys-firewall and change the 
template to debian and the 'netvm' to point to the new netvm.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2b0a0830-95bd-54bc-b35a-3a528958fd17%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is it possible to have 2 Net VMs - one for Ethernet, another for WiFi..?

2016-09-23 Thread Chris Laprise

On 09/23/2016 07:34 PM, neilhard...@gmail.com wrote:

I want to have 2 Net VMs running at the same time.

One would hold Ethernet in "Devices"

The other would hold WiFi in "Devices"

Is this possible?



Yes, just don't assign the same PCI devices to the different vms. One vm 
should have only ethernet, and the other vm only wifi.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e33afa13-3124-c313-13c2-c7e246849365%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.