Re: [qubes-users] Re: qubes-template-debian-7 missing?

2016-11-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Oct 19, 2016 at 11:37:33PM -0700, Andrew David Wong wrote:
> On 2016-10-19 22:07, miguel.j...@gmail.com wrote:
> > Looks indeed like it is missing from 
> > http://yum.qubes-os.org/r3.1/templates-itl/rpm/ but is present in 3.0 at 
> > http://yum.qubes-os.org/r3.0/templates-itl/rpm/
> > 
> > Docs probably need updating if this was deliberate. A shame as Debian 7 
> > still gets 'long term support' security updates so would still be good to 
> > keep around for a while longer.
> > 
> 
> Debian 7 is not supported in Qubes 3.2, but it should still be supported in 
> 3.1:
> 
> https://www.qubes-os.org/doc/supported-versions/#templatevms

There is indeed no Debian 7 template in repository. Looks like an
oversight. Building it wasn't straightforward on new system, since it
is somehow old and still requires vsyscall legacy kernel support, which
is now disabled by default... Anyway package is now available in the
repository.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYGUFpAAoJENuP0xzK19cshEIIAIQQPO5Ph1pG/VuyPZBuIv3I
3QQLNUDm09BKQCy27TxGGuz9Oppbb78NeQMYt4roUG9IpcP36LR0JMytBzs50BR7
L6djSuA1rkFU3GlhRGw/EyHlyrjuEIiKv8a1s3WSQWexTGF55QG4xvJGJCx58H3Y
zdKU5H7ZCIM+ImrGtmclY5lhX/dIbxqNIhLoKbMAPfFEnnztXQfZyMc842IAZmaL
40OyHIdC3fBcg8fSpK6pxZ4UhPUi6HJQPWKQOAVzTet8MYFO+8qY2ZZJhVVcibhK
SkdT3BYp6MLUaVahWjlx6yptKs4wLPRR61F0a8lue7vxBQZKQ4etMRLXnu3yjXM=
=zIO/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161102012910.GH22572%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Special (Secure) Browser Frontend for Qubes?!

2016-11-01 Thread mara . kuenster
Hi,

I am using Qubes daily for a while now. One thing I think is really missing is 
some sort of identity management. This is most visible when browsing. You shop 
something on Amazon, then go to check some Facebook updates and look at 
WhatsApp. Then you browse Hacker News click on this link and that link, end up 
on Wikileaks by accident then look at which club to visit in the evening... Yes 
this is shit.

But convenience often wins over security/privacy. Not only do you have to 
assume that all sites you visit within the same VM knows everything you did in 
there, but also you have to assume they know all the passwords for all the 
other sites you visit there and basically have full control over that VM. If 
you don't assume that, then why are you using Qubes in the first place...

I think what would solve this dilemma is a custom dom0 browser layer. The way 
this can work is as follows:

* Each identity consists of white-listed domains and HTTPS certificates (like 
amazon plus all its garbage), bookmarks, history, it's own password & auto-fill 
store and basically everything else like it's own cookies and the works.
* Trying to visit a non-white-listed website will simply not work without 
switching identities properly or using a special disposable identity 
* Two identities are never used on the same VM
* You always use a new VM for each tab (there is potential for optimization, 
like sharing a VM per identity as long as this identity has at least one tab 
still open)
* Each VM is disposable (no home file system sharing) and get's the 
corresponding identity auto-copied on boot (only the essentials for Firefox)
* The browser gets installed after launch, so no kind of tracking can take 
place here via installation UUIDs etc.

So the core feature of this dom0 browser is basically identity management and 
the usual tab-based browser gui with history, settings, etc. But in contrast to 
what we have now, this dom0 browser will also manage the VMs that run the 
actual browsers and blit their page view into its dom0 tab.

Is there anything like that under development? Or how would you solve this 
issue?

Cheers

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/22581429-6e04--a8db-e287d122765b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can TeamViewer or similar work with Qubes..?

2016-11-01 Thread Adrian Rocha
Hi,
You can install TeamViewer, SSH or any other remote access tool in the VMs. And 
obviously the VM needs internet access to use the tool, you cannot access to 
dom0/host or unconnected VMs. To access maybe you need to redirect a port in 
the firewall depending on the remote access tool that you are using:

https://www.qubes-os.org/doc/qubes-firewall/#tocAnchor-1-1-4

Another option is hide the service in TOR by whonix, but you have to consider 
the connection speed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c2034c1b-6908-4a63-8623-35b6d94c9e82%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Compaq Presario CQ56

2016-11-01 Thread Michael Fillippini
The AMD v140 has AMD-V / AMD Virtualization technology, however there is
nowhere in the bios to enable or disable...  I assume it is just always
enabled...

Features

   - MMX instructions
   - Extensions to MMX
   - 3DNow! technology
   - Extensions to 3DNow!
   - SSE / Streaming SIMD Extensions
   - SSE2 / Streaming SIMD Extensions 2
   - SSE3 / Streaming SIMD Extensions 3
   - SSE4a
   <http://www.cpu-world.com/Glossary/S/SSE4a.html>
   - AMD64 / AMD 64-bit technology
   <http://www.cpu-world.com/Glossary/A/AMD64_technology.html>
   - EVP / Enhanced Virus Protection
   <http://www.cpu-world.com/Glossary/E/EVP_XD.html>
   - AMD-V / AMD Virtualization technology

info from:
http://www.cpu-world.com/CPUs/K10/AMD-V%20Series%20V140%20-%20VMV140SGR12GM.html

Overall, performance of Qubes seems reasonably fast...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAODvKmTC5%3DtA%3D8_Fchk_y-cWfh%2Bqi3Nk58WP3ZYvjZV3A554BA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Hewlett_Packard-Presario_CQ56_Notebook_PC-20161101-041807.yml
Description: application/yaml