[qubes-users] 3.2 on Lenovo T430u Install good but hangs on boot

2016-10-22 Thread R K

I have all the settings here in place:

https://www.qubes-os.org/doc/lenovo450-tinkering/
Setting UEFI options to get Qubes install to boot

1. Enable Legacy USB mode
2. Disable all Secure Boot and UEFI options, but leave this enabled: 
Config / USB / USB UEFI BIOS SUPPORT

3. Save settings and reboot
4. Install Qubes

It appears I have Qubes-os 3.2 installed correctly, but upon boot I get 
the bios screen (Pheonix SecureCore tiano 2.02) and then hangs. No four 
penguins, no grub. What is my next step?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5d10f902-ffeb-c5e1-b57a-6e27375af670%40runbox.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Can't figure out how to install a couple of things in dom0

2016-10-22 Thread cestarian
I need to install the following things:

Krita 3.0.1 (I tried to use the appimage that they provide but I get an error 
about not finding something like libfuse.so)
xorg wacom tablet drivers

And although this is not quite decided yet, I may or may not need to install
Nvidia Proprietary Drivers and Optirun/Bumblebee (On a laptop)

I know the nvidia thing is in RPMFusion but I'm not sure if I should just add 
the rpmfusion repository the same way I would on fedora 22 or if there's a 
qubesos specific approach for it.

My only ideas for getting my hands on the other two packages was to enable some 
fedora repositories (like rawhide which has the krita package I need) and then 
install them from there, but I'm not sure if that would be a very good idea. 
The reason I need krita on dom0 is mostly for the hardware accelerated graphics 
capability, since it's just a digital painting application I don't see any harm 
in having it on dom0 and if I run it from a VM it'll of course run slower.

How should I go about achieving this?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f7419f8d-b351-4e73-a3b1-d62f30f47cef%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Multiple monitors partially broken in Debian and Whonix AppVM's

2016-10-22 Thread Jeremy Rand
Jeremy Rand:
> If I install LibreOffice in a Fedora 23 Template using Qubes 3.2, the
> "Presentation Display" setting works properly with no issues, so I can
> see my notes on my main display and the presentation shows up on my
> external display.
> 
> However, this doesn't work properly under Debian 8 or Whonix 13.  It
> seems that both the notes window and the presentation window show up on
> the main display, and are forced to the resolution of the main display.
> I can drag the presentation window to the external display and maximize
> it, but its window size remains at the resolution of my main display.
> Since my main display is much higher resolution than the external
> display, the result is that the presentation appears zoomed in, with
> much of the border cut off.
> 
> Note that I'm using the jessie-backports version of LibreOffice in my
> Debian/Whonix VM's.
> 
> Any idea what might be causing this?
> 
> Cheers,
> -Jeremy Rand

Hello,

This problem is still occurring for me.  Does anyone know what might be
causing it?

Cheers,
-Jeremy


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc4b31c6-2718-1f07-fd23-62f993b75d1d%40airmail.cc.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Re: Persistant routes on Qubes are not persistant?!

2016-10-22 Thread Unman
On Sat, Oct 22, 2016 at 11:23:18PM +, 4ok80g+4fl8s3n7pesd8 via qubes-users 
wrote:
> I assume you meant to say rc.local, as this has nothing to do with iptables 
> nor the qubes-firewall-user-script.
> In any case, this suggestion in itself is a huge hammering. The sys-firewall 
> shouldn't have to change the qubes-uplink-eth0 (Network Manager 
> configuration) in the first place and that is the whole problem here.
> 
> I could have set the file with the immutable flag on, I could have created a 
> rc.local script...etc
> I could have done many workarounds, but these would be, as the name implies, 
> workarounds. What I want to know is to know why the static routes on the NM 
> configuration are being overwritten and how to avoid that.
> 
> So far not a single soul from the qubes project has mentioned a single word 
> about this and this is simply unacceptable! This mailing list is been 
> abandoned! 
> Point proven - all the contacts for the ML and the help section were removed 
> from the main site. The page https://www.qubes-os.org/help/ is now redirected 
> to https://www.qubes-os.org/doc/ .
> 
> Is this project over before it has taken off?!?
> 
I think you should calm down.

