Re: [qubes-users] Remnder: Ubuntu-template anyone?
Am 26.10.2016 um 00:17 schrieb Unman: > On Tue, Oct 25, 2016 at 11:17:44AM +0200, Robert Mittendorf wrote: >> What would be the advantage of a Ubuntu-template compared to the Debian >> template? >> (No offense, I'm just curious) >> > No offense taken. > > Comparing Stable with LTS, probably not that great a difference. Perhaps > Ubuntu is slightly easier out of the box and the core software is well > integrated. > Comparing stable with Ubuntu releases, Ubuntu will generally have newer > versions and better driver support. Even Arch was already a major improvement for me... I've baesd most of my machines on a (rather easy to produce) arch template... Achim > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/53fea010-1d22-2210-c9dc-deb1817bcd79%40noses.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Net does not work
On Fri, Oct 21, 2016 at 08:19:45PM -0700, nezna...@xy9ce.tk wrote: > I installed qubes. Then i changed mac address in the "clone mac" string, but > network does not work. On another one pc with that mac i have no problems. In > the qubes i have. What is wrong? > You'll have to provide more information if you want help. Among the information you might want to provide - Is this a wired or wireless connection? What are symptoms of network not working? Does the network "work" if you dont change the mac address? Are you changing the string in the Network Manager applet? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161026004214.GA24805%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Remnder: Ubuntu-template anyone?
On Tue, Oct 25, 2016 at 11:17:44AM +0200, Robert Mittendorf wrote: > What would be the advantage of a Ubuntu-template compared to the Debian > template? > (No offense, I'm just curious) > No offense taken. Comparing Stable with LTS, probably not that great a difference. Perhaps Ubuntu is slightly easier out of the box and the core software is well integrated. Comparing stable with Ubuntu releases, Ubuntu will generally have newer versions and better driver support. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161025221743.GB22624%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Remnder: Ubuntu-template anyone?
On Mon, Oct 24, 2016 at 10:24:12AM -0700, richard.g...@gmail.com wrote: > > > > > Last night I built Xenial - I'll put in a PR today, > > > > Has this happened? I'd like to build a 16.04 template, but the Qubes > > Builder in the offical QubesOS repository does not offer Xenial - neither > > does the one in Mareks repository... > > I'd also be very interested in this. I have created a Vivid template and > upgraded that to Wily successfully (Wily is already out of support, however), > but had no luck with upgrading from Wily to Xenial. The upgrades does work > and the VM boots successfully, but the Xorg install is broken so the Qubes > GUI integration does not work - it complains about the ABI major version not > matching. > > Any advice would be greatly appreciated. > > Best regards, > > Richard > Ah, ok. I submitted a PR and then we got bogged down with handling of the Trolltech.conf. I havent returned to it since. I'll have another look and we'll get the xenial build in there unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161025220013.GA22624%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Update to xen-4.6.3 doesn't appear in /boot
On 10/25/2016 03:07 PM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Oct 25, 2016 at 02:27:23PM -0400, Chris Laprise wrote: I'm trying to install the xen-4.6.3 package from current-testing, but there is no xen*.gz added to /boot. This file is part of xen-hypervisor package. I recommend to keep all the xen* packages at the same version (upgrade them at the same time). - -- Thanks! Unfortunately, neither a xen upgrade nor Linux downgrade to 4.4.12 fixed the problem I'm having with tboot 1.9.4 not resuming from S3 suspend... Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b4e34c48-5552-c702-0a11-c17d5e4a18c9%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] detecting malicious usb devices
On Tue, 25 Oct 2016, Vít Šesták wrote: > I am not sure if the devices can sniff both directions. I've believed > that a device can sniff only inbound data and cannot communicate with > other devices. I've tried to look for some document that would allow me > to be sure about this, but I've found nothing. Well, the official > documentation would likely contain enough information, but it seems to > be quite large. USB2 downstream traffic (towards device) seems to be broadcasted and USB3 is routed only to the particular device due to power considerations. Some exceptions to that USB2 rule based on different USB speeds. The speed restrictions seem quite safe electrically too - assuming firmware level only compromizes - because of different signalling voltage levels (a dual speed capable sniffing transreceiver does not seem too convincing threat as possibility deploying them to a victim probably should allow much easier to accomplish attacks too). The USB2 upstream is different and is seen only by the hubs on the path towards the host and the host itself. Whether upstream isolation and USB3 downstream routing is really safe w.r.t. firmware attacks, I don't know (do hubs use firmware or not?). Based on information here: http://www.totalphase.com/support/articles/200349256-USB-Background In general, USB is a full "bus" only logically, not electrically due to tiered-star topology. -- i. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/alpine.DEB.2.10.1610252145090.18027%40melkinpaasi.cs.helsinki.fi. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Update to xen-4.6.3 doesn't appear in /boot
