Re: [qubes-users] Remnder: Ubuntu-template anyone?

2016-10-25 Thread Achim Patzner
Am 26.10.2016 um 00:17 schrieb Unman:

> On Tue, Oct 25, 2016 at 11:17:44AM +0200, Robert Mittendorf wrote:
>> What would be the advantage of a Ubuntu-template compared to the Debian
>> template?
>> (No offense, I'm just curious)
>>
> No offense taken.
>
> Comparing Stable with LTS, probably not that great a difference. Perhaps
> Ubuntu is slightly easier out of the box and the core software is well
> integrated.
> Comparing stable with Ubuntu releases, Ubuntu will generally have newer
> versions and better driver support.

Even Arch was already a major improvement for me... I've baesd most of
my machines on a (rather easy to produce) arch template...


Achim


>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53fea010-1d22-2210-c9dc-deb1817bcd79%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Net does not work

2016-10-25 Thread Unman
On Fri, Oct 21, 2016 at 08:19:45PM -0700, nezna...@xy9ce.tk wrote:
> I installed qubes. Then i changed mac address in the "clone mac" string, but 
> network does not work. On another one pc with that mac i have no problems. In 
> the qubes i have. What is wrong?
> 

You'll have to provide more information if you want help.
Among the information you might want to provide -
Is this a wired or wireless connection?
What are symptoms of network not working?
Does the network "work" if you dont change the mac address?
Are you changing the string in the Network Manager applet?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161026004214.GA24805%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Remnder: Ubuntu-template anyone?

2016-10-25 Thread Unman
On Tue, Oct 25, 2016 at 11:17:44AM +0200, Robert Mittendorf wrote:
> What would be the advantage of a Ubuntu-template compared to the Debian
> template?
> (No offense, I'm just curious)
>
No offense taken.

Comparing Stable with LTS, probably not that great a difference. Perhaps
Ubuntu is slightly easier out of the box and the core software is well
integrated.
Comparing stable with Ubuntu releases, Ubuntu will generally have newer
versions and better driver support.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161025221743.GB22624%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Remnder: Ubuntu-template anyone?

2016-10-25 Thread Unman
On Mon, Oct 24, 2016 at 10:24:12AM -0700, richard.g...@gmail.com wrote:
> > > > > Last night I built Xenial - I'll put in a PR today, 
> > 
> > Has this happened? I'd like to build a 16.04 template, but the Qubes 
> > Builder in the offical QubesOS repository does not offer Xenial - neither 
> > does the one in Mareks repository...
> 
> I'd also be very interested in this. I have created a Vivid template and 
> upgraded that to Wily successfully (Wily is already out of support, however), 
> but had no luck with upgrading from Wily to Xenial. The upgrades does work 
> and the VM boots successfully, but the Xorg install is broken so the Qubes 
> GUI integration does not work - it complains about the ABI major version not 
> matching.
> 
> Any advice would be greatly appreciated.
> 
> Best regards,
> 
> Richard
> 

Ah, ok. I submitted a PR and then we got bogged down with handling of
the Trolltech.conf. I havent returned to it since.

I'll have another look and we'll get the xenial build in there

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161025220013.GA22624%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Update to xen-4.6.3 doesn't appear in /boot

2016-10-25 Thread Chris Laprise

On 10/25/2016 03:07 PM, Marek Marczykowski-Górecki wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Oct 25, 2016 at 02:27:23PM -0400, Chris Laprise wrote:

I'm trying to install the xen-4.6.3 package from current-testing, but there
is no xen*.gz added to /boot.

This file is part of xen-hypervisor package. I recommend to keep all the
xen* packages at the same version (upgrade them at the same time).

- -- 


Thanks! Unfortunately, neither a xen upgrade nor Linux downgrade to 
4.4.12 fixed the problem I'm having with tboot 1.9.4 not resuming from 
S3 suspend...


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b4e34c48-5552-c702-0a11-c17d5e4a18c9%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] detecting malicious usb devices

2016-10-25 Thread Ilpo Järvinen
On Tue, 25 Oct 2016, Vít Šesták wrote:

> I am not sure if the devices can sniff both directions. I've believed 
> that a device can sniff only inbound data and cannot communicate with 
> other devices. I've tried to look for some document that would allow me 
> to be sure about this, but I've found nothing. Well, the official 
> documentation would likely contain enough information, but it seems to 
> be quite large.