>From what I can see someone replied to you pretty quickly, asking for
information and telling you that it worked for them. You dont appear to
have responded to that, or provided more information.
They pointed you to /rw/config/NM-system-connections.

So, why not respond to JJ, who tried to help you?
Set a route in NM.
Then check to see that it is reflected in
/rw/config/NM-system-connections

What template are you using?
Are other network settings retained between boots?







-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161023002637.GB7845%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Persistant routes on Qubes are not persistant?!

2016-10-22 Thread 4ok80g+4fl8s3n7pesd8 via qubes-users
I assume you meant to say rc.local, as this has nothing to do with iptables nor 
the qubes-firewall-user-script.
In any case, this suggestion in itself is a huge hammering. The sys-firewall 
shouldn't have to change the qubes-uplink-eth0 (Network Manager configuration) 
in the first place and that is the whole problem here.

I could have set the file with the immutable flag on, I could have created a 
rc.local script...etc
I could have done many workarounds, but these would be, as the name implies, 
workarounds. What I want to know is to know why the static routes on the NM 
configuration are being overwritten and how to avoid that.

So far not a single soul from the qubes project has mentioned a single word 
about this and this is simply unacceptable! This mailing list is been 
abandoned! 
Point proven - all the contacts for the ML and the help section were removed 
from the main site. The page https://www.qubes-os.org/help/ is now redirected 
to https://www.qubes-os.org/doc/ .

Is this project over before it has taken off?!?






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/972486e4bde681b07c93a4093ad0f5018d26%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Persistant routes on Qubes are not persistant?!

2016-10-22 Thread Adrian Rocha
Hi,

Did you try adding the commands in /rw/config/qubes-firewall-user-script file, 
as is indicated in the documentation?

https://www.qubes-os.org/doc/qubes-firewall/

Regards

El sábado, 22 de octubre de 2016, 12:54:54 (UTC-6), 
4oe3ad+c69...@guerrillamail.com escribió:
> Unfortunately this Mialing list seems dead. 
> I've opened this issue, that is specific to the Qubes architecture, for over 
> a week now and so far no one was able to pinpoint to the solution or explain 
> why static routes are being overwritten on boot.
> 
> It seems that this ML is only breathing, beacuse of the individual effort of 
> its users. To the date, no one from the official team 
> (https://www.qubes-os.org/team/) was able to chip in or give any answer.
> 
> This is a bad start for this project, lack of support is one of the reasons 
> why some projects are not successful.. 
> 
> And to think I was about to give some donations for this project
> 
> 
> 
> 
> 
> 
> Sent using Guerrillamail.com
> Block or report abuse: 
> https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b1f81c8d-ec22-4fa2-ae75-977b378b3588%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HVM win7 installation - crash

2016-10-22 Thread 0132784091278340917832409217
Hello,

I tried to installed win7 into a HVM via 

qvm-start win7 --cdrom=/dev/cdrom

The copying of the files are much faster, I updated QR32,

but I run always into the same windows blue screen.

*** STOP: 0x00101 (0x0031 ...

How I can install Win7 into QR32, so I would like to run PB7 under full 
features in this way, until I can switch to qubes, if my workflows are running 
fast and easy?

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/919ff3a0-76f8-4dcf-a4f1-d542c6f04e7a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is there a Step-By-Step Tutorial for extending the main Qubes LUKS /dev/sda2 partition?

2016-10-22 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Oct 22, 2016 at 06:01:07PM +0200, Que Bees wrote:
> 
> I recently upgraded my harddrive (750GB) and cloned over my old harddrive 
> (380GB) which had a default Qubes 3.2 installation on it. Now I'd like to add 
> the unused additional space to the main Qubes partition which appears to be 
> /dev/sda2 and is LUKS encrypted. 
> 
> What is the most efficient way of accomplishing this, is there an existing 
> tutorial written specifically for Qubes?
>  
> Is there some sort of Qubes recovery mode I can boot to for this operation? 
> Or should I create an Ubuntu LiveCD and following this guide at 
> https://help.ubuntu.com/community/ResizeEncryptedPartitions:
> 
> Boot the desktop, live CD. Use gparted (or any tool) to put unallocated space 
> adjacent, and to the left of your Crypt partition. 
> Enlarge the Partition storing the crypt with fdisk. 
> Reboot ~ You should always reboot after changing your partition table with 
> fdisk. 
> Boot the desktop, live CD. Install & configure the tools (lvm2 and 
> cryptsetup). 
> Enlarge the Crypt with cryptsetup. 
> Enlarge the (LVM) Physical Volume with pvresize. 
> Enlarge the (root) (LVM) Logical Volume with lvresize. 
> Enlarge the (root) file system with resize2fs. 
> Reboot to your encrypted hard drive. 