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Oct 25, 2016 at 02:27:23PM -0400, Chris Laprise wrote: > I'm trying to install the xen-4.6.3 package from current-testing, but there > is no xen*.gz added to /boot. This file is part of xen-hypervisor package. I recommend to keep all the xen* packages at the same version (upgrade them at the same time). - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYD62DAAoJENuP0xzK19csqnMIAIHY6iBbQD8VGhAsSjOy6Rky jL5VgN7ES4hdLJ582HRmlXsKUj9ttVNkIokkSGEsP7asuRrHEtL5njKmGC2/ej0K F9iSNhGdDFjPzCV+eCXy1ZHSKg96jreeM5GZZmyz7VS8NXo9ipvi6WbG5vjDPJZl dT6Wg+bXD4wykpPJwPqHG0r3WG95qB2b1wKK8kaJIaN3C4Dkls5EikIEFoEpna9P xqIB+zVF2wArkom61tkfVGuxz5wvloTDWSblpbnYBJ6yJmuPpC2FHogbY5gJuXMb aNDMhgGsklcxallRamGvPTFS7HUtkn1kJm5rKGUgESKMP4jq0jDZPW/2aE3/M5A= =SK1q -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161025190746.GD11385%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Update to xen-4.6.3 doesn't appear in /boot
I'm trying to install the xen-4.6.3 package from current-testing, but there is no xen*.gz added to /boot. How can I get this installed properly to test on my system? Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fee9521e-db71-7354-5bd9-a530916573d2%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] detecting malicious usb devices
USB does not have DMA capabilities. If you have access to DMA, you have already got access to the controller or the usbvm. You probably can get into USBVM easily from an USB device by logging as root on the login screen. This, however, assumes that keystrokes are not captured by other means, which I am not sure if it is true on the latest Qubes version, since some input proxies have been implemented. On 3.0, I was able to shutdown Debian USBVM by ctrl+alt+delete, which suggests that some more complex attacks (using the default empty root password) might be possible on this version. On newer version, I haven't tested it. Nevertheless, I have disabled all USB keyboards on my USBVM for the reason above. They are enabled only in dom0, which uses a separate USB controller. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/323e9c2d-5bdf-4133-8838-c9a6acf68a26%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] detecting malicious usb devices
On Tuesday, October 25, 2016 at 11:43:51 AM UTC-4, Vít Šesták wrote: > I am not sure if the devices can sniff both directions. I've believed that a > device can sniff only inbound data and cannot communicate with other devices. > I've tried to look for some document that would allow me to be sure about > this, but I've found nothing. Well, the official documentation would likely > contain enough information, but it seems to be quite large. a dma attack could do this, and much more. the mitigation / detection i was referring to are things like honeyusb, https://github.com/daveti/GoodUSB the idea was to use the usbvm to screen for malicious devices. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3d3688d6-f8a1-49a5-97d2-383dc03322da%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] detecting malicious usb devices
I am not sure if the devices can sniff both directions. I've believed that a device can sniff only inbound data and cannot communicate with other devices. I've tried to look for some document that would allow me to be sure about this, but I've found nothing. Well, the official documentation would likely contain enough information, but it seems to be quite large. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/32d7c1d0-682e-4a7f-b6fc-72cb450ba342%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] detecting malicious usb devices
Am 10/25/2016 um 04:15 PM schrieb Vít Šesták: I don't think that a USB drive can directly record keystrokes. The communication goes in the opposite direction that the USB drive would need. A malicious USB drive can also listen the data going to other USB devices on the same controller. You cannot detect this. Well, your second point is exactly that. As USB is a Bus, all devices should be able to record the other devices messages - and thereby the keystrokes. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/384f7071-da9e-90e2-c8e8-026194f11e19%40digitrace.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL - Dell XPS 14Z (L412Z)
Thank you guys! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3633611477390541%40web26m.yandex.ru. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-Dell_Inc_-XPS_L412Z-20161025-195808.yml Description: Binary data
[qubes-users] HCL - Lenovo T430s (23561Y3)
TPM - Works fine! Turn TPM support off and on again in BIOS if you have issues the first time. AEM - Works fine! PERIPHERALS - Works fine! Keyboard, Touch-pad, Red ball thing in middle of keyboard etc all work. SOUND - Works fine! SLEEP - Works fine! BRIGHTNESS - Works fine! WEBCAM/MIC - Doesn't work. Minimal effort taken here though. Should work fine in Qubes 3.2. Different USB pass through mechanism. Search for "USB passthrough" here: https://www.qubes-os.org/news/2016/09/29/qubes-32 All in all, smooth installation and never found any real roadblocks except mic/webcam with should be fixed in the new release. Sent using Guerrillamail.com Block or report abuse: https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/772612e60344e55f27f146ed3f70d268bd8%40guerrillamail.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-LENOVO-23561Y3-20161025-151121.yml Description: application/yaml
Re: [qubes-users] Remnder: Ubuntu-template anyone?