USB2 downstream traffic (towards device) seems to be broadcasted and
USB3 is routed only to the particular device due to power considerations. 
Some exceptions to that USB2 rule based on different USB speeds. The 
speed restrictions seem quite safe electrically too - assuming firmware 
level only compromizes - because of different signalling voltage levels
(a dual speed capable sniffing transreceiver does not seem too convincing 
threat as possibility deploying them to a victim probably should allow 
much easier to accomplish attacks too).

The USB2 upstream is different and is seen only by the hubs on the path
towards the host and the host itself.

Whether upstream isolation and USB3 downstream routing is really safe 
w.r.t. firmware attacks, I don't know (do hubs use firmware or not?).

Based on information here:
  http://www.totalphase.com/support/articles/200349256-USB-Background


In general, USB is a full "bus" only logically, not electrically due
to tiered-star topology.


-- 
 i.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/alpine.DEB.2.10.1610252145090.18027%40melkinpaasi.cs.helsinki.fi.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Update to xen-4.6.3 doesn't appear in /boot

2016-10-25 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Oct 25, 2016 at 02:27:23PM -0400, Chris Laprise wrote:
> I'm trying to install the xen-4.6.3 package from current-testing, but there
> is no xen*.gz added to /boot.

This file is part of xen-hypervisor package. I recommend to keep all the
xen* packages at the same version (upgrade them at the same time).

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYD62DAAoJENuP0xzK19csqnMIAIHY6iBbQD8VGhAsSjOy6Rky
jL5VgN7ES4hdLJ582HRmlXsKUj9ttVNkIokkSGEsP7asuRrHEtL5njKmGC2/ej0K
F9iSNhGdDFjPzCV+eCXy1ZHSKg96jreeM5GZZmyz7VS8NXo9ipvi6WbG5vjDPJZl
dT6Wg+bXD4wykpPJwPqHG0r3WG95qB2b1wKK8kaJIaN3C4Dkls5EikIEFoEpna9P
xqIB+zVF2wArkom61tkfVGuxz5wvloTDWSblpbnYBJ6yJmuPpC2FHogbY5gJuXMb
aNDMhgGsklcxallRamGvPTFS7HUtkn1kJm5rKGUgESKMP4jq0jDZPW/2aE3/M5A=
=SK1q
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161025190746.GD11385%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Update to xen-4.6.3 doesn't appear in /boot

2016-10-25 Thread Chris Laprise
I'm trying to install the xen-4.6.3 package from current-testing, but 
there is no xen*.gz added to /boot.


How can I get this installed properly to test on my system?

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fee9521e-db71-7354-5bd9-a530916573d2%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] detecting malicious usb devices

2016-10-25 Thread Vít Šesták
USB does not have DMA capabilities. If you have access to DMA, you have already 
got access to the controller or the usbvm.

You probably can get into USBVM easily from an USB device by logging as root on 
the login screen. This, however, assumes that keystrokes are not captured by 
other means, which I am not sure if it is true on the latest Qubes version, 
since some input proxies have been implemented. On 3.0, I was able to shutdown 
Debian USBVM by ctrl+alt+delete, which suggests that some more complex attacks 
(using the default empty root password) might be possible on this version. On 
newer version, I haven't tested it.

Nevertheless, I have disabled all USB keyboards on my USBVM for the reason 
above. They are enabled only in dom0, which uses a separate USB controller.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/323e9c2d-5bdf-4133-8838-c9a6acf68a26%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] detecting malicious usb devices

2016-10-25 Thread pixel fairy
On Tuesday, October 25, 2016 at 11:43:51 AM UTC-4, Vít Šesták wrote:
> I am not sure if the devices can sniff both directions. I've believed that a 
> device can sniff only inbound data and cannot communicate with other devices. 
> I've tried to look for some document that would allow me to be sure about 
> this, but I've found nothing. Well, the official documentation would likely 
> contain enough information, but it seems to be quite large.

a dma attack could do this, and much more. the mitigation / detection i was 
referring to are things like honeyusb, https://github.com/daveti/GoodUSB

the idea was to use the usbvm to screen for malicious devices. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3d3688d6-f8a1-49a5-97d2-383dc03322da%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] detecting malicious usb devices

2016-10-25 Thread Vít Šesták
I am not sure if the devices can sniff both directions. I've believed that a 
device can sniff only inbound data and cannot communicate with other devices. 
I've tried to look for some document that would allow me to be sure about this, 
but I've found nothing. Well, the official documentation would likely contain 
enough information, but it seems to be quite large.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/32d7c1d0-682e-4a7f-b6fc-72cb450ba342%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] detecting malicious usb devices

2016-10-25 Thread Robert Mittendorf

Am 10/25/2016 um 04:15 PM schrieb Vít Šesták:

I don't think that a USB drive can directly record keystrokes. The 
communication goes in the opposite direction that the USB drive would need.