The above list looks good. You can use recovery mode from Qubes
installation disk.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYC8fWAAoJENuP0xzK19cslqIH/R6HeEYqs57PaYiDu/TTx2S0
w4XeRwf9GRNMfBzvUhJpr1pZm8WG7EyMWot2ZW2EW2hj8TbxnyuW9Pu1wg/4YPTh
YvKqiLuITXCrFHKHjYvJMmq/b31oyp3+zEdX8M/V1wQbP37LJCoJT7nPv+XsAVaw
wNob4Q5OpciR2+G0j1v1a9O4qdwt/eP0G5IDk+6eA8nA/kcq/+4aldZFwAW+kPgF
YPeDaNmGMbfLycO8W+5qDa1imjScoSu8OA+AgX7JSRSAtU2KuOo21D5TSAKuVqCu
ed77x/VMEZEV42My1xkKzEs84pPcBTr10DPkCU1fRCB/Zlzl0rJJdgjrdRDuohg=
=Fh5Z
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161022201102.GJ1136%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes Windows Tools 3.2.2-3 released

2016-10-22 Thread Eva Star
I'm not sure, but I got the error when I'm update my template with 
previous installeted Windows Tools:


https://i.imgur.com/1MPczCY.png

But after that installer run again... and Qubes Windows Tools installer 
run every time when system start, but seems all work fine.


https://i.imgur.com/Ok6Kktz.png


Thanks!

--
Regards

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3082a8b7-5d37-f657-f9ad-05bddaf7ab21%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Inconsistent Screen Resolution for Fedora VMs

2016-10-22 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Oct 22, 2016 at 07:15:16AM +, Jeremy Rand wrote:
> xmee...@gmail.com:
> > I just did a clean install of Qubes 3.2. For some reason the resolution off 
> > apps in Fedora VMs is wildly inconsistent. The borders of the windows, 
> > dom0, and the Debian VMs are correct but the apps in Fedora VMs range from 
> > consistent with the others to so low as to be almost unusable. I can't 
> > figure out what causes them to change and xrandr outputs the same thing no 
> > matter what the displayed resolution is.
> 
> I think this occurred for me a few weeks ago.  If I recall correctly,
> the HiDPI settings in GNOME had somehow been set to 0.  No magnification
> is 1, double magnification is 2.  0 gets interpreted as 2, for reasons
> that only the GNOME people are likely to understand.

I've looked at gnome-settings-daemon code and AFAIR those reasons are:
1. Have DPI at least 192, and
2. Have vertical resolution at least 1200.

Relevant code:
https://github.com/GNOME/gnome-settings-daemon/blob/master/plugins/xsettings/gsd-xsettings-manager.c#L233-L241

#define DPI_FALLBACK 96

/* The minimum resolution at which we turn on a window-scale of 2 */
#define HIDPI_LIMIT (DPI_FALLBACK * 2)

/* The minimum screen height at which we turn on a window-scale of 2;
 * below this there just isn't enough vertical real estate for GNOME
 * apps to work, and it's better to just be tiny */
#define HIDPI_MIN_HEIGHT 1200

There is also lengthy comment about it.
Anyway the above looks reasonable for me for automatically turning HiDPI
mode on. So, if it was incorrect, I'd guess something gone wrong with
retrieving input values (DPI, vertical resolution).