What would be the advantage of a Ubuntu-template compared to the Debian template? (No offense, I'm just curious) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/60a48ab0-18a1-13f8-4815-54f9c780fe05%40digitrace.de. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] detecting malicious usb devices
Am 10/25/2016 um 09:05 AM schrieb Andrew David Wong: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-24 23:48, pixel fairy wrote: can the a usbvm be used to detect malicious usb devices? has anyone tried this? Sure, you can run whatever kind of detection software you like in a USB VM. However, not all malicious USB devices are detectable (whether you're in a USB VM or somewhere else). I haven't tried it. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYDwQmAAoJENtN07w5UDAw5usP/0Yo9zrkgsEceiz38oRG6Kj0 ulBYSAnUOwGHEo9EIiFWHAVyu9uo6Eq+CptgF2CtQmkes8tHAXW3qEfbkL2+mgke guaqeMxd6L2OLVNg7CBCSeyciqrmGMw2IB8l7/p5p+1daVhj1Gx//cfOc3UJay+G R8w+pL3vYo916xP/PtkfOYV13IB+hTQR/WZKUWhigrxALBsLUb7s/fAHRrqxaCHb 30JSacKlH8ztY7PkZWEtzVUsvp71hE42TP1IGvJ/JuudIBsbXRxCFzfo1XHC61mH ZIQ8Yxez85rlHD3uA0I5NxBRIA0iAYCmPPiYN5D/kRa+IaByQpONoReTTBgYWq7G lBye2K09GJ3fKAxp1aLAxaw5BtxLFtzPY15VdL2yrhpfFH0329kk/q3Zxv+93OJn Gldi237a8WL17CigQbJPBOkTC77+luF4QRq6dbUmRRNNqxQiUqSnETk3wZBqyZVJ AeemmqHW2Clg0gemQ+nTLj8X5cgCUOM5flfE55LyYs8ai6kE2ASmBvhdpsV2qEVS z20FOYOk1i25KVCcRtzXq/OlmBuHRmftAugS1ZnPGMmOwx/NGEBzkycYZqXVzb72 8WCYhpUZ9LkksHJpUQHZ6EngU2nnJryFkaritDYagLD8G/WucM2oTjm9Of7EQzW2 R6eMshcuf8F9N53qwos6 =pO8v -END PGP SIGNATURE- Example: A thumb drive that claims to be a keyboard to record your key strokes. How would you detect that? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d2c56a35-4bd8-baa9-ba75-538289a5e0d1%40digitrace.de. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] detecting malicious usb devices
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-24 23:48, pixel fairy wrote: > can the a usbvm be used to detect malicious usb devices? has anyone tried > this? > Sure, you can run whatever kind of detection software you like in a USB VM. However, not all malicious USB devices are detectable (whether you're in a USB VM or somewhere else). I haven't tried it. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYDwQmAAoJENtN07w5UDAw5usP/0Yo9zrkgsEceiz38oRG6Kj0 ulBYSAnUOwGHEo9EIiFWHAVyu9uo6Eq+CptgF2CtQmkes8tHAXW3qEfbkL2+mgke guaqeMxd6L2OLVNg7CBCSeyciqrmGMw2IB8l7/p5p+1daVhj1Gx//cfOc3UJay+G R8w+pL3vYo916xP/PtkfOYV13IB+hTQR/WZKUWhigrxALBsLUb7s/fAHRrqxaCHb 30JSacKlH8ztY7PkZWEtzVUsvp71hE42TP1IGvJ/JuudIBsbXRxCFzfo1XHC61mH ZIQ8Yxez85rlHD3uA0I5NxBRIA0iAYCmPPiYN5D/kRa+IaByQpONoReTTBgYWq7G lBye2K09GJ3fKAxp1aLAxaw5BtxLFtzPY15VdL2yrhpfFH0329kk/q3Zxv+93OJn Gldi237a8WL17CigQbJPBOkTC77+luF4QRq6dbUmRRNNqxQiUqSnETk3wZBqyZVJ AeemmqHW2Clg0gemQ+nTLj8X5cgCUOM5flfE55LyYs8ai6kE2ASmBvhdpsV2qEVS z20FOYOk1i25KVCcRtzXq/OlmBuHRmftAugS1ZnPGMmOwx/NGEBzkycYZqXVzb72 8WCYhpUZ9LkksHJpUQHZ6EngU2nnJryFkaritDYagLD8G/WucM2oTjm9Of7EQzW2 R6eMshcuf8F9N53qwos6 =pO8v -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b2ba8d41-3552-3e59-ed05-cee819c77646%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] detecting malicious usb devices