A malicious USB drive can also listen the data going to other USB devices on 
the same controller. You cannot detect this.
Well, your second point is exactly that. As USB is a Bus, all devices 
should be able to record the other devices messages - and thereby the 
keystrokes.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/384f7071-da9e-90e2-c8e8-026194f11e19%40digitrace.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Dell XPS 14Z (L412Z)

2016-10-25 Thread a . mcwheel
Thank you guys!



-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3633611477390541%40web26m.yandex.ru.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Dell_Inc_-XPS_L412Z-20161025-195808.yml
Description: Binary data


[qubes-users] HCL - Lenovo T430s (23561Y3)

2016-10-25 Thread 4r1eyh+30fj0sg5cb6l8 via qubes-users
TPM - Works fine! Turn TPM support off and on again in BIOS if you have issues 
the first time.

AEM - Works fine!

PERIPHERALS - Works fine! Keyboard, Touch-pad, Red ball thing in middle of 
keyboard etc all work.  

SOUND - Works fine!

SLEEP - Works fine!

BRIGHTNESS - Works fine!

WEBCAM/MIC - Doesn't work. Minimal effort taken here though.
Should work fine in Qubes 3.2. Different USB pass through mechanism.

Search for "USB passthrough" here:
https://www.qubes-os.org/news/2016/09/29/qubes-32

All in all, smooth installation and never found any real roadblocks except 
mic/webcam with should be fixed in the new release.






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/772612e60344e55f27f146ed3f70d268bd8%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-LENOVO-23561Y3-20161025-151121.yml
Description: application/yaml


Re: [qubes-users] Remnder: Ubuntu-template anyone?

2016-10-25 Thread Robert Mittendorf
What would be the advantage of a Ubuntu-template compared to the Debian 
template?

(No offense, I'm just curious)

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/60a48ab0-18a1-13f8-4815-54f9c780fe05%40digitrace.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] detecting malicious usb devices

2016-10-25 Thread Robert Mittendorf

Am 10/25/2016 um 09:05 AM schrieb Andrew David Wong:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-24 23:48, pixel fairy wrote:

can the a usbvm be used to detect malicious usb devices? has anyone tried this?


Sure, you can run whatever kind of detection software you like in a USB VM.
However, not all malicious USB devices are detectable (whether you're in a USB 
VM
or somewhere else). I haven't tried it.

- -- 
Andrew David Wong (Axon)

Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=pO8v
-END PGP SIGNATURE-

Example: A thumb drive that claims to be a keyboard to record your key 
strokes. How would you detect that?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d2c56a35-4bd8-baa9-ba75-538289a5e0d1%40digitrace.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] detecting malicious usb devices

2016-10-25 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-24 23:48, pixel fairy wrote:
> can the a usbvm be used to detect malicious usb devices? has anyone tried 
> this?
> 

Sure, you can run whatever kind of detection software you like in a USB VM.
However, not all malicious USB devices are detectable (whether you're in a USB 
VM
or somewhere else). I haven't tried it.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=pO8v
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2ba8d41-3552-3e59-ed05-cee819c77646%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] detecting malicious usb devices

2016-10-25 Thread pixel fairy
can the a usbvm be used to detect malicious usb devices? has anyone tried this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/98750f78-6182-4203-a4a4-581ef766683e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ssd migration block/unit size, tune and benchmark

2016-10-25 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-24 14:45, Eva Star wrote:
> Migrated to the new SSD from old:
> 
> 1) How to check "ssd partition alignment" on Qubes as we do on Windows? If 
> need to correct it, how to do that?
> 
> 2) The same for block/unit size. Need I change it on the new SSD? How to 
> check yes or no? How to do that if need?
> 

Neither of these should be necessary for a fresh Qubes installation on a new 
SSD, unless you're doing some kind of non-standard/custom installation, in 
which case you should be able to handle both with either fdisk or parted.

> 3) How to check new SSD performance? Need to do this on dom0? I'm about some 
> tests like we have on Windows (read/write, random read/write, different block 
> sizes)
> 

Yes, this would have to be done in dom0, or using a different distro (e.g., 
live CD). You can find software to do this on the web or included in some 
distros.