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYC8bcAAoJENuP0xzK19csryMH/11HnOzPwr1vQPfeWlmhymk6
uAMti9FHkTZEK4IWJWZDGaahd+Pos4Rav+wSmloV54n96AOrComKkz/LKk8t1VKl
mQIwPSbyDvoW3jJMz6Izd9+QK5fEEp7rP2ekhE2Me8sCENu/yRR2tx9zHbJQ7bza
yU1tLuuR6g334qMlTkdTX/6rRxJD6cpED9zjTJ3ZvFnAbCmuk10s57PKU6KTXogy
LaOTConyMeRSPBc2S6C9avMoylcR2YQ9suXEVo/nE8uQv7GuOS6eaTNIoXkUXuEf
3RfyhrVLAGBxu1i6S3WCOrzt+9X9PuXqpyLkq0WZ8Gxlh1+onoo35+si7ohiHiE=
=X8f7
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161022200652.GI1136%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Security announcement mailing list? [and others]

2016-10-22 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Oct 22, 2016 at 09:56:07PM +0200, Marek Marczykowski-Górecki wrote:
> On Fri, Oct 21, 2016 at 08:50:20PM -0700, Andrew David Wong wrote:
> > On 2016-10-21 15:47, Franz wrote:
> > > On Fri, Oct 21, 2016 at 4:00 AM, jkitt  wrote:
> > > 
> > >> Shouldn't a security focused distro make security announcement in a more
> > >> direct and urgent way? I was surprised to find that Qubes only had a
> > >> 'users' and 'development' mailing list.
> > >>
> > >>
> > 
> > Marek, what do you think about having a no-reply "qubes-announcements" 
> > mailing list?
> > 
> > Messages sent from qubes-announcements would also be duplicated to 
> > qubes-devel and possibly qubes-users so that people have a chance to 
> > discuss and ask questions.
> 
> I'm not sure if it worth it. There is not much such announcements. On
> the other hand, this may be exactly the reason for having a separate
> mailing list for this. For now, we have already some non-email channels
> for announcements:
>  - @QubesOS on twitter - every security and release announcement is
>duplicated there
>  - https://www.qubes-os.org/news/, with its RSS/Atom feed; but we don't
>link security announcements there - maybe we should start?
> 
> If you think additional ML channel would be useful, then sure, we can
> create one.

"would be useful" -> "those existing are not enough".

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYC8R4AAoJENuP0xzK19cssz8H/jiiY5oIPQn+aHSrCmv/Yxd9
UbD20hLqNiXdStIXorq3KKvJpprPu0ZM+8yMyfrrwmpKVRWDW5SPh+BnkhRORPik
QlrexmT9Us2Q8PedVyrwj9dhjkcuRPUsx/nApLyZ8FMTi5Hyb2hvToLX212FiCiv
+ng03V2EUZshmunN4BhVisDT6i5VziaDjxgKiydmqUNFUDXBC6O+pbxG6GWhwgZf
5RIrBZvH2r50HIwpuWGEJTXBeVcs58CWU3tNgJxJAfdY8FGVAIgeP40wwCmHltxX
HQsDIKcO2gD3Tc/ovSGM0PWcPCXWdStNRuK/cIzrrmyN/GGJOaxWeIOzfYQC5J8=
=H/qv
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161022195640.GG1136%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Security announcement mailing list? [and others]

2016-10-22 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Oct 21, 2016 at 08:50:20PM -0700, Andrew David Wong wrote:
> On 2016-10-21 15:47, Franz wrote:
> > On Fri, Oct 21, 2016 at 4:00 AM, jkitt  wrote:
> > 
> >> Shouldn't a security focused distro make security announcement in a more
> >> direct and urgent way? I was surprised to find that Qubes only had a
> >> 'users' and 'development' mailing list.
> >>
> >>
> 
> Marek, what do you think about having a no-reply "qubes-announcements" 
> mailing list?
> 
> Messages sent from qubes-announcements would also be duplicated to 
> qubes-devel and possibly qubes-users so that people have a chance to discuss 
> and ask questions.

I'm not sure if it worth it. There is not much such announcements. On
the other hand, this may be exactly the reason for having a separate
mailing list for this. For now, we have already some non-email channels
for announcements:
 - @QubesOS on twitter - every security and release announcement is
   duplicated there
 - https://www.qubes-os.org/news/, with its RSS/Atom feed; but we don't
   link security announcements there - maybe we should start?