can the a usbvm be used to detect malicious usb devices? has anyone tried this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/98750f78-6182-4203-a4a4-581ef766683e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ssd migration block/unit size, tune and benchmark
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-24 14:45, Eva Star wrote: > Migrated to the new SSD from old: > > 1) How to check "ssd partition alignment" on Qubes as we do on Windows? If > need to correct it, how to do that? > > 2) The same for block/unit size. Need I change it on the new SSD? How to > check yes or no? How to do that if need? > Neither of these should be necessary for a fresh Qubes installation on a new SSD, unless you're doing some kind of non-standard/custom installation, in which case you should be able to handle both with either fdisk or parted. > 3) How to check new SSD performance? Need to do this on dom0? I'm about some > tests like we have on Windows (read/write, random read/write, different block > sizes) > Yes, this would have to be done in dom0, or using a different distro (e.g., live CD). You can find software to do this on the web or included in some distros. > 4) SECURITY ISSUE: Is it secure to keep the old *clone* of the drive on old > SSD with the same master table of cryptsetup and the same password? > This can be a risk under certain circumstances: https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions#6-backup-and-data-recovery - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYDvcOAAoJENtN07w5UDAwBW4QAL12NBrmbGApiXV/iW42tXIs 68GOKUTNGGYTcJzkvuqR9NwgSaCSF27jxijT95qNarVFTCuRzzp8ljQmxH/kbDwd Q3gpOszADXfe/Y52xHnWpOCzpwyiQs7y0yU9Pm691hZGnV5fhHuzrX/1Di/Yk70C PrB+u+GcxxAFpG3P/JaJ9QaMQkRJYmWyZB9M9AkM66GJPUC46+BRIy+lN66/HI9M NMGYQIWDxNPEdV0HwHGHtIBgFDMWvioIsoAN4dGM41HoSRmTWptedna+mvPYVLz9 wkqdaro/Qmoptt2VzbVI+A4VKeJHL/5IRWXzfYUroKLbJfs6ET2o7k2EPCmW940o HS3+OvBngAKFSxYKT7HhVFOtslyzPd7AgaTGEd0Qu6QNyJ2Ki4tNNXtlI/+gvJkc q1Bj2fOzSSZUdLfLmKCNPhfr735Jkz+9C5xusjY4IBNS6YxizYowONlkY/YT6xYr f84XgK77LHFKiJMHVa2/J7+n7H6yvvB+shi38q2gGz4WonUGLOUaKHYarx/9ieHh m1vXtUXeCuGe4jQmbV0PPsT/dK8IQaz4Qq0/94IAYV9f3V5X2Dy/4YseOKt352aV PsB+fnWMA/xl+qNDYijGbcjTznB+hOP38DWeoxGQayuA87aP0k+pjUGpCeyL3pTL YeoSJOf4ttsIc0t38/zs =UvA/ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/989dcf41-63c1-c3dc-3e6d-0e8d1f6d6582%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't figure out how to install a couple of things in dom0
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-23 09:17, cestar...@gmail.com wrote: >> Does this page answer your questions? >> >> https://www.qubes-os.org/doc/software-update-dom0/ > > Only in part, it answers how package management should be done in Qubes, not > how to enable RPMFusion for dom0 nor which repo I should enable to find Krita > or Xorg Wacom drivers and even if they are within these repos, no way was > provided to search the repo for a package list to find out what the package > names are since that varies from distro to distro. > Enabling RPMFusion in dom0 is generally not recommended, but it should be possible if you're willing to accept the risks. I would start by trying doing it in the standard Fedora way (but I haven't tried this myself). As for searching for packages, you can pass most of the standard yum/dnf