[qubes-users] Re: HELP: TemplateVM's have lost internet access
On Wednesday, 9 November 2016 15:47:45 UTC+11, SEC Tester wrote: > UPDATE: > > I just ran qvm-revert-template-changes fedora-23 > > Unfortunately still not able to ping out to the internet from templateVM. > > Could sys-firewall config be causing this? I havent even played with those > settings tho. And don't forget to re-assign the NIC to the NetVM. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/855979b3-26f8-460a-a077-765e1e1ac68d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: HELP: TemplateVM's have lost internet access
On Wednesday, 9 November 2016 15:47:45 UTC+11, SEC Tester wrote: > UPDATE: > > I just ran qvm-revert-template-changes fedora-23 > > Unfortunately still not able to ping out to the internet from templateVM. > > Could sys-firewall config be causing this? I havent even played with those > settings tho. There are different things that can cause this. At some points, just re-creating the NetVM will cure the issue. So in global settings, set there to be no default NetVM. Then unset the NetVM from any Guests. Then delete it and re-create it. Then reassign it as default. That cures mine WHEN it happens, which is rare to see any more, but it does happen. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/520c31ea-69ae-4666-b747-a9e78a89fc5a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: HELP: TemplateVM's have lost internet access
UPDATE: I just ran qvm-revert-template-changes fedora-23 Unfortunately still not able to ping out to the internet from templateVM. Could sys-firewall config be causing this? I havent even played with those settings tho. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/271a254c-3d9d-4949-b84e-7384f25bab58%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes on Lenovo Thinkpad X250 Issues
Bump. Its not Qubes specific. Same applies to latest Xen Hypervisor on Ubuntu 16.04.1. Any idea what got introduced into Xen between 3.0 and 3.1? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/86285865-2bb2-4b73-b3c9-4553b790f0e6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HELP: TemplateVM's have lost internet access
New Qubes user here. Ive been trying to add some software to my fedora-23 template, but it can't access the internet. I can ping sys-firewall, but not the internet. firefox also lost access. Also tested with the debian-8 template, & fedora-23-minimal template. None have Internet access. I CAN access the internet using VM's based on the templates, BUT Not with actual template its self. Im sure the template VM's used to be able to access internet after i first installed Qubes. Has an update caused this problem? Im running Qubes R3.2 Ive tried restarting the VM's & rebooting the entire computer. What should i try next? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c0debe71-96ff-413d-ba55-10716b258950%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Command to open VMs in respective XFCE panel workplaces
On Tue, Nov 8, 2016 at 2:58 PM, Franz <169...@gmail.com> wrote: > I installed V3.2 and started to play with the XFCE environment (very > nice, many thanks to developers) > > It seems that if you open many VMs and many applications they are not > grouped per VMs as with KDE, but are all randomly mixed together, so the > panel is messy. > > Found that the 4 workplaces on the panel can help to put some order > manually dedicating a worplace to each VM. That is good! > > I know how to start VM and applications from dom0 and have a script that > does that. But is it possible to modify the script to tell for example that > firefox of work VM should go into worplace 3 ? > > Of course the purpose of all that is to automate the starting of Qubes > putting the more used applications each in its proper worplace. > > But of course there may be other way of which I am unaware to put some > order on the panel. > > I found a solution with wmctrl -s where n is the number of the workplace. wmctrl is default installed in dom0: qvm-start personal sleep 3 wmctrl -s 1 qvm-run personal nautilus qvm-run personal firefox qvm-start work sleep 3 wmctrl -s 2 qvm-run work nautilus qvm-run work firefox etc. If you put this in a script it will separate VMs each in its workplace with a nice order. Best Fran -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qBgk-UayCF%3DW%2Bj7EGAZDHKBYvrwDm8p%3Do91bSCpEts%3DGg%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: (is Eluktronnics a) Good choice laptop for Qubes?