If you think additional ML channel would be useful, then sure, we can
create one.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYC8RXAAoJENuP0xzK19cs8MgIAIEV8JJWXysyDB3k5ilvDUzQ
fmebsTcS75WU/2VkrFu5Qnj831N/17MsAFEvT4P8LmGm/N8wdtzpwnNc6/QrPtHc
XJtyI8Wa8TglXUPMfoz9PvVgIFnZgUh9WGXr01d57U0XTfy2PqGPvNKo8ccocftp
ijl189aYraicdoLzd8fhW6F+ngG/lR05aQ06bKWqztgBAmpmu4Wo1+o0zO/IMLYg
FB8Bp/5IVNKR5/eNsqtH4q6lubNCttIoYafjjGnUwGapF96FsIbWMrBfXDX993Wx
DJr+9PWp6BdYRWowAwgYEuwWYNUvl6ljZaO2Ojr/NJSe0SgZrakG7N1XV9Df4F0=
=N5DD
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161022195607.GF1136%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Persistant routes on Qubes are not persistant?!

2016-10-22 Thread 4oe3ad+c69c7b873rbzk via qubes-users
Unfortunately this Mialing list seems dead. 
I've opened this issue, that is specific to the Qubes architecture, for over a 
week now and so far no one was able to pinpoint to the solution or explain why 
static routes are being overwritten on boot.

It seems that this ML is only breathing, beacuse of the individual effort of 
its users. To the date, no one from the official team 
(https://www.qubes-os.org/team/) was able to chip in or give any answer.

This is a bad start for this project, lack of support is one of the reasons why 
some projects are not successful.. 

And to think I was about to give some donations for this project






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1418a5831ee4c312e0fc88994f0d57a5c611%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R3.2, cannot find redshift{-gtk} packages on dom0

2016-10-22 Thread pablo
On Saturday, October 22, 2016 at 9:15:27 AM UTC-3, srhgr wrote:
> 
> when I install the redshift-gtk it tries to find the geolocation but it 
> fails. how can I simply dimm the light like adjusting the audio volume with 
> redshift?

In order to have the feature that automatically adjust the screen color based 
on the time of day, you can set your location using a configuration file 
located in ~/.config/redshift.conf with this content:

[redshift]
location-provider=manual
[manual]
lat=-31.4
lon=-64.5

where you should put appropriate values for your actual location (or a matching 
timzone at least).

Regards,
///Pablo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9ad186c9-7146-4304-a229-cc64ed7d1e23%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Intel NUC NUC6i3SYK

2016-10-22 Thread Yuval Kogman
I'm not sure why qubes-hcl-report put underscores in the filename? Anyway, I 
left it as is in case it's of significance to anyone.

Installation just worked out of the box, no configuration required, with 
wireless networking, HDMI output, and USB keyboard/mouse.

This machine was only set up to ensure I can run my vm backups in case I do 
something terrible to my laptop, so I don't really have much to report as far 
as day to day use.

Installation was a little difficult as I had to do it blindly with tab & enter 
most of the way due to overscan issues. xrandr --output HDMI1 --set audio 
force-dvi sorted that, but I only found out about that after I got it 
installed. It would be easier if there was a way to resize/move the installer 
dialog window.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f7ee2b49-f299-49b5-bd5d-524b64666823%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-_-_-20161022-115904.yml
Description: Binary data


[qubes-users] Is there a Step-By-Step Tutorial for extending the main Qubes LUKS /dev/sda2 partition?

2016-10-22 Thread Que Bees

I recently upgraded my harddrive (750GB) and cloned over my old harddrive 
(380GB) which had a default Qubes 3.2 installation on it. Now I'd like to add 
the unused additional space to the main Qubes partition which appears to be 
/dev/sda2 and is LUKS encrypted. 

What is the most efficient way of accomplishing this, is there an existing 
tutorial written specifically for Qubes?
 
Is there some sort of Qubes recovery mode I can boot to for this operation? Or 
should I create an Ubuntu LiveCD and following this guide at 
https://help.ubuntu.com/community/ResizeEncryptedPartitions:

Boot the desktop, live CD. Use gparted (or any tool) to put unallocated space 
adjacent, and to the left of your Crypt partition. 
Enlarge the Partition storing the crypt with fdisk. 
Reboot ~ You should always reboot after changing your partition table with 
fdisk. 
Boot the desktop, live CD. Install & configure the tools (lvm2 and cryptsetup). 
Enlarge the Crypt with cryptsetup. 
Enlarge the (LVM) Physical Volume with pvresize. 
Enlarge the (root) (LVM) Logical Volume with lvresize. 
Enlarge the (root) file system with resize2fs. 
Reboot to your encrypted hard drive. 