commands to qubes-dom0-update. Personally, I like to do the searches (`dnf search`) in an AppVM, then, once I've found the correct package names, install them in dom0 (`qubes-dom0-update package-name`). - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYDvVTAAoJENtN07w5UDAwgiEP/1mh6rqPuCaQjIWD2W7Ntlgl qalwVztTUYNLPSKcYYPoee3wBOJp5aw4QqemCgyGDWL0ux8CsZiOFh2Y5gQvPF/Z clhhZ2/yOIUZzX1YZsGCh8BpmUuC8PO2KlETUAzbbM+L+eK/qt6a7mxuxOJjjCw3 8ErHfibFC7pHX6ZtVco+S7CK6qCtQz5zYGvmv/daue5xJbEoN6OW+hcQAn+AVR5M E8S02akgY60qV7YWcNNf2QwjCOOKfZH1e9Ht021rt1rIK7eH8Z4FXU6r+SwyutK6 KRKpmRD+WJYBIw5aZlWxpNhHTNmnkYW98nMXq23JxinWHBbj35ddK1/fFtLqYjxR ahznH3s5MdJ5O0WgpskTj3q070T3+n98Bhv71gmirvgw9N6ZLog5JB2LXI8wzxxD 43RqMTJ4r5iCR1Y69yha9QLVCQd916R9BKXvMCcIRqeAoXVCm1qd0Ae4yA5kpqnH drjhCheQufw5ldbIJWuRzy4rhG0x6viCl9zkU3mGggmUDwGBZY3RwhdvrI/ipyy7 JRQ7TAUaxxHslQ5pCDWQQL36f5/68zlLRtldAhho0fPzCuMZak79nF/7wok7Q9BG flupZ7ppsHeVWHOfXD4xaQhdrlPRYVukO7zDviF9wbhemZdcEL1GlrXo6WhHEixX j9/dBumB/5kOomUn9fCT =LzNl -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1b8c7212-6e33-58cf-3430-a9763d82979c%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: install on a partition?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-24 08:16, raahe...@gmail.com wrote: > On Sunday, October 23, 2016 at 11:33:42 AM UTC-4, Sven Hansen wrote: >> Hdd is for testing. Hdd has 3 nfts partitions, sda1, sda2 and sda3. How do I >> get qubes installed on sda1? >> Can qubes be installed side by side with trisquel 7 and subgraph? Thank you. > > yes, but it is not officially supported cause one of the other o/s can modify > the qubes boot partition, or has better chance to infect bios or firmwares. > It also takes more tweaking to add other os entries to the qubes grub, > because I believe it has no os-prober. > > I found it easier to add my qubes entry to the trisquel grub instead, in the > /etc/grub.d/40_custom file. In there you paste the XEN section copied from > the qubes boot partition /boot/grub2/grub.cfg file. then update-grub. > Probably should repeat the step when qubes updates its kernel or initramfs. > > An easy way to reinstall the trisquel grub after installing qubes is here > https://community.linuxmint.com/tutorial/view/245 > Also take a look at this page: https://www.qubes-os.org/doc/multiboot/ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYDvWBAAoJENtN07w5UDAwVc0QAKOWzsw7xgWqwUP3Q8EsAUdB hFTgQOt1TRkvJTWVo4EXav2Ep5gywUZQbtlkPLq+ncm51SNHs7+YU/QM4xI3keLX ewsmLWZz/CBxIQP3ZzIOimmNqVS6I8qApQvwpXGuaLyedCMx6EXr1U350LK8wZHa XwjyGEE14iKr3Sp8T32JpKqjkeDcA/iLLMchVWFJC/QJdzT6iT5B6rafeIXFiYwx EsAI/98RfDcg1/EKJQWIi4PSxx+e2RUZxXvY+WDbPEdA0TPQQMSJPpsAUN4MA5rV hPLucmXdkuP5wwnNy7Qfl09u3OeUSwZnknfamdQEIb0D2Om7acyR9VkpCNDG0Z3x 77JtH+9oTHZio1SCNV5AeWnSlHC16uyrVdxahWuCHtEsisARQpIvIrq8+u75AyZ4 0MpTlq45CUmF/yvUNv4blvyTgm73J+c9HYzj7H4L+KmSkgwcF+9M2XfG7QX6T1QT kHCZ6vA0FeBDm20HX03+vMQNuPuCG/gXpOAABx9V5oRmyu5RL0jVEXTeZxh6R+0r cygbstt0afcViWuSHZ9v0oWDkgtRfdfYOVU9ED2qrWCn6XjZ8O470+LM9L+gjN9q JIwZoT0yHOVoqnDhPpMKAtwwAoHQK27oG39eothP1rSkCq7g1I2YvOwN24vJO/72 yMbqx7ftcCRdV2QzkUux =hmRz -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c6408b37-c39c-6125-bb6a-30936e806bc0%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.