On Tuesday, November 8, 2016 at 2:14:36 AM UTC-5, Dave C wrote: > I'm looking to upgrade my laptop and get something suitable for Qubes 4. A > search for laptops with large RAM led me to Eluktronics brand. It gets good > ratings on amazon, but I have not seen it mentioned here. > > Here is (I believe) their smallest model, and if I understand correctly it > meets the reqs of Qubes 4: > > https://www.amazon.com/dp/B01E3Q0K24/ref=psdc_13896615011_t3_B01G1JT7QG?th=1 > > The CPU: > http://ark.intel.com/products/88967/Intel-Core-i7-6700HQ-Processor-6M-Cache-up-to-3_50-GHz > Qubes 4.x reqs: > https://www.qubes-os.org/news/2016/09/02/4-0-minimum-requirements-3-2-extended-support/ > > I thought it wise to ask here before ordering... Am I missing something that > makes it not a good choice? > > I've read elsewhere > (http://www.onebigfluke.com/2016/10/alternatives-to-apple-computers.html) > about the importance of Thunderbolt 3, which I believe the model I link to > does not have. But honestly I don't know the ins and outs of what hardware > makes a laptop the best choice. I'm looking for a lightweight laptop that > offers high bang for buck. And of course will work perfectly with Qubes. > > Any strong opinions here about the Eluktronics brand specifically? Or Qubes > laptop advice in general? Thanks! > > -Dave I never heard of this brand. couldn't find a manual for that model but found this one. http://www.eluktronics.com/content/Manuals/P6x0RS%28G%29/P6x0RS-G_Manual.pdf Vt-d is enabled by default it looks like from the picture so thats a good sign. Thats the most important thing to look for. It also has tpm. only thing I would question is if the keyboard is ps2 controller, which I'd recommend. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/48d8befd-52a8-427f-8316-ea9c0d2874d0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Android-x86 on Qubes
On 11/07/2016 08:54 PM, 3n7r0...@gmail.com wrote: > AFAICT, it's an issue with how QEMU is implemented in Xen. The input > device in question is passed via `-usbdevice tablet` instead of being > left to the default PS/2 emulation. There doesn't seem to be any easy > way to disable that parameter from within Xen? I would also be very interested in that! Marek, do you know? Kind Regards, Torsten -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/52ca9454-e84b-e8f5-d8fb-4b7721248d77%40grobox.de. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Issue #2407: Renaming VM works partially
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Nov 08, 2016 at 08:00:30PM +0100, Jimmy Axenhus wrote: > https://github.com/QubesOS/qubes-issues/issues/2407 > > Sadly I reproduced this by accident. I renamed a VM, but it somehow > failed. It did not get renamed in Qubes VM Manager, yet it did in > /var/lib/qubes/appvms and the start menu in dom0. A simple reboot did > not solve the problem as Qubes VM Manager still shows the old name only. > I can not rename the old VM again ("file doesn't exist"-error). > > Is there any way to rename the entry in Qubes VM Manager or do I need to > rename the new VM in /var/lib/qubes/appvms to its old name and try again? You can try by editing /var/lib/qubes/qubes.xml - change "name", "dir_path" and "conf_file" properties - or simply all occurrences of old name. Make copy of this file first, just in case. > I have not been able to reproduce it again by creating a few new VMs and > renaming them. Check .xsession-errors or .xsession-errors.old for some Qubes Manager error - it would really help with debugging this. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYIkcJAAoJENuP0xzK19csdFkH/iH+Og1VejUpFzQVlM9fCc35 wDYVSpCLky8p0e4KOdtVDqfhxnUg6KHH0k3Ej0Bve0y+gUO3z67vEEfXjXgW2TuF qPKm+DcY+ABb/6lj5pDodeSmrQbBnxTeaT9PlLLutelmVlvGswI0V3WXaEz7JvAl tOXTZcgSETeeMPb7TXhUAbzBonYquTjTk9ruWpwaitflLOLpOsQ7mC4CtC+9wSTx 60lhQdavPmq2J3YV2xPx+YJC72ARr4AUX8IsuA1AM3aPSXD+lcSsZcdMaFZEV1tu YfCn4JUfG6rkgipAPB+VV5I96gncymGjWp21uVzXyw60ZTpyoipUpCDfhXqs9Es= =HUAt -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161108214337.GK7073%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [feature request] Shutdown template after update