Thank you!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/trinity-439914fd-2034-431a-a328-2317eae2c51e-1477152067547%403capp-mailcom-lxa06.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] A list of computers that do not "hold state"..?

2016-10-22 Thread neilhardley
Does anyone have a list of computers with no writable firmware..?

If you get hacked, hackers can deeply infect the BIOS, GPU, WiFi and other 
components that "hold state".

Then, even if you wipe your hard drive after getting infected, you can still 
just get re-infected again, due to the deep firmware infections.

The Raspberry Pi is an example of a device that does not "hold state".

Every component on the Raspberry Pi has its firmware and drivers loaded in from 
an SD card.

Thus, if you wipe the SD card, you have truly wiped the device, and can be sure 
that it is totally clean.

Does anyone have a list of similar devices to the Pi, that do not "hold state" 
on ANY of the components...?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f00af64b-c89e-4451-bec5-8667bc52a5ab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes Windows Tools 3.2.2-3 released

2016-10-22 Thread '019384'0194328'0194328'0
Hello,

thanks!

I look forward to use it soon, because Win7 is still central for my productive 
work flow.

Kind Regards

P.S. USBVM and audio-support would be very appreciated.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/64c61e31-9fe8-4836-88d7-2f7cd46fad06%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Most Secure way to encrypt your usb stick ?

2016-10-22 Thread 0137840913278409178243094213
Hello lakschmi,

you might check out a poly morph encryption PMC, but this runs inside Win7 on 
the application layer.

http://www.pmc-ciphers.com/xcontent/Applications/TurboCrypt.html

http://www.pmc-ciphers.com/xcontent/Software-products/TurboCrypt-Disk-Encryption/1024-Bit-Encryption.html

Up to now, nobody can crack the 38 Bit challenge.

But if you like to see it one day on linux, you might imitate some donation, 
today it is running on windows only with 256 bit.

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/afe7ea7b-dcc7-48a0-80da-81528eb79709%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes Windows Tools 3.2.2-3 released

2016-10-22 Thread Rafał Wojdyła
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi all,

We uploaded a new version of Qubes Windows Tools (3.2.2-3) to the
current-testing repository.

Changelog:
- - Updated Xen PV drivers to be in line with upstream
- - Private disk image is now initialized during setup making the
  install process require one less reboot
- - Added handler for qubes.OpenURL qrexec service
- - Fixed a bug that could make moving user profiles to the private
  image fail if there were files with ACLs explicitly disallowing SYSTEM
  access
- - Fixed handling qrexec service requests for non-existing services
- - Minor log readability improvements

- -- 
Rafał Wojdyła
Qubes Windows Tools developer
https://qubes-os.org/
-BEGIN PGP SIGNATURE-

iQEcBAEBCAAGBQJYC2jwAAoJEIWi9rB2GrW7/7cH/jx9JY5UozOG0hQC12J+clcb
RagLMypHGSg/0awxal1FpQar/TUS8uxPcoym6PEeWQliNTko5F3QYBVm49yl5R3c
GY13+bp3lQB9Iaj3pXAU2il5WJ0ZQmxPj6tISMMNQLIJs0/mADUuvuw9hJaiOfNR
Ho2WCv2eM4gnaJxKKhcZOlgX7abApHZreBaZkMxLpe4oZFHyYr/yH8bFOTIc8jGw
rP/nLGUjoUrMIZMyRlC7SMjafLbRDRCbN4RoRRsrIgbh/6NvoGLBU7qbnnmPE6Y0
ZfJWusvUrCLuO5c/+Ckbl+FnpItwqzmx2Q9Gj7Qxfprk2zLa+sb0UA+H/muZ5w4=
=ow4Z
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90fc2fd8-4006-ee62-c3d6-9f2fae8cd481%40invisiblethingslab.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Privacy issue in DisposableVMs

2016-10-22 Thread Manuel Amador (Rudd-O)
DisposableVMs have Firefox cookies for Google and other websites in
them, unless you have customized the homedir of the DVM as per the
instructions in the documentation pages.