> 4) SECURITY ISSUE: Is it secure to keep the old *clone* of the drive on old 
> SSD with the same master table of cryptsetup and the same password?
> 

This can be a risk under certain circumstances:

https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions#6-backup-and-data-recovery

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=UvA/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/989dcf41-63c1-c3dc-3e6d-0e8d1f6d6582%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't figure out how to install a couple of things in dom0

2016-10-25 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-23 09:17, cestar...@gmail.com wrote:
>> Does this page answer your questions?
>>
>> https://www.qubes-os.org/doc/software-update-dom0/
> 
> Only in part, it answers how package management should be done in Qubes, not 
> how to enable RPMFusion for dom0 nor which repo I should enable to find Krita 
> or Xorg Wacom drivers and even if they are within these repos, no way was 
> provided to search the repo for a package list to find out what the package 
> names are since that varies from distro to distro.
> 

Enabling RPMFusion in dom0 is generally not recommended, but it should be 
possible if you're willing to accept the risks. I would start by trying doing 
it in the standard Fedora way (but I haven't tried this myself).

As for searching for packages, you can pass most of the standard yum/dnf 
commands to qubes-dom0-update. Personally, I like to do the searches (`dnf 
search`) in an AppVM, then, once I've found the correct package names, install 
them in dom0 (`qubes-dom0-update package-name`).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=LzNl
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b8c7212-6e33-58cf-3430-a9763d82979c%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: install on a partition?

2016-10-25 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-24 08:16, raahe...@gmail.com wrote:
> On Sunday, October 23, 2016 at 11:33:42 AM UTC-4, Sven Hansen wrote:
>> Hdd is for testing. Hdd has 3 nfts partitions, sda1, sda2 and sda3. How do I 
>> get qubes installed on sda1?
>> Can qubes be installed side by side with trisquel 7 and subgraph? Thank you.
> 
> yes, but it is not officially supported cause one of the other o/s can modify 
> the qubes boot partition, or has better chance to infect bios or firmwares.  
> It also takes more tweaking to add other os entries to the qubes grub, 
> because I believe it has no os-prober.
> 
> I found it easier to add my qubes entry to the trisquel grub instead,  in the 
>  /etc/grub.d/40_custom file.  In there you paste the XEN section copied from 
> the qubes boot partition /boot/grub2/grub.cfg file.   then update-grub.  
> Probably should repeat the step when qubes updates its kernel or initramfs.  
> 
> An easy way to reinstall the trisquel grub after installing qubes is here 
> https://community.linuxmint.com/tutorial/view/245
> 

Also take a look at this page:

https://www.qubes-os.org/doc/multiboot/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYDvWBAAoJENtN07w5UDAwVc0QAKOWzsw7xgWqwUP3Q8EsAUdB
hFTgQOt1TRkvJTWVo4EXav2Ep5gywUZQbtlkPLq+ncm51SNHs7+YU/QM4xI3keLX
ewsmLWZz/CBxIQP3ZzIOimmNqVS6I8qApQvwpXGuaLyedCMx6EXr1U350LK8wZHa
XwjyGEE14iKr3Sp8T32JpKqjkeDcA/iLLMchVWFJC/QJdzT6iT5B6rafeIXFiYwx
EsAI/98RfDcg1/EKJQWIi4PSxx+e2RUZxXvY+WDbPEdA0TPQQMSJPpsAUN4MA5rV
hPLucmXdkuP5wwnNy7Qfl09u3OeUSwZnknfamdQEIb0D2Om7acyR9VkpCNDG0Z3x
77JtH+9oTHZio1SCNV5AeWnSlHC16uyrVdxahWuCHtEsisARQpIvIrq8+u75AyZ4
0MpTlq45CUmF/yvUNv4blvyTgm73J+c9HYzj7H4L+KmSkgwcF+9M2XfG7QX6T1QT
kHCZ6vA0FeBDm20HX03+vMQNuPuCG/gXpOAABx9V5oRmyu5RL0jVEXTeZxh6R+0r
cygbstt0afcViWuSHZ9v0oWDkgtRfdfYOVU9ED2qrWCn6XjZ8O470+LM9L+gjN9q
JIwZoT0yHOVoqnDhPpMKAtwwAoHQK27oG39eothP1rSkCq7g1I2YvOwN24vJO/72
yMbqx7ftcCRdV2QzkUux
=hmRz
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c6408b37-c39c-6125-bb6a-30936e806bc0%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.