Am 08.11.2016 um 12:31 schrieb Andrew David Wong: > >>> After template updated ask user at the console to shutdown current > template. > >> > >>> "Shutdown current template [Y/n]" > >> > >> Currently tracking a very similar suggestion here: > >> > >> https://github.com/QubesOS/qubes-issues/issues/832 > > > Wouldn't a command-line tool qvm-update-template [--all] > > [--shutdown-after-upgrade] [, ]* be much more > flexible? > > Yes, but I don't think the primarily goal of that ticket is flexibility. > Rather, I think it's to implement a quality-of-life feature that will > benefit users generally, including novice users who never touch the > command-line. Maybe I should have added the (obviously in my eyes obvious) argument: The current update-procedures are launched by a GUI-application and then open a window that is asking questions which need keyboard interaction. And in some cases the default answer (at least in Fedora) (which is making things worse – at least the default Xterm is looking different for Fedora and Debian) is not what you want. Or at least not what I want (aborting the update). Now someone wants to add another bloody interactive option that will require at least me to select the non-default option. No. Thank you very much, but no. If someone is making things even more like a text adventure they could just as well do it right, make the update process command line based and give up interactive decisions in favor of command line parameters to finally deliver a launch-and-forget solution. That could be easily scripted without opening that barrel of salt. Achim -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/24af09d7-f174-a1b7-e0d9-ac7e659f93a4%40noses.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Installing Windows 8 as a Standalone VM
Hello. In the past I have installed Windows 7 following the instructions found on the website with no problems. Windows tools worked fine as well. I now want to do the same with Windows 8. I assume since its just an ISO the install should fine, but my concern is with Windows Tools. Has anyone gotten Windows 8 to work successfully with Windows Tools. My utmost concern is the ability to copy/paste from Qubes VMs, this has been very useful and I would like do the same in Windows 8 as well. I'm also not stuck on Windows 8, if others have achieved the same functionality with Windows 10 as well that works for me, I have no problems using Windows 10 instead. -jt -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nvt3av%247qf%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Issue #2407: Renaming VM works partially
https://github.com/QubesOS/qubes-issues/issues/2407 Sadly I reproduced this by accident. I renamed a VM, but it somehow failed. It did not get renamed in Qubes VM Manager, yet it did in /var/lib/qubes/appvms and the start menu in dom0. A simple reboot did not solve the problem as Qubes VM Manager still shows the old name only. I can not rename the old VM again ("file doesn't exist"-error). Is there any way to rename the entry in Qubes VM Manager or do I need to rename the new VM in /var/lib/qubes/appvms to its old name and try again? I have not been able to reproduce it again by creating a few new VMs and renaming them. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/66d4df4e-a588-6f3d-673f-5e226b8da7fd%40axenhus.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Screen recorder for Qubes..?