To read the details, please refer to:

https://github.com/QubesOS/qubes-issues/issues/2390

To mitigate:

I recommend deleting the /etc/dispvm*tbz file from your DispVM template,
deleting all the *-dvm VMs, and recreating the DVM template with
qvm-create-default-dvm --default-template

-- 
Rudd-O
http://rudd-o.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47012b3e-f8cd-8528-791f-6fc423cb0c53%40rudd-o.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Most Secure way to encrypt your usb stick ?

2016-10-22 Thread Manuel Amador (Rudd-O)
On 10/22/2016 12:09 PM, lakschmi wrote:
> have sensitive data on your usb stick?
>
> whats the best way to encrypt/decrypt it?
>
>
>
> normally I use whonix-ws pgp and encrypt every file but Id rather have a 
> different method
>
>
>
> is there a way to install the tails os ecryption system in qubes os?
> I prefere it over the whonix workstation system.

Install gnome-disks on the template of whonix-ws (then power off
template, and power on the actual machine), then plug your USB, then use
qubes-manager to passthru the USB to your VM, then open gnome-disks.

>From there you can format the disk with LUKS encryption and FAT32 inside
the encrypted container.

After doing so, every time you plug it back in, and pass it thru, just
open the file manager and click on the drive in the sidebar.  This will
prompt you for your password and voila, decrypted.

-- 
Rudd-O
http://rudd-o.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8a6a0213-e121-6cb2-669b-42712640ceb7%40rudd-o.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Most Secure way to encrypt your usb stick ?

2016-10-22 Thread 7v5w7go9ub0o



On 10/22/2016 12:09 PM, lakschmi wrote:

have sensitive data on your usb stick?

whats the best way to encrypt/decrypt it?



normally I use whonix-ws pgp and encrypt every file but Id rather have a 
different method


I can't help you - sorry - but I suspect someone might ask:

1. Do you need to have individually-encrypted files?

2. If yes, are they the same key?

3. Would mounting the USB stick as an encrypted volume be satisfactory?

is there a way to install the tails os ecryption system in qubes os?
I prefere it over the whonix workstation system.



Can't help here either. But you might get some interesting replies if 
you indicated WHY you would prefer tails over whonix - understanding 
that R4.x may allow you to run the two whonix components as DispVMs.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/73702be7-816d-106a-2164-331ab7da202e%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes R3.2, cannot find redshift{-gtk} packages on dom0

2016-10-22 Thread Holger Levsen
On Sat, Oct 22, 2016 at 05:15:27AM -0700, srhgr wrote:
> when I install the redshift-gtk it tries to find the geolocation but it 
> fails. how can I simply dimm the light like adjusting the audio volume with 
> redshift?

AFAIK redshift cannot do this, but:

$ cat bin/my_redshift 
#!/bin/sh

# berlin
COORD=52.5:13.4
redshift-gtk -l $COORD &


-- 
cheers,
Holger

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161022123112.GB11616%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


[qubes-users] Re: Qubes R3.2, cannot find redshift{-gtk} packages on dom0

2016-10-22 Thread srhgr
On Thursday, October 20, 2016 at 3:47:56 AM UTC+2, Pablo Di Noto wrote:
> Hello all,
> 
> I have reinstalled R3.2 and want to install Redshift (and its GUI) on dom0 
> again.
> I do not recall how I did it on R3.1, and successive updates.
> 
> I see on a Fedora 23 VM that redshift and redshift-gtk are available in the 
> `updates` repository. 
> 
> But cannot find how to access these (or equivalent) repositories on dom0. 
> Used `qubes-dom0-update --enablerepo=XXX` with many different repositories 
> mentioned in FAQs and other posts here with XXX={updates, 
> qubes-dom0-current-testing, qubes-dom0-security-testing, qubes-dom0-unstable, 
> ...} but all return "Unable to find a match".
> 
> What am I missing?
> 
> Thanks in advance,
> ///Pablo



when I install the redshift-gtk it tries to find the geolocation but it fails. 
how can I simply dimm the light like adjusting the audio volume with redshift?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1776ede4-c1c8-407d-8101-2c922fd4bcdb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Most Secure way to encrypt your usb stick ?