On 11/07/2016 07:32 PM, Jean-Philippe Ouellet wrote: On Mon, Nov 7, 2016 at 2:29 PM, Chris Laprise wrote: The framebuffer is being handled by the trusted dom0 graphics stack, so is actually a trusted input. Perhaps we have run into trusted != trustworthy terminology issues. I meant to say that the content of the framebuffer being processed by the highly complex [1] compression algorithms is directly attacker-controlled, and thus attacking dom0 by displaying specially crafted bitmaps is a theoretical attack vector. [1]: https://sidbala.com/h-264-is-magic/ (from recent hacker news -- serves to illustrate that video compression has significant complexity, and it is not impossible to imagine the existence of exploitable edge cases) I think this is one for the computer scientists. As it stands, despite the complexity, codecs like H.264 are designed with handling chaotic, noisy input as a top priority. Any pattern that tries to push the encoder into a highly unusual code path is likely to simply be identified as too expensive and become blurred more than the rest. its a simple matter to pipe the raw video to a codec in an appVM. Performing the compression in an AppVM in order to isolate dom0 from potential video codec bugs would be ideal, although to do so while retaining reasonable performance (frames per second) would require a non-trivial amount of work. You would want to eliminate excessive copying of large amounts of data (raw frames are large), and probably want to do something like the shared-memory composition buffer sharing done to achieve performance in the qubes gui daemon today. I would say this is not a simple matter as it would likely require some non-trivial hacking to get working well. The threat model is pretty similar to Qubes' Trusted PDF feature. Not quite. The PDF processing happens in a throwaway VM, whereas here the video processing as done today happens in dom0. I was suggesting the compression could be done in an appVM... it should be trivial to do so. The result is supposed to be a sanitized, trusted document. I think this is about as realistic for video as it is for PDFs. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dc5b1ec7-d404-feff-d029-c513cde3ff0a%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HVM and TemplateVM based on Windows
Hello Can I use a Windows template VM without install HVM? In Templatevm do I have to install also qubes-windows-tools? Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8971c0b3136e1ca7ed05887842e48ccb.webmail%40localhost. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Command to open VMs in respective XFCE panel workplaces
I installed V3.2 and started to play with the XFCE environment (very nice, many thanks to developers) It seems that if you open many VMs and many applications they are not grouped per VMs as with KDE, but are all randomly mixed together, so the panel is messy. Found that the 4 workplaces on the panel can help to put some order manually dedicating a worplace to each VM. That is good! I know how to start VM and applications from dom0 and have a script that does that. But is it possible to modify the script to tell for example that firefox of work VM should go into worplace 3 ? Of course the purpose of all that is to automate the starting of Qubes putting the more used applications each in its proper worplace. But of course there may be other way of which I am unaware to put some order on the panel. Best Fran -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qBWT%2B5FOXeGi9b_KEJUJooz9wC%2B3tDGbXaykY78tFvVGQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Finding smb mount points in deb vm?
I wasn't sure if this was a purely deb question or not so thought I'd post here to be sure (apologies if I am wrong). I was able to connect using smb to my server via a redhat vm and nautilus then went to a term, typed mount, and could see where the mount point was exactly (like /run/user/1000/gvfs/???//) but when I try to do the same thing in a deb vm it mounts fine in nautilus but then the mount only shows up to /run/user/1000 and when I look in the gvfs dir its empty, there is nothing in there hidden or otherwise). I wasn't sure why in RH there was a mounted dir in the gvfs subdir and nada in the gvfs subdir on the deb vm? I have an app that does not let me put in a full path but I have to click through a tree so I'd really like to find where the mount point is. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAGpWZxM%2B%2BaOxf8FrV%3DoemPycdbDYrKvVwDZi-MVh7%3Df0NLVSzA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] entropy sources?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Nov 08, 2016 at 05:01:22AM -0800, Andrew David Wong wrote: > On 2016-11-08 04:16, pixel fairy wrote: > > where do vms get their entropy? can anything be done to help with this? > > > > Short answer: haveged Not only, additionally initial seed is obtained from dom0. But otherwise yes - haveged. > Details: https://github.com/QubesOS/qubes-issues/issues/673 > > Open related issues: > https://github.com/QubesOS/qubes-issues/issues/1752 > https://github.com/QubesOS/qubes-issues/issues/2161 > - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYIfWEAAoJENuP0xzK19cs+7IIAIeLlyZpqWqvjVFzAPOH9P6H 5XwvpNiQiVLycwCdmFLhChs9eJXTmZQGE7sePvVDKZvtwZ3+qtBO3HNz04eAA5jJ gEjuBgKi8tNvQevwVtOps4Pbsvs2tLlPoksOcHMtBIpLciLJYevcQ2lvQpDjHXZv CB/XH23GSi9IlzTLyxPYWysZlCieomXI7xF+nkut9Mt46iT10tZDOs3f80DgB8fI DpEFkEewzOi75Dc8R+fs8sVtlWuo+3BGHeAa2XqJDni7Jh5Z2CmeUwo1ylwv5fYS f6PUewAxSifTzDq7GUGBvarskHjUIuZZWmLDRjYaLTpXayiwmgFbzbsd7zBXU4E= =gjvf -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161108155547.GF7073%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Screen recorder for Qubes..?
On 11/08/2016 03:53 PM, neilhard...@gmail.com wrote: On Tuesday, 8 November 2016 12:49:53 UTC, Eva Star wrote: It's not hard to integrate video capturing to my qubes screenshot tool What is the command name for your screenshot tool...? Can it be run on the command line..? Because I'd be willing to just write a script to run it multiple times per second, and then view the JPG / PNG images individually I'd be willing to write that script myself right now and not even integrate it into Qubes or anything... To just do it for myself. The tool for video is already exists. It's silentcast. Just install it at dom0 and you will be able to make video. The only problem that it's not at default fedora 23 repo. -- Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5a68ed27-c925-320f-c7b5-6e15647427c3%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] entropy sources?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-08 04:16, pixel fairy wrote: > where do vms get their entropy? can anything be done to help with this? > Short answer: haveged Details: https://github.com/QubesOS/qubes-issues/issues/673 Open related issues: https://github.com/QubesOS/qubes-issues/issues/1752 https://github.com/QubesOS/qubes-issues/issues/2161 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYIcyiAAoJENtN07w5UDAwPXIP/0U2dBxoTF0DQiRYpW3FmIYc MU84cP0XIMA1iyhwm909XjI1iKpLeimMLjiLjtqC2Tmj2yJ8kAEpUhRWtrf/cWod NAohPghdxtaTb8xzba8+LrAKvjc/kKm+sXAmPpAXWqRAD+GG+J2HUEcgyduFKCaK tbUPdGOCKy79SEhB6D0hyKCqG/fctJaZHTAiupvQdV8diBUpzEdZh7Og1MklBBy4 IXpJ27uQei7CrLoAkZQ0AzqNBGBc1itAlXY3LrN4VPkCkXzvnO0loHrv2zyef21z 68TtfeeBLYpoBfEpp6thHImYq/czidlk0SWe+YQOGMfVR1vc1JyC1H0cZofFF8VR 2f/iGEZCqhJObhKWyDU2tzyy4Y07RxsdBERPYOEfl+1uLyNCUR1FA5B9DhBtDAg1 WqCpePbjoFFZRvnQgO3o0zcnYSm9YBjbRMhNFQm5XGVRmQnG1Vgv7RBvk+2C91ge NGx+NPoFXWKe3qZYQ0TYHRuU/Qg2sAEWKZd1z5nWUj3YCDj0ZjLUdpkt3GqTubsk rUbJ6/Lcn8eDSijfx/aL4Zx/H4pvP+b1hK59Ik57gbw/P+vDlH0WEtARf6bMsTI8 q4U9Y3iA+0iRSol+Asqx+kPmmcv9lbPshCtUUnvEcni4qsQzgKHjbIriSxy45AGl B2pG8gXvBEBg36PJgHXA =aqbt -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f66b9d7d-f3fa-7e84-0885-3d234f00d9e9%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Screen recorder for Qubes..?
On Tuesday, 8 November 2016 12:49:53 UTC, Eva Star wrote: > It's not hard to integrate video capturing to my qubes screenshot tool What is the command name for your screenshot tool...? Can it be run on the command line..? Because I'd be willing to just write a script to run it multiple times per second, and then view the JPG / PNG images individually I'd be willing to write that script myself right now and not even integrate it into Qubes or anything... To just do it for myself. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a87c04b2-6e0e-46d3-9162-243b78a4795c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Screen recorder for Qubes..?
It's not hard to integrate video capturing to my qubes screenshot tool https://github.com/evadogstar/qvm-screenshot-tool/ But this need additional software like ffmpeg and silentcast to be at dom0 -- Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aae7da37-16cc-7bcc-d406-cd7400bb42ac%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] entropy sources?
where do vms get their entropy? can anything be done to help with this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/48bafb90-5b7a-4300-9247-b1f7b8ec6182%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [feature request] Shutdown template after update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-08 03:20, Achim Patzner wrote: > m 08.11.2016 um 10:07 schrieb Andrew David Wong: >> On 2016-11-07 10:05, Eva Star wrote: >>> After template updated ask user at the console to shutdown current >> template. >> >>> "Shutdown current template [Y/n]" >> >> >> Currently tracking a very similar suggestion here: >> >> https://github.com/QubesOS/qubes-issues/issues/832 > > Wouldn't a command-line tool qvm-update-template [--all] > [--shutdown-after-upgrade] [, ]* be much more flexible? > > > Achim > Yes, but I don't think the primarily goal of that ticket is flexibility. Rather, I think it's to implement a quality-of-life feature that will benefit users generally, including novice users who never touch the command-line. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYIbeOAAoJENtN07w5UDAwmccQAKpiMzbhePkkj46KaVOQ5WoY K1AtMMhzmRnU1Faq0RHafTEc31UaJSNczioGwDQvFDszVU0D1Df+BspnKBHkDpBW zhAvtMm/vTMN7DnYVEWEfiAnyIwY2kGjWTq4tP3e1aEA/NW9G+r9OnwMVcLXFuBd SFV9oX7tbVmn4Xd/zMzsZlhV9I+8pxC72GAlQPsbfJwT/qDNwDN2nuJzpIqnfXVV BKJPQ3squBXR9hGBx03yGj9gRCJyZzvcMSQlv58nSjP9oCOYHJ3qls97qx4JVSLi exurkz8jtpVOBskGZXHZ9QNRpm5Pc4p8prgPzwNE/xkJ8gNAXWTeuJYb8Z4iY5H+ p4zim60oved4OxpeuYySzdl/x+ThyIrxPL2SAeDyeKfW/CIeXWL+J6Dho2aQxHXZ lCjmF+YWqEqANM4b3pAd6SGOiZfHR3yOuPYuxGIiquIYLC0/V5Smc7eZeN2nXdV2 vRzuExSUNvigR3xJru+zFNh56mrZgS55bPOZaLjI2z5ZZDmtgXOdl7vtWcw6AHM+ +oXzv3ZUB9JhR5TOPekYG2JaaqqoNvlW5j+V+S+D/giM1Bn7M+BiHWQrSAsNX45L dPKDSuvYXYP+v38SEI5I/ADlJxnjpVrmSD+MEnp+eFmZcL7/PCOCE9jXCuwK/ef1 knavpTYoo1VSqKr2quSn =IKkm -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c3386bf9-f1c9-3ddf-6995-f724dc82eb8a%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [feature request] Shutdown template after update
m 08.11.2016 um 10:07 schrieb Andrew David Wong: > On 2016-11-07 10:05, Eva Star wrote: > > After template updated ask user at the console to shutdown current > template. > > > "Shutdown current template [Y/n]" > > > Currently tracking a very similar suggestion here: > > https://github.com/QubesOS/qubes-issues/issues/832 Wouldn't a command-line tool qvm-update-template [--all] [--shutdown-after-upgrade] [, ]* be much more flexible? Achim -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/04a97647-4ff9-0636-239d-55ce636e3f46%40noses.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Screen recorder for Qubes..?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-07 16:32, Jean-Philippe Ouellet wrote: > On Mon, Nov 7, 2016 at 2:29 PM, Chris Laprise wrote: >> The framebuffer is being handled by the trusted dom0 graphics stack, so is >> actually a trusted input. > > Perhaps we have run into trusted != trustworthy terminology issues. > > I meant to say that the content of the framebuffer being processed by > the highly complex [1] compression algorithms is directly > attacker-controlled, and thus attacking dom0 by displaying specially > crafted bitmaps is a theoretical attack vector. > > [1]: https://sidbala.com/h-264-is-magic/ (from recent hacker news -- > serves to illustrate that video compression has significant > complexity, and it is not impossible to imagine the existence of > exploitable edge cases) > This is a good point. Perhaps the situation will be easier once dom0 has been bifurcated into separate Admin and GUI domains. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYIZb8AAoJENtN07w5UDAwL3YQAJF+WHnRy5nM81D/YgHgfdl2 d+UZSdVTRHLHqujZCOPATys4e5ZLMtcrnTVj6HGtuNudlt46DnDMF2vgOwsz3U9A 1TZEKIX/ePE+Wlzf436mZ2wCBSdA/+kNZ32ue6zqE9ffAh4EKrTojmV5s3f/NQe4 AM2ni3fElrEyr+m7IHjyTmMKP+ycrWJ6WjszBx47fjjbL1OYljizZXYegMcFhYcW NzzNjG0yg74+GvApTy7FGE+CrsTf8zmOzb7s9waLeGVpOKbQwEHql4uTQwIJ6y7B zyzVMSrRjhjn3MyOcSEGeMTuvTGSuOYlMX1pRumnmR+jrbHuY9DTQBJVkBo3QhU9 ywZu16DB2BOVaWJITpiBfDXwoU+/9eqhNeegc6No2UKGvqFBlC+Xxj8XXe9l7cex EdmCeW03Y4G3nUg/r6TF/3xvkgn/AOD2a7MxnEknmSjWydMfVWu0bPSqq+jeDUnq 7GWnM0xWbY8VUVQKwE8cjKG8VfqQyw86kfidBmPIZNiEYwMqSpRCGILabE0FhGww 3CVeHoXDsi8OovV4tqehR92q8jufnnkjTaLyeH3J4S18PpjnuA3YwVOoTXF2MECM JywoHxTzqYNOFpO6xohXve2IQgq4gh7b9ItH9BLlAhjkG/sY4leIlRyZb90n/F0o vVSN0vijM6AP+Ze+Dtgl =fiqZ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d654e5be-ccfd-357c-19ba-5a1d59ea0f97%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Android-x86 on Qubes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-07 12:57, 3n7r0...@gmail.com wrote: > Using stock android-x86_64-6.0-r1.iso from android-x86.org (cm not tested) > > Issues: > 1. no boot > 2. mouse support > 3. wake from sleep > 4. private storage > 5. secure clipboard > > 1. If HVM hangs priors to splash screen, try adding `vga=ask` to boot kernel > parameters. (1024x768x16 works for me) > > 2. Mouse cursor needs to be dragged around inside vm. > Not aware of any workaround. > Previously reported: > https://groups.google.com/d/msg/qubes-users/2GAfjsltkmk/QY9fVetKKAAJ > > 3. Can't figure out how to wake hvm from sleep. > Untested workaround: Disable sleep completely by adding: > "setprop sleep.state disabled" to /data/local.prop > or "sleep.state=disabled" to /system/build.prop > (https://groups.google.com/d/msg/android-x86/8iSh5pVqv4U/Fz8Nh11UDwAJ) > > 4. Is moving /home/ as simple as copying and editing fstab or are there > qubes-specific steps that need to be taken? If yes, would appreciate it if > someone could point me to qubes package that handles this. > > 5. No clue. I hope someone is willing to work on this. > Cross-linking open GitHub issue: https://github.com/QubesOS/qubes-issues/issues/2233 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYIZZUAAoJENtN07w5UDAwSdYP/i2G79s4oJvY8wIhD6O5hytU 11d9vGcPjowofIjdleE5KdnAgy0FB/ny68BGC3upc0nB7TIHobdOP+2h74qzXeEa kDryIVIDmPiL4hQNGqGPILP64LsUNvvYNhME4LTKb6Nhyb4X3IAIWv2DiLp72CP9 tpj6Mok9ybbmyuXuOgE1sddTz6Tjcbak4oxRqOCtY+uBURZe7ZqnqWtSuKrUJVCZ 5oMFwcrPliVewHEDaxv7z3uMUWS/cwfICZ2CxWVpNAqF/6vUvMwWeEn1i27wXzvH fFapTksovg9LhG32JYGELe87zbPmz4rfzL0KNbDDdH6dTVO9dCygk42YGbt23fNU KsaHf3a/fvVzk/GkWxDpCo4LiOgQo3Ih+dp+3HwFPs5TwZOzKp24rJEKERAtz520 6fQ2PQ/zb/khlgz+IeymKJQ5MOU6t8IUwKP88YpCTbIaX0GFhgmEuXv+zpWHihgL NBggiHOYVCn7W89M4GtM1Uv7nD1h4Qkb5VzgffZa8OtNctRa68hoGSGkqaymb2mo 52aH91/qvYd+vbszgp2dzNSjAaUv0X2plU45zBUOtT/A9VLl/FhR2NqfM+dhsRrd 20FWVx6Wsu0i/9dScOn/16LfZ9MA771mTfzpWXE5R2Gvhf91N8piFHtqx93JKkqP QwZ2rnu39VLaLGteznre =nZh+ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9e18c507-2ffc-cb72-0858-a07bf72b2177%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [feature request] Shutdown template after update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-07 10:05, Eva Star wrote: > After template updated ask user at the console to shutdown current template. > > "Shutdown current template [Y/n]" > Currently tracking a very similar suggestion here: https://github.com/QubesOS/qubes-issues/issues/832 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYIZXYAAoJENtN07w5UDAwxggP/jGZBpTvA/gwWbRumpZ/HTlI s6TG1DR01Wmn2CxhPgryId3PnUOKp+Z1v0R74oD4q8QxIPUkJSgLG5QuqkN2WCpQ du9IS60m9GVIetgu5UUaAHBpk9vNNG7GBTFiZiPuhYLqxyvbbr+KO4Kxdhk+i5jk OsNMNyxkjTaVhNA2cZqT9YTlOYjRh7EmUX5JqKpeTWi+F8Who71NpUQqD2tAluRG YnrHSCWyuAAZymrKt/MVKb1aZRMxqlcMa67Vo0CIisoEnTbQigQDQDpHnMLBh7XD tu8rENQT0HXngzC7qTKJsvwBD+U0SyUFxp7RQBaU3wsyE86ROUcvlsCrfHA3pUYG IJkikbSIMgdHejZ4yC8abpdaOcj/hod3yexh0Rquvp64+NX+4tN9L/wblhaVXBgN ogxW8LWtDpHUljla6T4BegnfnRVMgp9GMqVdBn4fAts2YFszMcNYanV3GnjuoCNt vF9+Wk+uwFM14nwyjFTusQhP+uBeXajMdyN9gMSFIg1L7CD0Cjndy9Pk2o/odmfb r+xERYSvBZocmjazKoTZfQoC2fktniIroH7C7t2iwk2e5wwyFu5+KVUN1NsMknPm EFnfNYselmls/PpdxM82oYT7wXPGZmdQsT8Z4rDAKkKQEx/fnPxRSP2UphY6Hlih 2g+Wv6Hr9ls/UTty7T4E =de3L -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fe3f8bea-614e-8e36-7b01-140465019f10%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.