2016-10-22 Thread lakschmi
have sensitive data on your usb stick?

whats the best way to encrypt/decrypt it?



normally I use whonix-ws pgp and encrypt every file but Id rather have a 
different method



is there a way to install the tails os ecryption system in qubes os?
I prefere it over the whonix workstation system.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0abaf50d-3537-4587-92ae-2ae4a56ebdda%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Dual Boot - Live CD Knoppix & USB-SSD Qubes?

2016-10-22 Thread 013784'091783240917832094781093247438
Hello,

the debian live CD Knoppix has its charme, that you can find out quite well, 
which configuration will work for your hardware, because this 
live-configuration seems smart enough to deliver some solution.

So for trouble shooting, this might be of some help.

Now due to the Q-Security Policy Dual Boot is a VSI:

https://groups.google.com/forum/#!searchin/qubes-users/Multiboot$20usb$20disks%7Csort:relevance/qubes-users/DKdGgpPMAc0/GX15PNJwztIJ

https://www.qubes-os.org/doc/security-guidelines/

https://www.qubes-os.org/doc/multiboot/

https://www.sandisk.com/home/ssd/extreme-510-ssd

Will it be some workaround (to gain a steeper learning curve in Qubes) that I 
use:

- Only the Knoppix live DVD (as a second OS)
- Install Qubes on a fast USB-SSD 500 GB and unplug it before I start Knoppix..
- and use AEM, so I can detect some BIOS modification

The vulnerable unencrypted /boot cannot been reached, because it will be 
unplugged, before I start Knoppix.

But, how I know, that Knoppix will not be able to modify my BIOS-Firmware?

This means, if I run my system like this and AEM detect the BIOS-Firmware 
Malware - I can only throw away the hole PC and buy a new one?

Kind Regards


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17db7228-260b-4274-beb8-37cba01f0e8c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: super-bag

2016-10-22 Thread Achim Patzner
Am 22.10.2016 um 11:29 schrieb volodatrahore...@gmail.com:

>> Добавь меня в вк /m3forfree
> нет вк у меня

Und mich würde der Scheiß nicht einmal interessieren, wenn ich bei VC wäre.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d65a862a-862b-bc64-ab2f-a1fe1a63a46d%40noses.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: super-bag

2016-10-22 Thread volodatrahorenko
суббота, 22 октября 2016 г., 4:01:37 UTC+3 пользователь nezn...@xy9ce.tk 
написал:
> Добавь меня в вк /m3forfree
нет вк у меня

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e5586f3-a069-4323-8441-3e5488713d72%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: OpenBSD Xen PHVM

2016-10-22 Thread jkitt
On Friday, 21 October 2016 17:50:47 UTC+1, cubit  wrote:
> 7. Sep 2016 16:33 by jo...@johnrshannon.com:
> From the OpenBSD 6.0 Release Notes:
> The xen(4) driver now supports domU configuration under Qubes OS.
> 
> 
> Has any persons investegated if OpenBSD as a AppVM is likely to possible?

I'd really like to see this.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/85a34a91-27aa-4ebb-b68f-59640fdb3c28%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Inconsistent Screen Resolution for Fedora VMs

2016-10-22 Thread Jeremy Rand
xmee...@gmail.com:
> I just did a clean install of Qubes 3.2. For some reason the resolution off 
> apps in Fedora VMs is wildly inconsistent. The borders of the windows, dom0, 
> and the Debian VMs are correct but the apps in Fedora VMs range from 
> consistent with the others to so low as to be almost unusable. I can't figure 
> out what causes them to change and xrandr outputs the same thing no matter 
> what the displayed resolution is.

I think this occurred for me a few weeks ago.  If I recall correctly,
the HiDPI settings in GNOME had somehow been set to 0.  No magnification
is 1, double magnification is 2.  0 gets interpreted as 2, for reasons
that only the GNOME people are likely to understand.  The standard GNOME
procedures for changing HiDPI settings fixed it for me (I restored it to 1).

Sorry I don't have more details for you, I don't believe I wrote down
the fix at the time.

-Jeremy

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a60c47f9-0a8e-e671-8abf-77f034a3ae25%40airmail.cc.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature