[qubes-users] Re: Thinkpad T460
The output in the fedora template is: ● tlp.service - TLP system startup/shutdown Loaded: loaded (/usr/lib/systemd/system/tlp.service; enabled; vendor preset: enabled) Active: active (exited) since Sun 2016-12-04 07:22:25 CET; 21s ago Docs: http://linrunner.de/tlp Process: 567 ExecStart=/usr/sbin/tlp init start (code=exited, status=0/SUCCESS) Main PID: 567 (code=exited, status=0/SUCCESS) CGroup: /system.slice/tlp.service Warning: Journal has been rotated since unit was started. Log output is incomplete or unavailable. and in dom0 console: tlp.service Loaded:not-found (Reason: No such file or directory) Active: inactive (dead) On 12/03/2016 09:53 PM, Jan Betlach wrote: On Saturday, December 3, 2016 at 8:41:49 PM UTC+1, Bernd Lorenzen wrote: Hello, my Question is how i set the charge thresholds for my Lenovo Thinkpad T460. I have installed the following packages tlp, tlp-rdw,tp-smapi-dkms and acpi-call-dkms in both fedora aind debian template. Afterwards i changed the thresholds in the config file /etc/default/tlp in both templates and in dom0. But it doesn`t work. Do you know a workaround for this. I hope did not forget some useful information for you. Kind regards Bernd Lorenzen Has the service been started? # systemctl status tlp -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/40128588-26e0-130e-877b-cc08dad81af9%40gmx.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Install on Dell XPS 13 (9350)
I failed to assign my TP-LINK TL-WN722N wireless USB dongle to sys-net. Google'd a bit and found some docs, still no idea on how to do it. Help is much appreciated. Thanks! miaoski -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/533295f8-59b1-4087-9ec5-e120127f5e17%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Install on Dell XPS 13 (9350)
Installation finished with the help of a USB mouse. Internal keyboard actually works. However, UEFI boot entry is not created. I booted to BIOS and added FS0:/EFI/qubes/xen-4.6.1.efi. There's no problem booting to Dom0 and create default qubes + sys-usb. Internal touchpad works as well. Internal WiFi doesn't work as expected. Mitigating with a USB dongle. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0ed25975-f8da-432c-9cc2-d80bbd358f26%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes OS v3.2 on Chromebook Pixel 2015
On Saturday, December 3, 2016 at 7:19:08 PM UTC-8, raah...@gmail.com wrote: > On Saturday, December 3, 2016 at 7:09:25 PM UTC-5, rspei...@gmail.com wrote: > > I've tried to install Qubes on my Pixel twice. The install boots nicely and > > everything seems to go well. Once I reboot, the boot process gets hung up > > and never makes it past to the decryption step. > > > > Any ideas or recommendations? > > bios settings? The Chromebook has legacy bios support through SeaBios on CoreBoot. There isn't anything to setup. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/add951ce-46c2-4382-a838-791807ce0c3a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Install on Dell XPS 13 (9350)
Hi. I have found a few threads about the installation of Qubes OS on a Dell XPS 13, but they are at least several months old. I'm trying to install Qubes 3.2 onto Dell XPS 13 9350, which has a running Ubuntu 16.04 LTS. The hardware matrix is, * BIOS 1.2.3 * CPU i5-6200U @ 2.30 GHz * Skylake * FHD (mine is not QHD) * Memory 8GB * M.2.PCIe SSD * TPM 1.2 * VT + DIO I disabled secure boot and successfully booted in UEFI. Anaconda was running well, GUI showed, but keyboard and mouse don't work in the screen of language selection. I wanted to try adding options in GRUB, but [Tab] gave me "chainloader /EFI/BOOT/xen.efi". I mounted USB disk with Qubes in Ubuntu, but its filesystem is ISO9660. I can't change /EFI/BOOT/xen.cfg. I thought I had a chance to use Qubes OS, since XPS 13 9350 is well supported by kernels newer than 4.4. Any comments, please? Thanks! miaoski -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2b8abd08-6d61-421a-bf05-103f6efc49ab%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts
On Saturday, December 3, 2016 at 10:46:39 PM UTC-5, raah...@gmail.com wrote: > Just don't get corrupted! haha But really I think this is great! I wish > all the success in the world. I still think its the future. I would for > sure by merch(I still want a sticker) too like an above user, and i'm look > into credit card info. > > But ya, If you got a good sales guy to go to some small to midsize companies > and give a presentation, how can anyone refuse!!!??? This sounds exciting to > me. oh and like Fran said don't be ashamed to name drop everyone and everything right off the bat. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8fb280fe-3e0b-4ff9-a816-76478daf66dc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts
Just don't get corrupted! haha But really I think this is great! I wish all the success in the world. I still think its the future. I would for sure by merch(I still want a sticker) too like an above user, and i'm look into credit card info. But ya, If you got a good sales guy to go to some small to midsize companies and give a presentation, how can anyone refuse!!!??? This sounds exciting to me. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/004e1856-a28a-487c-8730-bcc608f89524%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to backup an iPhone under Qubes
cause i can assign single device to a linux appvm no probs, but not to the windows hvm. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bdedeb90-52e0-4b84-83de-d4d3809a73cd%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to backup an iPhone under Qubes
On Thursday, October 6, 2016 at 1:54:14 PM UTC-4, qu...@posteo.de wrote: > Hi , > > thx for your reply. > > On 06.10.2016 10:13, Grzesiek Chodzicki wrote: > > W dniu środa, 5 października 2016 22:23:28 UTC+2 użytkownik > > qu...@posteo.de napisał: > > USB passthrough for HVM is currently broken, You need to either use a > > Linux AppVM or do it over the network. > > Is there a possibility to run iTunes on Linux in an AppVM? At least I am > not aware of it without a virtual machine with Windows. > > Network would work in theory, but it would require a bridge, which is > not possible without patching in Qubes OS afaik. > > Network backups also need to be setup for the first time via USB which I > can workaround atm by copying over the iTunes configuration from the > other VM but this still requires a bridge network device. > > Regards what about making an appvm from a win7 templatevm? or prolly all still considered hvm which I think is the prob. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9b58537a-b185-4aff-b8c8-325d8de7489d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: anyone luck mounting an iphone 7?
sorry for the spam ugh. but I was wondering if there was a way to do like a gnome-session-save or quit in qubes? probably not i'm thinking. the command is there in fedora-23 but it don't work. maybe cause its appvm? What if I make a templatevm a sys-usb. Is that possible? would it even make a diff? Gonna have to go galaxy s7 I think cause whats the diff anyway i've noticed now ... But I think alot of people would want this. Really don't want to use icloud. or, maybe use that in addition :) but want hard copies of data for myself for sure. all over my house like Harold Thomas Martin III -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c0159beb-19b2-4895-a9e1-cf69a6252c3d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: anyone luck mounting an iphone 7?
On Saturday, December 3, 2016 at 11:05:38 AM UTC-5, raah...@gmail.com wrote: > well i can get it working everytime on baremetal ubuntu now. What I do is > set lock to 5 mins. idevicepair pair,then leave device connected and log > out and in. then dcim folder then appears in file manager. works > everytime. Now to figure out how I reproduced this in qubes debian lol. > > Unfortunately until they update libimobiledevice you can only back up camera > pictures + videos, and texted pics. Can't back up music or downloads. I forgot to add I compiled 1.2.1 but I doubt it matters. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/61435852-aaf1-458e-8a28-d289367bdc63%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes OS v3.2 on Chromebook Pixel 2015
On Saturday, December 3, 2016 at 7:09:25 PM UTC-5, rspei...@gmail.com wrote: > I've tried to install Qubes on my Pixel twice. The install boots nicely and > everything seems to go well. Once I reboot, the boot process gets hung up and > never makes it past to the decryption step. > > Any ideas or recommendations? bios settings? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e4d9fac4-c02f-4c68-ab2e-d1946145531c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qga.exe 100% CPU load (Windows Tools)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Dec 03, 2016 at 04:23:38PM +0100, Marc de Bruin wrote: > Hi, > > Occasionally, the Qubes GUI Agent (qga.exe) process turns into a CPU-hog for > no apparent reason. The process just turns into a flatliner, eating up one > complete core, which turns the Windows 7 machine into a very slow beast. > Nothing is crashing tho. Power-off/power-on the HVM seems to fix it. > > AFAIK, I’m using the latest version of the Windows Integration Tools on Qubes > R3.2. > > Where should I start looking for problems? Any log-files that are recommended > to look at? Take a look here: https://www.qubes-os.org/doc/windows-tools-3/ - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYQ2zDAAoJENuP0xzK19csY2kIAI75LZNEajgIPnH7Vf9HtRq1 KQ0HIOEJiSPHw4B0bmT0Py5Sk7vBbc7/pUgMwhe4Y+Ftc/lxQgBJoN8q9KMFwPU5 cAmynGmOZ1gsIn04apI4WqE82Y6Dlxwlc+48zt+UlVL+e9q2+0UATknF+IUFUmFH g+gxg2dTqN8dRxu6DEm/RD9DhVQRvqL1pIy9qb185W56xJw3BvmzneyIdcNud7b+ IU3D8W9ORWzyEka9IPQzXIDSAsGBSP0Yy0xBVF5pJ+5XP9DqZEPXXlop9hsSMjzU V3ZwTflRflN4aXCZGLj7MpNhpBE9xBR61XwTpoaXZeOocKRY7dktKihb1BkNKEU= =j23L -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161204010922.GN1145%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: custom kernel doesn't work installed in debian cloned template
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Nov 30, 2016 at 08:52:19PM -0800, raahe...@gmail.com wrote: > On Sunday, November 27, 2016 at 12:02:08 AM UTC-5, raah...@gmail.com wrote: > > I followed instructions to install pvgrub2-xen in dom0. Then in template vm > > installed qubes-kernel-vm-support and grub2-common. Then i installed the > > distribution kernel from debian repos with apt-get (3.16). then > > update-grub and shutdown but It doesn't work right. I eventually would > > like to be able to compile my own kernel, was hoping it would be easier > > with pvgrub support but I think I must be missing something. > > > > When I boot it after selecting pvgrub in kernel settings. sudo xl console > > sows it has booted fine but then is asking me for a login. If I type root > > i get root. But I can't load any applications in the gui environment. > > from dom0 terminal or from the start menu on desktop. > > > > Thanks, > > Rich > > module doens't seem to be installing. I do sudo dkms autoinstall -k > 3.16.0-4-amd64 but I don't get any output. Take a look at dkms manual page - there is `dkms install` command for manual operation. Get u2mfn module version from /usr/src. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYQ2neAAoJENuP0xzK19csOLMIAIJ6oA2kgads6C/IMpxgQx0I gEb6VI9ZuY9U8QSHc5n+s61tcnl9/y+1su5kso6v3DX925wlQrmA0Ka1k3+YoKXV 3F1S6kg5PDZyzuysqBBU1v6WbjruFzgIohD1zNoRHU5sMU/SvjPaFadznuxolCPv T6t0feM0Pkhd7OtBt04GUeWyRCd/UJ9umAa/JozgzWoLkLTqlfGGmpI3OG01tA9r CFnwjRj92BzaRxUE7MwCcc8tVsoSDFH3Wwn9UwSHcSze6F1m2tcS4/pL2dm8bBUj +WkhdcZQm93ap/ueIrPKDbe2IlW3c2WfPnC+Dajt3WmAMF3TVkzXgvuQSRjqj/s= =ZCKE -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161204005701.GL1145%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Dec 03, 2016 at 04:24:05PM -0800, Benjamin Richter wrote: > Am Sonntag, 4. Dezember 2016 01:19:45 UTC+1 schrieb Marek > Marczykowski-Górecki: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On Sat, Dec 03, 2016 at 04:14:48PM -0800, Benjamin Richter wrote: > > > I have revisited an earlier approach with some more success. > > > I attached only the usb controller, not the bridges. This seems to work: > > > > > > sudo lspci > > > 00:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller > > > [Alpine Ridge] > > > 00:01.0 Network controller: Intel Corporation Wireless 7265 (rev 59) > > > > > > sudo lsusb > > > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > > Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub > > > Bus 002 Device 007: ID 046d:c51e Logitech, Inc. > > > Bus 002 Device 006: ID 1e4e:0898 Cubeternet > > > Bus 002 Device 005: ID 0572:1703 Conexant Systems (Rockwell), Inc. > > > Bus 002 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > > > Bus 002 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > > > Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > > > > > So some devices are there, like the SD card reader, audio device and the > > > usb hubs. The usb hubs even work, the Logitec device is an external > > > keyboard I connected. > > > > > > But the ethernet device is not there, nor the usb ethernet dongle that's > > > also connected to the usb hub. Both show up on dom0 if I connect them, > > > but since dom0 has no networking, I cannot say if they would work. > > > > Maybe those are on the other USB controller - 00:14.0 ? Try attaching > > that too to the sys-net. > > No, that's the integrated controller, which is the source of the trouble, > since it also is used for keyboard and touchpad/touchscreen, so I cannot > attach that to a VM. > > I've attached the ethernet dongle to the same port as the logitech keyboard, > but it does not show up anywhere. If you see the device in dom0 in some configuration, take a look at its sysfs path - it will have a hint on which controller is it. Like this: lrwxrwxrwx 1 root root 0 Dec 4 01:32 /sys/bus/usb/devices/3-1 -> ../../../devices/pci-0/pci:00/:00:02.0/usb3/3-1 - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYQ2RWAAoJENuP0xzK19csKxMH/3rkY6pxlWVSjltPRc1r2jGn njWyqDEA6Zoe56gAQ3zS1ORX54hgpEw6omZgzB3bY9KI2U3ihLncJ4jF8mVwxa+S rTCFF1Flqp8Olk2jTXc2lobdLcOQBMQXXfNq4GbpHkl0C+ZVIa1n7lndfJI9WA21 TKA3gsW/SY8EgBjYtFO0Emnhr5WMi3jYyt/qSWU8jrYn92IoZnx6CbpQp8xA/S8L KLvt7WUnBjuFX+k4z9hodXHq6eU00YNqOEI4fm0+y92PPSjIGKbDhClCstSMMXRE RqlbJmWpBasYBPm2pOg+1C0Vkeg593TtxahLd2k8MuFZUjrCjY4OXwA7+YkHFRA= =4hF8 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161204003326.GK1145%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
Am Sonntag, 4. Dezember 2016 01:19:45 UTC+1 schrieb Marek Marczykowski-Górecki: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Sat, Dec 03, 2016 at 04:14:48PM -0800, Benjamin Richter wrote: > > I have revisited an earlier approach with some more success. > > I attached only the usb controller, not the bridges. This seems to work: > > > > sudo lspci > > 00:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller > > [Alpine Ridge] > > 00:01.0 Network controller: Intel Corporation Wireless 7265 (rev 59) > > > > sudo lsusb > > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub > > Bus 002 Device 007: ID 046d:c51e Logitech, Inc. > > Bus 002 Device 006: ID 1e4e:0898 Cubeternet > > Bus 002 Device 005: ID 0572:1703 Conexant Systems (Rockwell), Inc. > > Bus 002 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > > Bus 002 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > > Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > > > So some devices are there, like the SD card reader, audio device and the > > usb hubs. The usb hubs even work, the Logitec device is an external > > keyboard I connected. > > > > But the ethernet device is not there, nor the usb ethernet dongle that's > > also connected to the usb hub. Both show up on dom0 if I connect them, but > > since dom0 has no networking, I cannot say if they would work. > > Maybe those are on the other USB controller - 00:14.0 ? Try attaching > that too to the sys-net. > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJYQ2EbAAoJENuP0xzK19cs1wwH/3jZh8JqNh1tqPJmaCxYzBA1 > nmCNJbZ7GDXk19ZJDfMeDsmaZ3OilvhjimAKf/43lvJMjQuzyneCjOwWW6Tef4zQ > CRPb3gVdiE5DdJ1Gq5Yz93VRP41Y26eN26SIKEk6TQAHJCuC9ydrIFC32oi6imsG > H+621Iv4f9zPiPta24fmoFQs2NdfAWZX6NHZpIXUULPZx5DncUsYwLRUttXUEIgg > pgMJGbdsC6X8iRJIT3CpSZcRRgpJJNIdEeiPtk2odbB2yzeL3sapCmZiJAs0iOjw > XMdKRfK9utExA8GH27Tkesiab7HR/PlHO8w2ztphLWxMmNLMEdMGSHQ4xXQM5kM= > =LgKq > -END PGP SIGNATURE- No, that's the integrated controller, which is the source of the trouble, since it also is used for keyboard and touchpad/touchscreen, so I cannot attach that to a VM. I've attached the ethernet dongle to the same port as the logitech keyboard, but it does not show up anywhere. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b0123d96-1802-491d-89d7-3c54dcc65c8e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Dec 03, 2016 at 04:14:48PM -0800, Benjamin Richter wrote: > I have revisited an earlier approach with some more success. > I attached only the usb controller, not the bridges. This seems to work: > > sudo lspci > 00:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller [Alpine > Ridge] > 00:01.0 Network controller: Intel Corporation Wireless 7265 (rev 59) > > sudo lsusb > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub > Bus 002 Device 007: ID 046d:c51e Logitech, Inc. > Bus 002 Device 006: ID 1e4e:0898 Cubeternet > Bus 002 Device 005: ID 0572:1703 Conexant Systems (Rockwell), Inc. > Bus 002 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > Bus 002 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > So some devices are there, like the SD card reader, audio device and the usb > hubs. The usb hubs even work, the Logitec device is an external keyboard I > connected. > > But the ethernet device is not there, nor the usb ethernet dongle that's also > connected to the usb hub. Both show up on dom0 if I connect them, but since > dom0 has no networking, I cannot say if they would work. Maybe those are on the other USB controller - 00:14.0 ? Try attaching that too to the sys-net. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYQ2EbAAoJENuP0xzK19cs1wwH/3jZh8JqNh1tqPJmaCxYzBA1 nmCNJbZ7GDXk19ZJDfMeDsmaZ3OilvhjimAKf/43lvJMjQuzyneCjOwWW6Tef4zQ CRPb3gVdiE5DdJ1Gq5Yz93VRP41Y26eN26SIKEk6TQAHJCuC9ydrIFC32oi6imsG H+621Iv4f9zPiPta24fmoFQs2NdfAWZX6NHZpIXUULPZx5DncUsYwLRUttXUEIgg pgMJGbdsC6X8iRJIT3CpSZcRRgpJJNIdEeiPtk2odbB2yzeL3sapCmZiJAs0iOjw XMdKRfK9utExA8GH27Tkesiab7HR/PlHO8w2ztphLWxMmNLMEdMGSHQ4xXQM5kM= =LgKq -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161204001939.GA6741%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
I have revisited an earlier approach with some more success. I attached only the usb controller, not the bridges. This seems to work: sudo lspci 00:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller [Alpine Ridge] 00:01.0 Network controller: Intel Corporation Wireless 7265 (rev 59) sudo lsusb Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 002 Device 007: ID 046d:c51e Logitech, Inc. Bus 002 Device 006: ID 1e4e:0898 Cubeternet Bus 002 Device 005: ID 0572:1703 Conexant Systems (Rockwell), Inc. Bus 002 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub Bus 002 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub So some devices are there, like the SD card reader, audio device and the usb hubs. The usb hubs even work, the Logitec device is an external keyboard I connected. But the ethernet device is not there, nor the usb ethernet dongle that's also connected to the usb hub. Both show up on dom0 if I connect them, but since dom0 has no networking, I cannot say if they would work. I cannot see an error in dmesg either. Am I missing something? Do I need to configure something else to enable the network devices in sys-net? sudo dmesg | grep usb [0.087164] usbcore: registered new interface driver usbfs [0.087164] usbcore: registered new interface driver hub [0.087164] usbcore: registered new device driver usb [0.199812] usbcore: registered new interface driver usbserial [0.199819] usbcore: registered new interface driver usbserial_generic [0.199826] usbserial: USB Serial support registered for generic [1.218031] usbcore: registered new interface driver usbhid [1.218036] usbhid: USB HID core driver [1.899801] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 [1.899805] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [1.899809] usb usb1: Product: Dummy host controller [1.899813] usb usb1: Manufacturer: Linux 4.4.14-11.pvops.qubes.x86_64 dummy_hcd [1.899817] usb usb1: SerialNumber: dummy_hcd.0 [2.517386] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002 [2.517394] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [2.517401] usb usb2: Product: xHCI Host Controller [2.517406] usb usb2: Manufacturer: Linux 4.4.14-11.pvops.qubes.x86_64 xhci-hcd [2.517412] usb usb2: SerialNumber: :00:00.0 [2.517988] usb usb3: New USB device found, idVendor=1d6b, idProduct=0003 [2.517994] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [2.518018] usb usb3: Product: xHCI Host Controller [2.518024] usb usb3: Manufacturer: Linux 4.4.14-11.pvops.qubes.x86_64 xhci-hcd [2.518030] usb usb3: SerialNumber: :00:00.0 [2.870258] usb 2-1: new high-speed USB device number 2 using xhci_hcd [3.039597] usb 2-1: New USB device found, idVendor=05e3, idProduct=0610 [3.039641] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [3.039676] usb 2-1: Product: USB2.1 Hub [3.039699] usb 2-1: Manufacturer: GenesysLogic [3.333235] usb 2-1.1: new high-speed USB device number 3 using xhci_hcd [3.458450] usb 2-1.1: New USB device found, idVendor=05e3, idProduct=0610 [3.458501] usb 2-1.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [3.458545] usb 2-1.1: Product: USB2.0 Hub [3.458572] usb 2-1.1: Manufacturer: GenesysLogic [3.582241] usb 2-1.3: new low-speed USB device number 4 using xhci_hcd [3.697415] usb 2-1.3: New USB device found, idVendor=046d, idProduct=c51e [3.697467] usb 2-1.3: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [3.698170] usb 2-1.3: ep 0x81 - rounding interval to 64 microframes, ep desc says 80 microframes [3.698255] usb 2-1.3: ep 0x82 - rounding interval to 64 microframes, ep desc says 80 microframes [3.702613] input: HID 046d:c51e as /devices/pci-0/pci:00/:00:00.0/usb2/2-1/2-1.3/2-1.3:1.0/0003:046D:C51E.0001/input/input1 [3.753888] hid-generic 0003:046D:C51E.0001: input,hidraw0: USB HID v1.11 Keyboard [HID 046d:c51e] on usb-:00:00.0-1.3/input0 [3.762024] input: HID 046d:c51e as /devices/pci-0/pci:00/:00:00.0/usb2/2-1/2-1.3/2-1.3:1.1/0003:046D:C51E.0002/input/input2 [3.814541] hid-generic 0003:046D:C51E.0002: input,hiddev0,hidraw1: USB HID v1.11 Mouse [HID 046d:c51e] on usb-:00:00.0-1.3/input1 [3.823050] usb 2-1.1.2: new full-speed USB device number 5 using xhci_hcd [4.128399] usb 2-1.1.2: New USB device found, idVendor=0572, idProduct=1703 [4.128445] usb 2-1.1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [4.128476] usb 2-1.1.2: Product: ASUS USB Audio [4.128496] usb 2-1.1.2: Manufacturer: ASUS [4.128514] usb 2-1.1.2: SerialNumber: sudo dmesg | grep usb [0.087164] usbcore: registered new interfa
[qubes-users] Qubes OS v3.2 on Chromebook Pixel 2015
I've tried to install Qubes on my Pixel twice. The install boots nicely and everything seems to go well. Once I reboot, the boot process gets hung up and never makes it past to the decryption step. Any ideas or recommendations? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e6de0e1a-e457-4185-8afd-58be1a6d38f1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How do I get Qubes 4.0 pre-release/dev build?
On Saturday, December 3, 2016 at 3:01:48 PM UTC-8, bent...@cloudctrl.nl wrote: > I get an error wheb running make get-sources when i get to libvirt library, ? > Do I need to modify some sourcefile? Please help. BTW I just downloaded the > qubes builder from qubes-os, and I used your config. Is this correct or > should I be using a different qubes-builder? Same here, the error is: No valid signed tag found! Makefile:187: recipe for target 'core-libvirt.get-sources' failed -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ebaee0f9-2597-42c5-80a7-7ae97a1702f7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Trouble reading data CD under Qubes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Dec 03, 2016 at 03:21:48AM -0800, Pawel Debski wrote: > Folks, > > I have a PC with two SATA controllers: primary master holds my SDD with > Qubes, while secondary master has CD drive attached. > > When I insert a data CD it gets mounted by dom0 and the files are accessible. > I do not want to open these files in dom0 however. So in the VM Manager I > right click my favourite perssonal-full-sw appVM that I created previously > and select: > > Attach/detach block devices -> Attach dom0:sr0 > > and nothing happens. > > Even more: CD content is still visible in dom0 and /dev/sr0 is still mounted > in /run/media/pdebski/CDTITLE > > How can I better diagnose the problem? I think the problem is you have it mounted in dom0. If unmount it there, it should just work. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYQ1nPAAoJENuP0xzK19cs7dkH/3tixTrrQAaozHR6A+J3Z/wX wqheJcIwYdGYxGYd4wKC2breqED7tuVertg771ZhwJsN+YOshLiPywfY13Xj52cV Yfr3JYLkSFyhuE8PSQjQm5Zzovhm/PNOoMuBBsVm2l/afTv66iDedxpoisEGk2PO fc38ZaCVy5eXtE8cWuIqIUDXoVelD2Qlr2rxIBbewykCFqK0DgcxTUkh2qwrBlF3 7O1K1+hOmYkKFaOoM0lUoRuBUeG6Lh0hm+hHk0KlJuEW1uPzV/6SfWgZO2bu13UR 6x5LiXSMIxLzLnGyzzx0uMVhOAuWoNJeVPwm4AEi5AIsXyTek+LyU8F4WZVbF/k= =/m+X -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161203234831.GI1145%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Dec 03, 2016 at 07:13:41AM -0800, Benjamin Richter wrote: > Here I attached the PCI devices of the docking station to sys-net an rebooted > for good measure. > As you can see, the bridges show up, but the usb controller and the usb > devices do not, I have not Idea why. > > [user@sys-net ~]$ sudo lspci > 00:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > Ridge 2C 2015] > 00:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > Ridge 2C 2015] > 00:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > Ridge 2C 2015] > 00:03.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > Ridge 2C 2015] > 00:05.0 Network controller: Intel Corporation Wireless 7265 (rev 59) > [user@sys-net ~]$ sudo lsusb > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Indeed above there is a place for USB controller - 00:04.0. Check kernel messages (dmesg) in sys-net - maybe there you'll find something interesting about it. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYQ1k/AAoJENuP0xzK19cskr8IAIMkU+SpqnlJWP3eO0nMuZvM XudqaQp16jGCgqblKu3Vc+666+cxHMSHVKmIp6dmJHyZyP4h6JL28FsZCYsKHst/ 0MMsBHoxFnJMOsxD+T1561pRlg0VzEAP/n47PXRUMgMZ0wBxIHpA6hgffPVfeytB rLBK5XNLdn3hunN8mS4lxL/JW8TQZePVszHjTBF1SRwshFCs7VTdwaYVjvLIAucb 0owoP9EXnLx1XWFsk04B58zWYc3KS3pmPgFqGBUaueZ9kbZvxGlIBx/bbwfXGaE3 MNeQiXC4KCJnx8C5QP8HFXWjSSpBi1u8+gyglncOIzj7Gz3sV3Zv+ReVjIRTK38= =Qg5E -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161203234606.GH1145%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: "Start Button" and "Task Bar" are Missing
On Wednesday, October 26, 2016 at 11:25:44 AM UTC-5, sco...@gmail.com wrote: > I installed R3.2 yesterday and everything looked and worked fine, but today > when I started my machine up, I only have the VM Manager window - no 'task > bat' and no 'start' button. > > How can I get them back without doing a complete re-install? I realize this is a bit old, but I found that that the xfce4-panel wasn't running/started. Running that in Dom0 made the panel re-appear. Hopes this helps someone. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aedea7b6-c60e-4300-a819-e998568f7a56%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How do I get Qubes 4.0 pre-release/dev build?
I get an error wheb running make get-sources when i get to libvirt library, ? Do I need to modify some sourcefile? Please help. BTW I just downloaded the qubes builder from qubes-os, and I used your config. Is this correct or should I be using a different qubes-builder? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/128ceb54-3f88-4cd1-86aa-5430b44f9bef%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes and HiDPI
On Sat, Dec 3, 2016 at 9:12 AM, Marc de Bruin wrote: > With what will it be replaced in Qubes 4? Assuming you mean qubes-manager, then... Discussion here: https://github.com/QubesOS/qubes-issues/issues/2132 WIP code here: https://github.com/bnvk/qubes-manager-new Some early screenshots here: https://github.com/QubesOS/qubes-issues/issues/1870 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABQWM_Bq3zxwr7Gi2TS74ySteGF8KuCLz9Mt0VNHLAvVxM62ww%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] console window manager
On Fri, Dec 2, 2016 at 6:58 PM, Eva Star wrote: > xdotool not pre-installed (maybe it's better?) It will be in a future version: https://github.com/QubesOS/qubes-core-admin-linux/blob/be1d984364de9641312f56def13b0af27cfe1cd4/rpm_spec/core-dom0-linux.spec#L51 Pulled in as part of a work-in-progress effort to prevent graphical denial-of-service attacks: https://github.com/QubesOS/qubes-issues/issues/881 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABQWM_D844Wof-eno9gWv9kNaaHT785s%2BygoggA_Afb7LmMUKA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users]
Bądź mną Nikomu bliżej nieznana osóbka Załóż partię Nazwij ją: "1000 złotych na każde dziecko" Załóż funpage partii, pisz tylko o 1000 złotych na każde dziecko Reklamuj się natrętnie, zwłaszcza na forach PiS Reklamuj się też na forach pro socjalnych Ludzie pytają Cię o różne rzeczy Zawsze, nieważne o co pytany, opowiadaj o 1000 złotych na każde dziecko Idź do urzędu stanu cywilnego, zmień imię i nazwisko na "1000 złotych na każde dziecko" Spamuj nie tylko Internet, proś Grażyny z forów by agitowały na Twoją rzecz Załóż pełno patusiarskich, lokalnych grup nacisku Wieszaj na MOPS'ach i innych urzędach ulotki Plakaty Banery W zasadzie to niech robią to Grażyny, ty im tylko wysyłasz szablony Zakładasz własne forum pt. 1000 złotych na dziecko Opowiadasz o tym, jak zbawienne skutki to przyniesie Każdy drobny hejt banujesz Każdą próbę polemiki banujesz Każdego o nie polsko brzmiącym nazwisku, banujesz Najgorsze kółko wzajemnej adoracji jakie widział świat Jest was coraz więcej Ludzie się przekonują, nie tylko patusy Mówisz: Macie czas, róbcie dzieci i o nic się nie martwcie PiS hurrdurzy, ale to nic przy hurrdurzeniu reszty Zaczynają Cię zapraszać do mediów Na początek lokalna gazeta, lokalne radio, lokalne TV Przychodzi czas na media krajowe Na każde pytanie odpowiadasz bardzo zwięźle i ogólnie Od razu przełączasz się na 1000 złotych na dziecko Ludzie mają o to ogromny ból dupy No, oprócz coraz większej rzeszy Twoich wyborców Nadchodzą wybory Organizujesz w każdej mieścinie: "Marsz 1000 złotych na dziecko" Nie tylko MOPSy, teraz wszystko oblepiasz tymi plakatami Rozkazujesz armii Grażyn wieszać to na balkonach One to robią, bo w końcu hehe, 1000 złotych Masz pierwszą całkowicie oddolną kampanię wyborczą Idziesz na debatę Krzyczysz o złodziejach, półśrodkach Krzyczysz o 1000 złotych na dziecko Wyciągasz sobie zza pleców ogromną flagę Zasłaniasz wszystko Śpiewasz hymn i nią machasz, zagłuszasz rozmówców Wyprowadzają Cię z TV, na odchodne krzyczysz, by ludzie nie dali się zmanipulować propagandzie! Po wyborach Wygrałeś, nawet bardziej niż PiS poprzednio Udało Ci się do Sejmu wprowadzić prawie trzystu posłów W Senacie jeszcze lepiej Mówisz, że przemówisz do Narodu Wybierasz największy plac Zjeżdżają się ludzie z całej Polski Kochają Cię Wielbią Noszą Twoje zdjęcia, jak obrazy świętych na Boże Ciało To jest ten moment Wchodzisz na mównicę Wznosisz ręce jak papież Tłum wiwatuje Bierzesz mikrofon JEBAĆ ROSZCZENIOWĄ HOŁOTĘ! Tłum wiwatuje, bo jeszcze nie załapał o co chodzi JEBAĆ BIEDĘ Wciąż wiwatują, ale myślą, że mówisz o czymś innym niż jest naprawdę SPIERDALAJCIE Cisza Martwa cisza Jest tak skondensowana i martwa, jak dżem z martwych płodów A ty... Wtykasz w ten dżem nachosa I opierdalasz go na ich oczach ZAPIERDALAJCIE DO ROBOTY, OD PAŃSTWA NIE DOSTANIECIE NIC JESTEŚCIE JEBANYMI ZŁODZIEJAMI SOCJAL JEST NIEMORALNY PODATKI TO KRADZIEŻ ZA RUCHANIE NAJWYŻEJ AIDS DOSTANIECIE, NIE PIENIĄDZE ANTYNATALIZM KURWY A TAK W OGÓLE, TO WAMI GARDZĘ ELO Cisza trwa jeszcze trzy sekundy, wykorzystujesz je by sprężystym krokiem opuścić scenę i wejść do wozu opancerzonego Siedzi w nim Rothbard i Mises Dobra robota ziomuś, chwalą Cię Thx Skręcacie sobie blanta, a gdy minęła trzecia sekunda BUM! Bomba atomowa to nic, przy sile pękających w jednej chwili milionów odbytów Zaczyna się wielka bitwa na ulicach Z rozstawionych wszędzie głośników puszczasz "Ostatnia Niedziela" Halo, wojsko? Mamy zamieszki w centrum Warszawy... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/eb8b22e1-522a-b6c1-b104-b002db6ae0ba%40gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] I2P and/or I2PBerry as an netowrking qube
Folks, did anyone of you tried I2P as a gateway instead of sys-net qube to route all traffic from certain AppVMs? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7c09d87e-9b20-41e7-85b8-b2d767b52399%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Thinkpad T460
On Saturday, December 3, 2016 at 8:41:49 PM UTC+1, Bernd Lorenzen wrote: > Hello, > > my Question is how i set the charge thresholds for my Lenovo Thinkpad T460. > > I have installed the following packages tlp, tlp-rdw,tp-smapi-dkms and > acpi-call-dkms in both fedora aind debian template. Afterwards i changed > the thresholds in the config file /etc/default/tlp in both templates and > in dom0. But it doesn`t work. Do you know a workaround for this. I hope > did not forget some useful information for you. > > Kind regards > > > Bernd Lorenzen Has the service been started? # systemctl status tlp -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/66729a6a-2e8f-4ceb-be9a-9ba56cde5bda%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HDMI not working on my Dell Inspiron 17 7999
Hello guys, I just install Qubes on my Dell Inspiron 17 7999 and it's working greatexcept for te hdmi port. My second screen in hdmi is not working at all. Any ideas why? Thanks. 😊 Sent from Samsung tablet -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fd3vs8imygn3qjajin6dxse9.1480796322284%40email.android.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Yubikeys in Qubes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Dec 03, 2016 at 11:24:28AM -0800, Micah Lee wrote: > On 12/02/2016 06:50 PM, Leeteqxv wrote: > > Is it not possible to configure this to having the Yubikey require the > > person to press the key button manually/physically? > > If not, such a limitation would lie in the software rather than in the > > Yubikey, I assume, since the Yubikey support Challenge-Response and such > > already? If possible, it is definetely preferable to work around > > potential PIN theft and subsequent hidden (mis)use by requiring a > > manual/physical action. > > The problem here is that products that can be used as OpenPGP smart > cards, like the Yubikey, can't just make arbitrary features like > challenge-response for secret key operations. They need to implement the > OpenPGP specification so that all software that works with them (GnuPG, > OpenKeychain, others) can implement the same spec, and everything can just. > > The spec currently supports requiring a PIN to do secret key operations, > with rate limiting that makes too many invalid PIN guesses locks the > card. In order to support challenge-response as well I think the OpenPGP > smart card spec would need to get updated, which is a much longer > process that just writing some new software. Some kind of OTP probably could be framed into PIN. Anyway, this does not solve much bigger problem, that is no protection of the data itself - - USB VM can intercept the communication and replace/capture what you want to sign/decrypt. If there is some protocol to use smartcard over the network, such protocol probably handle this problem. Not sure if it's possible to use it here, especially when limited to what Yubikey firmware supports... - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYQyEoAAoJENuP0xzK19csNroH/1QEeJN2MwHbBTo+g3JlNsNZ MXs22kmz41evg7lKwwoAuA8/XihRppv0EBPUyEMMi1JmlGgd4Phlafok3rFmILnd cRG3NsV6Wv69/9aSbxfId6NEEjO5toKdt4DLhR5nVwVamFOCqgVGLxchGzRMMN8E JrhJ1mxn3w12AufFvtMF7jKXNIiY3REf6kVBjqUcsJmwnW1Tt4WJ+KS8IShCEaJm i7IfWggxlzKgo4rMXdK22m7G9uvncG6TAMZuonHu92pzuLDoU40iPdpEUmQJyKtF pibJExdgXHkJicl3j5kwHV0JOyNzgCQkId4fhsVxvexYeuvh9nRaUKwZN+wiAsw= =Nu+O -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161203194648.GZ2130%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Thinkpad T460
Hello, my Question is how i set the charge thresholds for my Lenovo Thinkpad T460. I have installed the following packages tlp, tlp-rdw,tp-smapi-dkms and acpi-call-dkms in both fedora aind debian template. Afterwards i changed the thresholds in the config file /etc/default/tlp in both templates and in dom0. But it doesn`t work. Do you know a workaround for this. I hope did not forget some useful information for you. Kind regards Bernd Lorenzen -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/95b8c5f8-8b7c-c02b-3bf5-9179f3b14dee%40gmx.de. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Yubikeys in Qubes
On 12/02/2016 06:50 PM, Leeteqxv wrote: > Is it not possible to configure this to having the Yubikey require the > person to press the key button manually/physically? > If not, such a limitation would lie in the software rather than in the > Yubikey, I assume, since the Yubikey support Challenge-Response and such > already? If possible, it is definetely preferable to work around > potential PIN theft and subsequent hidden (mis)use by requiring a > manual/physical action. The problem here is that products that can be used as OpenPGP smart cards, like the Yubikey, can't just make arbitrary features like challenge-response for secret key operations. They need to implement the OpenPGP specification so that all software that works with them (GnuPG, OpenKeychain, others) can implement the same spec, and everything can just. The spec currently supports requiring a PIN to do secret key operations, with rate limiting that makes too many invalid PIN guesses locks the card. In order to support challenge-response as well I think the OpenPGP smart card spec would need to get updated, which is a much longer process that just writing some new software. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7b55411b-5d84-6919-3e6e-1be2b8e429a7%40micahflee.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
Am Samstag, 3. Dezember 2016 16:32:37 UTC+1 schrieb Grzesiek Chodzicki: > W dniu sobota, 3 grudnia 2016 16:13:41 UTC+1 użytkownik Benjamin Richter > napisał: > > Here I attached the PCI devices of the docking station to sys-net an > > rebooted for good measure. > > As you can see, the bridges show up, but the usb controller and the usb > > devices do not, I have not Idea why. > > > > [user@sys-net ~]$ sudo lspci > > 00:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > > Ridge 2C 2015] > > 00:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > > Ridge 2C 2015] > > 00:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > > Ridge 2C 2015] > > 00:03.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > > Ridge 2C 2015] > > 00:05.0 Network controller: Intel Corporation Wireless 7265 (rev 59) > > [user@sys-net ~]$ sudo lsusb > > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > Qubes disables hotplugging Thunderbolt/Firewire/Express Card devices for > security reasons ergo this is not a bug it's a feature. Dunno how to disable > that. OK. But this should not prevent the device from being attached to a VM, I think. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/29f4057c-9b09-46bd-ba56-4df48bffdc61%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Rethinking my security requirements
Currently, I'm booting my system using an anti-evil maid USB stick, but frankly, this is becoming an annoyance. My security needs aren't that great, and my risk for such an attack is quite low. I'm considering getting rid of AEM, and either booting off a USB stick, or just putting the entire system on my hard drive (which would make the Xen updates much easier). To that end, I wanted to get an idea from the group how you're managing your system. Specifically: 1. Are you using a laptop or desktop? 2. How much at risk is your system/data? How would you rate your threat model? 3. Do you keep /boot on the hard drive, or do you boot from a USB or other external device? 4. Do you use anti-evil maid? Thanks for helping me with this informal poll! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a223276d-562b-c6f2-e430-4d6f7b17df2b%40nowlas.org. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Cannot start qubes-guid
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Dec 03, 2016 at 05:22:05PM -, ferd...@sigaint.org wrote: > Hi > Each time that I create a new appVM based on whonix-ws, the appVM shows a > message "Error starting VM: Cannot start qubes-guid!", after 30 seconds > the message leaves and all works normally. This doesn't appear with new > appVM based on fedora or debian. > Is it anything that can be considered normal? Do applications in such Whonix AppVMs work anyway? How do you start the VM - from the menu, or "start" button from Qubes Manager? Is it fresh install, or upgraded from previous Qubes release? Also, take a look at guid log - it's in /var/log/qubes/guid.VMNAME.log (replace VMNAME with actual VM name) - also accessible from Qubes Manager - right click on the VM). - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYQxXwAAoJENuP0xzK19csdf4H/Aw5RrEHoiKQdqRbIhvCdj0x ZI180Lwt3OS31EjzNAePrjuhAEmF3cSaoPxgLK+5FnZ+ah2mN6M+YPolN2Q70JYl Kvp8oplQWdN9FQqe4n0oC/BL5gUFoJJjZ/U8LpD9eAfUrq1urODLj/xWW8tZilg4 G8sG2dU7QpprAWHAbXil4kpsYVrSgyfXjdVLbts7wafBCIgMtnfAPQhzeKm36yZ7 fSjoLP9ICGjXBaR0QfU8eTLlltAKcx2ewQgszbk46bIgy8vnoeKtFiAbUyc8YwN2 nbuS0jCR2rII3tbEY2y8rybenka11gmG0DhmDnrNWdUbFo2NGxoDmxAeONl12Uw= =jb4m -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161203185856.GE1145%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] console window manager
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Dec 03, 2016 at 02:58:48AM +0300, Eva Star wrote: > On 12/03/2016 02:50 AM, Marek Marczykowski-Górecki wrote: > > > > > > > And additional question, how to get the new created window ID from > > > > > > qvm-run ? > > > > > > > > > > > > > > > > > For KDE, there's kstart. For Xfce4, you'd have to install something, > > > > > e.g., devilspie2. > > > > > > > > > I believe that some other tool available that work with Xfce4. And it's > > > > already available at dom0. When this user wrote about it then I check > > > > and it was there (at dom0 already installeted) > > > > > > > > > > Oh, really? I would be interested in using that, as well. Please let me > > > know if you find it. :) > > > > Is that about wmctl or xdotool? > > Yes, wmctrl :) thanks :) > It can show all windows `wmctrl 0l`, but how to get id of last window opened > with qvm-run to move it then to the specific desktop? I don't know. Some idea is to run wmctrl before starting an application and after. Then compare results. > Looks like very old tool, but hope it work. xdotool not pre-installed (maybe > it's better?) xdotool is different - it's more about interacting with windows (mouse, keyboard etc) than managing windows itself - but can do that too. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYQxUSAAoJENuP0xzK19cs8m0H/06X8u2iFYgPHk2MUqG1u5+I gH+dl46mQ8iyMHpN5hcv5BJ7Vqhv9I8ocskba93ZU300F7sVghkf950VINNWn+tv iZQqG13bLnl7KOVGeuConZydfpucb5ES5T0oOzDbhcpqqtP86nNvScnzu6CtVz9Y lrxmz1EsVF8qz9l5OwofH3cgGcKPm45SVR50Oj6CdbZdWi/TaTXfOuUada701CBC lwpDKFK33MxTuQVgMBFSq/li/gDXOIQ0KcziaqfiqQsqQ6ckn+d+iSbMkCJNSlBF J2Trqzjx0IYg5MGAkGUoIcdp9UBenWYavWIjunUnksVv5SNrVPko+2+5qa2bv58= =8EN4 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161203185514.GD1145%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem
Am Samstag, 3. Dezember 2016 18:11:33 UTC+1 schrieb Grzesiek Chodzicki: > W dniu sobota, 3 grudnia 2016 17:47:25 UTC+1 użytkownik > game...@googlemail.com napisał: > > Am Samstag, 3. Dezember 2016 16:30:40 UTC+1 schrieb Grzesiek Chodzicki: > > > W dniu sobota, 3 grudnia 2016 15:35:21 UTC+1 użytkownik > > > game...@googlemail.com napisał: > > > > Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki: > > > > > W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik > > > > > game...@googlemail.com napisał: > > > > > > Hi, > > > > > > for comfortable use of USB-only scanners and other devices such as > > > > > > this, it would be nice to have Win7 as USB-VM, e.g. have the > > > > > > USB-Controller-PCI-Device assigned to it to use USB-Devices from > > > > > > there. > > > > > > > > > > > > When i try to start Win7, this happens (see the picture > > > > > > https://imgur.com/a/spnRC). > > > > > > [The german sentence in the picure is like: > > > > > > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be > > > > > > reseted. No FLR, PM or Bus Reset available."] > > > > > > I already have the PCI-Device assigned to it, original Qubes-USB-VM > > > > > > dont have it assigned anymore. > > > > > > the "strict pcireset"-qvm-prefs option is already turned on. Any > > > > > > suggestions to fix this? > > > > > > Thank you. > > > > > > > > > > set pci_strictreset to false and try again. > > > > > > > > Wow...yeah, thank you. That was a pointless fail by me. > > > > > > > > Anyway: Now, i have the problem that connected usb-devices dont show in > > > > windows7. At first boot after pci-passthough-change, win7 showed that > > > > it couldnt find any driver for the "new" usb-controller. I tried to fix > > > > it with Xen PV Bus-Driver, but it didnt work. > > > > > > Check if You have VT-d enabled in BIOS/UEFI > > > > Yes, it is. > > But i installed Qubes with vt-d disabled und reenabled it like it is > > mentioned here: https://www.qubes-os.org/doc/thinkpad-troubleshooting/ > > Can you paste the output of xl dmesg | grep -i vt-d ? xl dmesg: Xen 4.6.3-24.fc23 (XEN) Xen version 4.6.3 (user@) (gcc (GCC) 5.3.1 20160406 (Red Hat 5.3.1-6)) debug=n Wed Nov 23 00:15:57 UTC 2016 (XEN) Latest ChangeSet: (XEN) Bootloader: GRUB 2.02~beta2 (XEN) Command line: placeholder console=none dom0_mem=min:1024M dom0_mem=max:4096M iommu=no-igfx (XEN) Video information: (XEN) VGA is text mode 80x25, font 8x16 (XEN) VBE/DDC methods: V2; EDID transfer time: 1 seconds (XEN) Disc information: (XEN) Found 1 MBR signatures (XEN) Found 1 EDD information structures (XEN) Xen-e820 RAM map: (XEN) - 0009d000 (usable) (XEN) 0009d000 - 000a (reserved) (XEN) 000e - 0010 (reserved) (XEN) 0010 - 99bb9000 (usable) (XEN) 99bb9000 - aca89000 (reserved) (XEN) aca89000 - aca8a000 (ACPI NVS) (XEN) aca8a000 - b7f7f000 (reserved) (XEN) b7f7f000 - b7fcf000 (ACPI NVS) (XEN) b7fcf000 - b7fff000 (ACPI data) (XEN) b7fff000 - b810 (reserved) (XEN) b860 - bc80 (reserved) (XEN) f800 - fc00 (reserved) (XEN) fd00 - fe80 (reserved) (XEN) fec0 - fec01000 (reserved) (XEN) fed0 - fed01000 (reserved) (XEN) fed1 - fed1a000 (reserved) (XEN) fed84000 - fed85000 (reserved) (XEN) fee0 - fee01000 (reserved) (XEN) ff80 - 0001 (reserved) (XEN) 0001 - 00024280 (usable) (XEN) ACPI: RSDP 000F0120, 0024 (r2 LENOVO) (XEN) ACPI: XSDT B7FD0188, 00D4 (r1 LENOVO TP-N1C 0 PTEC2) (XEN) ACPI: FACP B7FF4000, 00F4 (r5 LENOVO TP-N1C 1150 PTEC2) (XEN) ACPI: DSDT B7FDD000, 12331 (r2 LENOVO TP-N1C 1150 INTL 20141107) (XEN) ACPI: FACS B7FAA000, 0040 (XEN) ACPI: TCPA B7FFC000, 0032 (r2 LENOVO TP-N1C 2 PTEC2) (XEN) ACPI: SSDT B7FFB000, 03A2 (r2 LENOVO TcgTable 1000 INTL 20141107) (XEN) ACPI: UEFI B7FC1000, 0042 (r1 LENOVO TP-N1C 1150 PTEC2) (XEN) ACPI: SSDT B7FF6000, 4E0A (r2 LENOVO SaSsdt 3000 INTL 20141107) (XEN) ACPI: SSDT B7FF5000, 05C5 (r2 LENOVO PerfTune 1000 INTL 20141107) (XEN) ACPI: ECDT B7FF3000, 0052 (r1 LENOVO TP-N1C 1150 PTEC2) (XEN) ACPI: HPET B7FF2000, 0038 (r1 LENOVO TP-N1C 1150 PTEC2) (XEN) ACPI: APIC B7FF1000, 00BC (r3 LENOVO TP-N1C 1150 PTEC2) (XEN) ACPI: MCFG B7FF, 003C (r1 LENOVO TP-N1C 1150 PTEC2) (XEN) ACPI: SSDT B7FDB000, 18D2 (r1 LENOVO SataAhci 1000 INTL 20141107) (XEN) ACPI: DBGP B7FDA000, 0034 (r1 LENOVO TP-N1C 1150 PTEC2) (XEN) ACPI: DBG2 B7FD9000, 0054 (r0 LENOVO TP-N1C 1150 PTEC2) (XEN) ACPI: BOOT B7FD8000, 0028 (r1 LENOVO TP-N1C 115
[qubes-users] Cannot start qubes-guid
Hi Each time that I create a new appVM based on whonix-ws, the appVM shows a message "Error starting VM: Cannot start qubes-guid!", after 30 seconds the message leaves and all works normally. This doesn't appear with new appVM based on fedora or debian. Is it anything that can be considered normal? Thank you -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fe39cce66d08fe93ecb8be0afe338f4e.webmail%40localhost. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem
W dniu sobota, 3 grudnia 2016 17:47:25 UTC+1 użytkownik game...@googlemail.com napisał: > Am Samstag, 3. Dezember 2016 16:30:40 UTC+1 schrieb Grzesiek Chodzicki: > > W dniu sobota, 3 grudnia 2016 15:35:21 UTC+1 użytkownik > > game...@googlemail.com napisał: > > > Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki: > > > > W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik > > > > game...@googlemail.com napisał: > > > > > Hi, > > > > > for comfortable use of USB-only scanners and other devices such as > > > > > this, it would be nice to have Win7 as USB-VM, e.g. have the > > > > > USB-Controller-PCI-Device assigned to it to use USB-Devices from > > > > > there. > > > > > > > > > > When i try to start Win7, this happens (see the picture > > > > > https://imgur.com/a/spnRC). > > > > > [The german sentence in the picure is like: > > > > > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be > > > > > reseted. No FLR, PM or Bus Reset available."] > > > > > I already have the PCI-Device assigned to it, original Qubes-USB-VM > > > > > dont have it assigned anymore. > > > > > the "strict pcireset"-qvm-prefs option is already turned on. Any > > > > > suggestions to fix this? > > > > > Thank you. > > > > > > > > set pci_strictreset to false and try again. > > > > > > Wow...yeah, thank you. That was a pointless fail by me. > > > > > > Anyway: Now, i have the problem that connected usb-devices dont show in > > > windows7. At first boot after pci-passthough-change, win7 showed that it > > > couldnt find any driver for the "new" usb-controller. I tried to fix it > > > with Xen PV Bus-Driver, but it didnt work. > > > > Check if You have VT-d enabled in BIOS/UEFI > > Yes, it is. > But i installed Qubes with vt-d disabled und reenabled it like it is > mentioned here: https://www.qubes-os.org/doc/thinkpad-troubleshooting/ Can you paste the output of xl dmesg | grep -i vt-d ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fe9d4843-1c39-4d4f-899b-66a2e96e1a51%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem
Am Samstag, 3. Dezember 2016 16:30:40 UTC+1 schrieb Grzesiek Chodzicki: > W dniu sobota, 3 grudnia 2016 15:35:21 UTC+1 użytkownik > game...@googlemail.com napisał: > > Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki: > > > W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik > > > game...@googlemail.com napisał: > > > > Hi, > > > > for comfortable use of USB-only scanners and other devices such as > > > > this, it would be nice to have Win7 as USB-VM, e.g. have the > > > > USB-Controller-PCI-Device assigned to it to use USB-Devices from there. > > > > > > > > When i try to start Win7, this happens (see the picture > > > > https://imgur.com/a/spnRC). > > > > [The german sentence in the picure is like: > > > > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. > > > > No FLR, PM or Bus Reset available."] > > > > I already have the PCI-Device assigned to it, original Qubes-USB-VM > > > > dont have it assigned anymore. > > > > the "strict pcireset"-qvm-prefs option is already turned on. Any > > > > suggestions to fix this? > > > > Thank you. > > > > > > set pci_strictreset to false and try again. > > > > Wow...yeah, thank you. That was a pointless fail by me. > > > > Anyway: Now, i have the problem that connected usb-devices dont show in > > windows7. At first boot after pci-passthough-change, win7 showed that it > > couldnt find any driver for the "new" usb-controller. I tried to fix it > > with Xen PV Bus-Driver, but it didnt work. > > Check if You have VT-d enabled in BIOS/UEFI Yes, it is. But i installed Qubes with vt-d disabled und reenabled it like it is mentioned here: https://www.qubes-os.org/doc/thinkpad-troubleshooting/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3e216db3-81de-414a-95df-b3c84d41b3c1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: First impressions
On Saturday, December 3, 2016 at 8:07:58 AM UTC-5, Ray Brainer wrote: > This is my first week of usage and impressions about the Qubes. > The idea of isolation seemed wonderful before using it. > Now I find very unhandy what I deal with in Qubes. > > 1) No way of desktop sharing, though I need it very much. I read some ideas > on the point here > https://groups.google.com/forum/#!msg/qubes-users/-JEfgOF-TaI/kIU_JCmUCAAJ > It sounds almost impossible. I use Zoom and Viber to share screen. Have no > idea of screen forwarding to a VM. > > 2) Cross-clipboard operations don't work by any means. Cross-usage of > applications, user-generated shortcuts to apps - everything seems a problem. > 3) Appear empty windows I've never seen before in usual apps like Skype, > qbittorrent, VLC etc. > 4) No free space for software and libraries. There is a huge risk of loosing > data when resizing images. I lost it twice, though I repeated every step from > the guide. > 5) Templates are based on pretty specific distros like Fedora and Debian. It > takes time for Arch and Windows templates to create. > 6) It is not very easy to direct webcam on a particular VM. > > Again, the idea is excellent. If there is a way to save my time on points 1-3 > I would be thankful. I don't know anything about screen sharing. But what do you mean cross clipboard operations don't work? cross usage applications sounds like defeats purpose of isolation but I might be misunderstanding you. I've never seen empty windows appearing in vlc. weird. In KDE it was much easier to make shortcuts to launch specific apps right in the menu. XFCE unfortunately does not make this easy anymore. You actually have to edit a cfg file to do it, but its possible. I never lost any data increasing a vm size. I do have a win7 vm, and it was indeed little tricky to install. Took me two tries to get windows tools working.but Linux is linux to me though. I use debian as well as fedora simply for packages available in debian not in fedora. But those two distros pretty much have everything covered for me in linux world and imo and are the two best regarding general security. Arch was always my distro of choice for traditional vms cause its very minimal by default, but I have no need for it in qubes. Yes you can only direct webcam to appvm with terminal command for now. I'm sure they will include a way in qubes-manager eventually. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d301fb8e-0d30-4883-8c70-9505e28c8d17%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Trouble reading data CD under Qubes
On Saturday, December 3, 2016 at 7:33:29 AM UTC-5, Pawel Debski wrote: > W dniu sobota, 3 grudnia 2016 12:53:02 UTC+1 użytkownik Grzesiek Chodzicki > napisał: > > W dniu sobota, 3 grudnia 2016 12:21:49 UTC+1 użytkownik Pawel Debski > > napisał: > > > Folks, > > > > > > I have a PC with two SATA controllers: primary master holds my SDD with > > > Qubes, while secondary master has CD drive attached. > > > > > > When I insert a data CD it gets mounted by dom0 and the files are > > > accessible. I do not want to open these files in dom0 however. So in the > > > VM Manager I right click my favourite perssonal-full-sw appVM that I > > > created previously and select: > > > > > > Attach/detach block devices -> Attach dom0:sr0 > > > > > > and nothing happens. > > > > > > Even more: CD content is still visible in dom0 and /dev/sr0 is still > > > mounted in /run/media/pdebski/CDTITLE > > > > > > How can I better diagnose the problem? > > > > Try using qvm-block -l and then attach the device using qvm-block. If that > > fails, you can attach the entire sata controller (and not just the drive) > > Here is the progress: > > (in dom0) > qvm-block -l > dom0:sr0 ... attached to fedora-full-sw as xvdi > > now in fedora-full-sw Konsole I need > > [user@fedora-usb ~]$ su - root > [root@fedora-usb ~]# mkdir CD > [root@fedora-usb ~]# mount /dev/xvdi CD > [root@fedora-usb ~]# df > Filesystem 1K-blocksUsed Available Use% Mounted on > ... > /dev/xvdi 80388038 0 100% /root/CD > > and voilà, I can read the files. > > HOWEVER: can you imagine a normal user doing this? > (I can't, she/he would kill me with his laughter ;-) > > How can I make Fedora read the CD and mount it automagically so all is > visible in AppVM File Manager just after inserting CD? cdroms are pretty outdated now. I don't even have one on my latest box. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6f0beec4-280c-4475-9fef-73ff4cba1028%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: anyone luck mounting an iphone 7?
well i can get it working everytime on baremetal ubuntu now. What I do is set lock to 5 mins. idevicepair pair,then leave device connected and log out and in. then dcim folder then appears in file manager. works everytime. Now to figure out how I reproduced this in qubes debian lol. Unfortunately until they update libimobiledevice you can only back up camera pictures + videos, and texted pics. Can't back up music or downloads. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4ab2712d-8a24-44dd-bd0e-866566e5409a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
W dniu sobota, 3 grudnia 2016 16:13:41 UTC+1 użytkownik Benjamin Richter napisał: > Here I attached the PCI devices of the docking station to sys-net an rebooted > for good measure. > As you can see, the bridges show up, but the usb controller and the usb > devices do not, I have not Idea why. > > [user@sys-net ~]$ sudo lspci > 00:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > Ridge 2C 2015] > 00:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > Ridge 2C 2015] > 00:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > Ridge 2C 2015] > 00:03.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine > Ridge 2C 2015] > 00:05.0 Network controller: Intel Corporation Wireless 7265 (rev 59) > [user@sys-net ~]$ sudo lsusb > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Qubes disables hotplugging Thunderbolt/Firewire/Express Card devices for security reasons ergo this is not a bug it's a feature. Dunno how to disable that. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/80ff8ba5-e51b-4e8c-8154-d0c1791ad4d8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem
W dniu sobota, 3 grudnia 2016 15:35:21 UTC+1 użytkownik game...@googlemail.com napisał: > Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki: > > W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik > > game...@googlemail.com napisał: > > > Hi, > > > for comfortable use of USB-only scanners and other devices such as this, > > > it would be nice to have Win7 as USB-VM, e.g. have the > > > USB-Controller-PCI-Device assigned to it to use USB-Devices from there. > > > > > > When i try to start Win7, this happens (see the picture > > > https://imgur.com/a/spnRC). > > > [The german sentence in the picure is like: > > > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No > > > FLR, PM or Bus Reset available."] > > > I already have the PCI-Device assigned to it, original Qubes-USB-VM dont > > > have it assigned anymore. > > > the "strict pcireset"-qvm-prefs option is already turned on. Any > > > suggestions to fix this? > > > Thank you. > > > > set pci_strictreset to false and try again. > > Wow...yeah, thank you. That was a pointless fail by me. > > Anyway: Now, i have the problem that connected usb-devices dont show in > windows7. At first boot after pci-passthough-change, win7 showed that it > couldnt find any driver for the "new" usb-controller. I tried to fix it with > Xen PV Bus-Driver, but it didnt work. Check if You have VT-d enabled in BIOS/UEFI -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0fb27c79-895f-4f80-ac1f-299b554aa43d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] qga.exe 100% CPU load (Windows Tools)
Hi, Occasionally, the Qubes GUI Agent (qga.exe) process turns into a CPU-hog for no apparent reason. The process just turns into a flatliner, eating up one complete core, which turns the Windows 7 machine into a very slow beast. Nothing is crashing tho. Power-off/power-on the HVM seems to fix it. AFAIK, I’m using the latest version of the Windows Integration Tools on Qubes R3.2. Where should I start looking for problems? Any log-files that are recommended to look at? Greetz, Marc. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/A72E9C8F-404F-4F9E-9C36-B1B3291D8C53%40gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
Here I attached the PCI devices of the docking station to sys-net an rebooted for good measure. As you can see, the bridges show up, but the usb controller and the usb devices do not, I have not Idea why. [user@sys-net ~]$ sudo lspci 00:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine Ridge 2C 2015] 00:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine Ridge 2C 2015] 00:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine Ridge 2C 2015] 00:03.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine Ridge 2C 2015] 00:05.0 Network controller: Intel Corporation Wireless 7265 (rev 59) [user@sys-net ~]$ sudo lsusb Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3cba92f5-4bb5-483e-b605-a64f11df5639%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
Here a log of the docking station attached to dom0. This only works, if the station is attached on boot, hotplugging does not seem to work. If I attach the station to the running system, the PCI devices show up, but the USB devices don't. sudo lspci 00:00.0 Host bridge: Intel Corporation Skylake Host Bridge/DRAM Registers (rev 08) 00:02.0 VGA compatible controller: Intel Corporation HD Graphics 520 (rev 07) 00:04.0 Signal processing controller: Intel Corporation Skylake Processor Thermal Subsystem (rev 08) 00:05.0 Multimedia controller: Intel Corporation Skylake Imaging Unit (rev 01) 00:13.0 Non-VGA unclassified device: Intel Corporation Device 9d35 (rev 21) 00:14.0 USB controller: Intel Corporation Sunrise Point-LP USB 3.0 xHCI Controller (rev 21) 00:14.2 Signal processing controller: Intel Corporation Sunrise Point-LP Thermal subsystem (rev 21) 00:14.3 Multimedia controller: Intel Corporation Device 9d32 (rev 01) 00:15.0 Signal processing controller: Intel Corporation Sunrise Point-LP Serial IO I2C Controller #0 (rev 21) 00:15.1 Signal processing controller: Intel Corporation Sunrise Point-LP Serial IO I2C Controller #1 (rev 21) 00:15.2 Signal processing controller: Intel Corporation Sunrise Point-LP Serial IO I2C Controller #2 (rev 21) 00:16.0 Communication controller: Intel Corporation Sunrise Point-LP CSME HECI #1 (rev 21) 00:17.0 SATA controller: Intel Corporation Sunrise Point-LP SATA Controller [AHCI mode] (rev 21) 00:1c.0 PCI bridge: Intel Corporation Device 9d10 (rev f1) 00:1d.0 PCI bridge: Intel Corporation Device 9d1a (rev f1) 00:1f.0 ISA bridge: Intel Corporation Sunrise Point-LP LPC Controller (rev 21) 00:1f.2 Memory controller: Intel Corporation Sunrise Point-LP PMC (rev 21) 00:1f.3 Audio device: Intel Corporation Sunrise Point-LP HD Audio (rev 21) 00:1f.4 SMBus: Intel Corporation Sunrise Point-LP SMBus (rev 21) 01:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine Ridge 2C 2015] 02:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine Ridge 2C 2015] 02:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine Ridge 2C 2015] 02:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine Ridge 2C 2015] 05:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller [Alpine Ridge] 3a:00.0 Network controller: Intel Corporation Wireless 7265 (rev 59) sudo lsusb Bus 004 Device 005: ID 0bda:8153 Realtek Semiconductor Corp. Bus 004 Device 003: ID 05e3:0620 Genesys Logic, Inc. Bus 004 Device 002: ID 05e3:0620 Genesys Logic, Inc. Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 003 Device 004: ID 046d:c51e Logitech, Inc. Bus 003 Device 007: ID 1e4e:0898 Cubeternet Bus 003 Device 006: ID 0572:1703 Conexant Systems (Rockwell), Inc. Bus 003 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub Bus 003 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 004: ID 0b05:1838 ASUSTek Computer, Inc. Bus 001 Device 003: ID 8087:0a2a Intel Corp. Bus 001 Device 002: ID 04f2:b5b1 Chicony Electronics Co., Ltd Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7f680038-25b4-42b2-825b-18097cda56ca%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Asus Transformer 3 Pro T303UA, Thunderbolt issues
Hi, my earlier post seems to have gotten lost somewhere, so here again, in more detail. I've got an Asus Transformer 3 Pro and installed Qubes 3.2 on it. It works surprisingly well. Network, USB, display, touchscreen, keyboard and touchpad are working right away. It's troublesome the tablet has no Ethernet and only one USB controller, which means I cannot simply use a USB-Ethernet device. I haven't tried bluetooth yet. I've also got the Thunderbolt docking station, which contains a HDMI and VGA port, Ethernet, two USB 3 and one USB-C Ports, a SD card reader and audio ports It also charges the tablet while leaving a USB-C port available. Unfortunately, I have not been able to use the docks USB controller inside a VM. I can attach the controller, but the devices (like the integrated ethernet or external USB devices) never show up in the VM. I'll post some logs showing this later. So far the short report on the Transformer 3. Kind regards, Benjamin -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/de9707da-fc6a-49e7-8449-4d0616365185%40googlegroups.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-ASUSTeK_COMPUTER_INC_-T303UA-20161203-131517.yml Description: Binary data Qubes-HCL-ASUSTeK_COMPUTER_INC_-T303UA-20161203-131517.cpio.gz Description: Binary data
[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem
Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki: > W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik > game...@googlemail.com napisał: > > Hi, > > for comfortable use of USB-only scanners and other devices such as this, it > > would be nice to have Win7 as USB-VM, e.g. have the > > USB-Controller-PCI-Device assigned to it to use USB-Devices from there. > > > > When i try to start Win7, this happens (see the picture > > https://imgur.com/a/spnRC). > > [The german sentence in the picure is like: > > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No > > FLR, PM or Bus Reset available."] > > I already have the PCI-Device assigned to it, original Qubes-USB-VM dont > > have it assigned anymore. > > the "strict pcireset"-qvm-prefs option is already turned on. Any > > suggestions to fix this? > > Thank you. > > set pci_strictreset to false and try again. Wow...yeah, thank you. That was a pointless fail by me. Anyway: Now, i have the problem that connected usb-devices dont show in windows7. At first boot after pci-passthough-change, win7 showed that it couldnt find any driver for the "new" usb-controller. I tried to fix it with Xen PV Bus-Driver, but it didnt work. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a90690fb-2592-4a3e-8574-102f82730b4b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: [qubes-devel] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts
On Saturday, December 3, 2016 at 12:13:35 AM UTC+1, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 12/02/16 11:17, Kopimi Security wrote: > > On Thursday, December 1, 2016 at 12:56:11 AM UTC+1, Andrew David Wong wrote: > >> Unfortunately, the financial necessity of shifting our priorities to > >> commercial > >> clients will mean that we have less time to work on features that benefit > >> the > >> wider, security-minded open source community, which has been our focus for > >> the > >> past seven years. This deeply saddens us. (We all use Qubes on our > >> personal > >> computers too!) However, the reality is that ITL can't afford to sustain > >> the > >> open source development of Qubes for much longer. We're running out of > >> time. > >> > >> In an attempt to keep the open source development of Qubes going, we've > >> teamed > >> up with Open Collective [07], which makes it easier to donate to the Qubes > >> project. Now, in addition to our Bitcoin fund [08], we can also accept > >> donations via credit card. ITL will not benefit from of any of the money > >> donated > >> through Open Collective. Instead, the funds will be paid directly to > >> individual > >> developers who have been hired to work on the open source edition of Qubes. > > > > I'm excited about this, and wish to support Qubes. > > My first thoughts are "How can Qubes reach a broader community", and "Can > > the HOWTO's be made more approachable?". > > For example, the section 'assigning-devices' on the /doc/, didn't get into > > how to actually use a mouse with a sys-usb qube, before at the very end. > > And there, the way it was written gave the impression of giving the answer > > almost as an afterthought, as if it should have been obvious to everybody. > > As such, it reads as it was written by somebody "too close to the problem". > > Somebody being so familiar with the system that outsiders' inability to > > grasp the "obvious", escapes him. Or her. > > This is not a unique issue for ITL though, the same problem pops up > > everywhere when highly technical minded people try to convey something to > > people who just wants to be *users*! > > > > So that's what I'm thinking, maybe it would be good for the > > "evangelization" of Qubes to make some very simple, brief, and to-the-point > > videos and howto's? > > > > Yes, certainly. Would you be willing to help us with that? :) > Absolutely! Would it be okay if I started with some of the /doc/-articles? I've noticed that some of them could benefit from an update, as an example the one on Kali (https://www.qubes-os.org/doc/pentesting/kali/). Please let me know if this is something that I could help out with. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cc29f7a9-af14-460b-94d1-de12c1bec0eb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes and HiDPI
Op 2 dec. 2016, om 03:19 heeft Jean-Philippe Ouellet het volgende geschreven: > > On Thu, Dec 1, 2016 at 6:25 PM, pixel fairy wrote: >> On Thursday, December 1, 2016 at 2:58:21 PM UTC-5, Marc de Bruin wrote: >> >>> Is there a way to get around this? Doesn't the Qubes VM Manager “window” >>> proportionally scale itself related to the occupied pixels of the text due >>> to the font? Or am I missing something? >>> >> >> Im missing something here, why not just set your screen res in dom0 to >> 1920x1080 or whatever you find comfortable? > > FWIW this is what I have done, and I don't mind it. > I will do the same, no problem. I just couldn’t believe it didn’t rescale proportionally. It is the first thing you learn when programming GUIs I guess? ;-) Nevermind. Qubes rulezzz. With what will it be replaced in Qubes 4? Thanks, Greetz, Marc. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/39E48086-07F5-4807-8A32-E4084700E5CA%40gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Trouble reading data CD under Qubes
W dniu sobota, 3 grudnia 2016 13:33:29 UTC+1 użytkownik Pawel Debski napisał: > W dniu sobota, 3 grudnia 2016 12:53:02 UTC+1 użytkownik Grzesiek Chodzicki > napisał: > > W dniu sobota, 3 grudnia 2016 12:21:49 UTC+1 użytkownik Pawel Debski > > napisał: > > > Folks, > > > > > > I have a PC with two SATA controllers: primary master holds my SDD with > > > Qubes, while secondary master has CD drive attached. > > > > > > When I insert a data CD it gets mounted by dom0 and the files are > > > accessible. I do not want to open these files in dom0 however. So in the > > > VM Manager I right click my favourite perssonal-full-sw appVM that I > > > created previously and select: > > > > > > Attach/detach block devices -> Attach dom0:sr0 > > > > > > and nothing happens. > > > > > > Even more: CD content is still visible in dom0 and /dev/sr0 is still > > > mounted in /run/media/pdebski/CDTITLE > > > > > > How can I better diagnose the problem? > > > > Try using qvm-block -l and then attach the device using qvm-block. If that > > fails, you can attach the entire sata controller (and not just the drive) > > Here is the progress: > > (in dom0) > qvm-block -l > dom0:sr0 ... attached to fedora-full-sw as xvdi > > now in fedora-full-sw Konsole I need > > [user@fedora-usb ~]$ su - root > [root@fedora-usb ~]# mkdir CD > [root@fedora-usb ~]# mount /dev/xvdi CD > [root@fedora-usb ~]# df > Filesystem 1K-blocksUsed Available Use% Mounted on > ... > /dev/xvdi 80388038 0 100% /root/CD > > and voilà, I can read the files. > > HOWEVER: can you imagine a normal user doing this? > (I can't, she/he would kill me with his laughter ;-) > > How can I make Fedora read the CD and mount it automagically so all is > visible in AppVM File Manager just after inserting CD? The easiest (although not really obvious) way would be to attach the entire SATA controller to the VM. Works for USB, should work for SATA too. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d255e13c-317b-4ff2-a020-adc4455b4180%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL – Asus UX303LNB "Zenbook", and more
Hello everybody. Just some setup information. As a quite unexperienced, unprofessional linux user (18 months) I switched over to wonderful Qubes about a week ago. This is hard work, to be honest, but I like it. A very similar machine is already on the list: https://www.qubes-os.org/hcl/ Everything seems to work fine – no extreme-tuning yet, intense video testing, very special key combinations etc. Network printer Samsung SCX-4500 (printing via disposable VM), scanning not tested Asus wifi router RT-AC56U, Merlin, OpenVPN Second display 21,5-inch Full HD (Mini DisplayPort) Mouse and USB keyboard – I know ... (via sys-usb) Minor issue: NetworkManager doesn't remember wifi password. Certainly my fault somewhere. MAC address anonymizing (macchanger, scripts, fedora 24, following https://www.qubes-os.org/doc/anonymizing-your-mac-address/) killed networking completely. Resetting the router was painful. Project discontinued. And here are the VMs and Templates, WIP, all set up following https://www.qubes-os.org/doc/: sys-net : fed-24-mini-clone sys-firewall : fed-24-mini-clone sys-usb : fedora-24 as NetVM (will be switched over to fed-24-mini-clone) internet : fedora-24 vault : fedora-24 : no NetVM, of course personal : fedora-24 : no NetVM work : fedora-24 : no NetVM mail (with Split GPG): fedora-24 : just contacts mail provider banking : fedora-24 : just contacts bank fedora-24-disposable-dvm : fedora-24-disposable offline-bitcoin : debian-8-backports watching-bitcoin : debian-8-backports Send all your Bitcoins. Now!;) https://www.qubes-os.org/donate/ Best, rob -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/o1uf38%24gu5%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-ASUSTeK_COMPUTER_INC_-UX303LNB-20161203-021814.yml Description: application/yaml
[qubes-users] First impressions
This is my first week of usage and impressions about the Qubes. The idea of isolation seemed wonderful before using it. Now I find very unhandy what I deal with in Qubes. 1) No way of desktop sharing, though I need it very much. I read some ideas on the point here https://groups.google.com/forum/#!msg/qubes-users/-JEfgOF-TaI/kIU_JCmUCAAJ It sounds almost impossible. I use Zoom and Viber to share screen. Have no idea of screen forwarding to a VM. 2) Cross-clipboard operations don't work by any means. Cross-usage of applications, user-generated shortcuts to apps - everything seems a problem. 3) Appear empty windows I've never seen before in usual apps like Skype, qbittorrent, VLC etc. 4) No free space for software and libraries. There is a huge risk of loosing data when resizing images. I lost it twice, though I repeated every step from the guide. 5) Templates are based on pretty specific distros like Fedora and Debian. It takes time for Arch and Windows templates to create. 6) It is not very easy to direct webcam on a particular VM. Again, the idea is excellent. If there is a way to save my time on points 1-3 I would be thankful. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/96990085-a0c8-4175-aaa6-d63072503410%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts
This is a wonderful idea, there are about 20k Qubes users out there, if we al give you guys an equivalent of Windows license price you should be set for a millenium. I'd also love to see some Qubes merchandise available to buy so I can up my swag game while simultaneously contributing funds. Also, you forgot to post this to qubes-announce Andrew. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8c8ea3ed-320c-4f11-a012-ffb537c6c8e0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts
W dniu czwartek, 1 grudnia 2016 00:56:11 UTC+1 użytkownik Andrew David Wong napisał: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Dear Qubes Community, > > Since the initial launch [01] of Qubes OS back in April 2010, work on Qubes > has been funded in several different ways. Originally a pet project, it was > first supported by Invisible Things Lab [02] (ITL) out of the money we earned > on various R&D and consulting contracts. Later, we decided that we should try > to > commercialize it. Our idea, back then, was to commercialize Windows AppVM > support. Unlike the rest of Qubes OS, which is licensed under GPLv2, we > thought > we would offer Windows AppVM support under a proprietary license. Even though > we > made a lot of progress on both the business and technical sides of this > endeavor, it ultimately failed. > > Luckily, we got a helping hand from the Open Technology Fund [03] (OTF), which > has supported [04] the project for the past two years. While not a large > sum of money in itself, it did help us a lot, especially with all the work > necessary to improve Qubes' user interface, documentation, and outreach to new > communities. Indeed, the (estimated) Qubes user base has grown [05] > significantly over that period. Thank you, OTF! > > But Qubes is more than just a nice UI: it's an entirely new, complex system -- > a system that aims to change the game of endpoint security. Consequently, it > requires expertise covering a wide spectrum of topics: from understanding > low-level aspects of hardware and firmware (and how they translate to the > security of a desktop system), to UI design, documentation writing, and > community outreach. Even if we consider only the "security research" aspect of > Qubes, this area alone easily scales beyond the capabilities of a single human > being. > > In order to continue to deliver on its promise of strong desktop security, > Qubes > must retain and expand its core team, and this requires substantial funding. > At > this point, we believe the only realistic way to achieve this is through > commercialization, supplemented by community funding. > > > Commercialization > = > > We're taking a different approach to commercialization this time. Building on > the success of the recent Qubes 3.2 release, which has been praised by users > for > its stability and overall usability, we will begin offering commercial > editions > (licenses) of Qubes OS to corporate customers. We believe that the maturity of > Qubes, combined with its powerful new management stack [06], makes it ripe > for adoption by any corporation with significant security needs. > > Commercial editions of Qubes OS will be customized to meet special corporate > requirements. For example, two features that might be particularly attractive > to > corporate customers are (1) "locking down" dom0 in order to separate the user > and administrator roles and (2) integrating our local management stack with a > corporation's remote management infrastructure. These are both examples of > features that our developers are capable of implementing now, on Qubes 3.2. > > We plan to partner with one to three corporate clients in order to run a pilot > program throughout the first half of 2017. After it has been successfully > completed, we'll then widen our offer to more corporate customers and, > ultimately, to small business customers. Our main constraint is the > scalability > required to cover each additional client. Hence, we plan to focus on larger > customers first. > > Let there be no misunderstanding: Qubes OS will always remain open source. We > anticipate that the majority of our commercialization efforts will involve the > creation of custom Salt configurations, and perhaps writing a few additional > apps and integration code. In the event that any corporate features require > reworking the core Qubes code, that new code will remain open source. > > We considered many other ways of attempting to commercialize Qubes before > arriving at this model. One possibility that some of our users have inquired > about is that we sell dedicated Qubes hardware (i.e. laptops). However, there > are a number of challenges here, both in terms of making the hardware > trustworthy enough to merit our "seal of approval", and from a business and > logistics perspective. For these reasons, we don't plan to pursue this option > in > the immediate future. > > > Community funding > = > > Unfortunately, the financial necessity of shifting our priorities to > commercial > clients will mean that we have less time to work on features that benefit the > wider, security-minded open source community, which has been our focus for the > past seven years. This deeply saddens us. (We all use Qubes on our personal > computers too!) However, the reality is that ITL can't afford to sustain the > open source development of Qubes for much longer. We're running out of time. >
[qubes-users] Re: Trouble reading data CD under Qubes
W dniu sobota, 3 grudnia 2016 12:53:02 UTC+1 użytkownik Grzesiek Chodzicki napisał: > W dniu sobota, 3 grudnia 2016 12:21:49 UTC+1 użytkownik Pawel Debski napisał: > > Folks, > > > > I have a PC with two SATA controllers: primary master holds my SDD with > > Qubes, while secondary master has CD drive attached. > > > > When I insert a data CD it gets mounted by dom0 and the files are > > accessible. I do not want to open these files in dom0 however. So in the VM > > Manager I right click my favourite perssonal-full-sw appVM that I created > > previously and select: > > > > Attach/detach block devices -> Attach dom0:sr0 > > > > and nothing happens. > > > > Even more: CD content is still visible in dom0 and /dev/sr0 is still > > mounted in /run/media/pdebski/CDTITLE > > > > How can I better diagnose the problem? > > Try using qvm-block -l and then attach the device using qvm-block. If that > fails, you can attach the entire sata controller (and not just the drive) Here is the progress: (in dom0) qvm-block -l dom0:sr0 ... attached to fedora-full-sw as xvdi now in fedora-full-sw Konsole I need [user@fedora-usb ~]$ su - root [root@fedora-usb ~]# mkdir CD [root@fedora-usb ~]# mount /dev/xvdi CD [root@fedora-usb ~]# df Filesystem 1K-blocksUsed Available Use% Mounted on ... /dev/xvdi 80388038 0 100% /root/CD and voilà, I can read the files. HOWEVER: can you imagine a normal user doing this? (I can't, she/he would kill me with his laughter ;-) How can I make Fedora read the CD and mount it automagically so all is visible in AppVM File Manager just after inserting CD? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7f58ba9e-f8fd-4da6-8ab5-3cf321cc85c3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] qvm-block man page inconsistency
man qvm-block ... qvm-block -a [options] while in fact it is qvm-block --help ... qvm-block -a [options] : (same error with https://www.qubes-os.org/doc/dom0-tools/qvm-block/) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d49fff5c-d4c4-4807-bf69-8b823dbd32a0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem
W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik game...@googlemail.com napisał: > Hi, > for comfortable use of USB-only scanners and other devices such as this, it > would be nice to have Win7 as USB-VM, e.g. have the USB-Controller-PCI-Device > assigned to it to use USB-Devices from there. > > When i try to start Win7, this happens (see the picture > https://imgur.com/a/spnRC). > [The german sentence in the picure is like: > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No > FLR, PM or Bus Reset available."] > I already have the PCI-Device assigned to it, original Qubes-USB-VM dont have > it assigned anymore. > the "strict pcireset"-qvm-prefs option is already turned on. Any suggestions > to fix this? > Thank you. set pci_strictreset to false and try again. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/69337ff1-d082-46df-89ba-cf53f6f00cd1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Trouble reading data CD under Qubes
W dniu sobota, 3 grudnia 2016 12:21:49 UTC+1 użytkownik Pawel Debski napisał: > Folks, > > I have a PC with two SATA controllers: primary master holds my SDD with > Qubes, while secondary master has CD drive attached. > > When I insert a data CD it gets mounted by dom0 and the files are accessible. > I do not want to open these files in dom0 however. So in the VM Manager I > right click my favourite perssonal-full-sw appVM that I created previously > and select: > > Attach/detach block devices -> Attach dom0:sr0 > > and nothing happens. > > Even more: CD content is still visible in dom0 and /dev/sr0 is still mounted > in /run/media/pdebski/CDTITLE > > How can I better diagnose the problem? Try using qvm-block -l and then attach the device using qvm-block. If that fails, you can attach the entire sata controller (and not just the drive) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1fab03b7-2acf-4ed5-a355-67dcf58e44f4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-03 03:05, gamer.ffo via qubes-users wrote: > Hi, > for comfortable use of USB-only scanners and other devices such as this, it > would be nice to have Win7 as USB-VM, e.g. have the USB-Controller-PCI-Device > assigned to it to use USB-Devices from there. > > When i try to start Win7, this happens (see the picture > https://imgur.com/a/spnRC). > [The german sentence in the picure is like: > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No > FLR, PM or Bus Reset available."] > I already have the PCI-Device assigned to it, original Qubes-USB-VM dont have > it assigned anymore. > the "strict pcireset"-qvm-prefs option is already turned on. Any suggestions > to fix this? > Thank you. > To work around this issue, pci_strictreset should be turned *off*, not on. (I.e., it should be set to "false," not "true.") See: https://www.qubes-os.org/doc/user-faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYQrFkAAoJENtN07w5UDAwW3YP/0kGZ3ikcLxOFFlET1Uv/jJn ZFmMKqrcr8cKJGdfiW+luqE1gwrZLnULO7lDH8fXbEpmHEDP/aUM1NzTGv/mxDAe efSGyoZR5tifgkxCwZAFdrkbQykJ3GI5mFiKSplGsUXd7PewWl+oiVmFOPcea0bl PMPXV3sjEvUJwMgnx8OTxa6dfPS/IoEmK0fkjHCT3+PqMVk4Rik0/r/ykfqGjWut LK98QpPX8r0oXYQ+Wv3ZB/IJXlSsqinz3SDWPIGKyiK6/xzl5sZtxfoEn84K0re2 L7FejYds8fXJFnfpPvCsT7wAv1mbfBuVGWHhr6ICR07MW6G96I1qH9Bd+eDRVJFs Jl2YX8b6a5S+1s42+bstoemBj8p0dYNOey6/JNyZhiLChXSmbme2tDP/BoxkZwyT 12I90c/hzGUyKs4XszmAQtbrBIAOmf6KkYaNEcjk4yfjfy5X8eBHpCcuhxdEFHYU nUQuOLm6pn2zNBPQ9UJUpU+fX0HSFI/3WHbkvDYzzdhjbMMnJgonoMb8XGhQHxHS 77AJv3Mj7dPCq07HDCoaDX5jQ8jwIzt+IuQCZ0WMuhbVpXVQ/s2UUeQqDPMqngOK tgUCoEWv0X+5K6gQ/WQhlBURj7NqkFyjQ05xThAHW3muGfH+ii9aE9SRh9riLXca b7e1PsooMVzh4RQOM7f5 =iT2i -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5cc139e8-6526-9b37-4290-29d69db68ec6%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Trouble reading data CD under Qubes
Folks, I have a PC with two SATA controllers: primary master holds my SDD with Qubes, while secondary master has CD drive attached. When I insert a data CD it gets mounted by dom0 and the files are accessible. I do not want to open these files in dom0 however. So in the VM Manager I right click my favourite perssonal-full-sw appVM that I created previously and select: Attach/detach block devices -> Attach dom0:sr0 and nothing happens. Even more: CD content is still visible in dom0 and /dev/sr0 is still mounted in /run/media/pdebski/CDTITLE How can I better diagnose the problem? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7acd0cd7-e5ec-4d80-afd0-ec0dbbc4b2e9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem
Hi, for comfortable use of USB-only scanners and other devices such as this, it would be nice to have Win7 as USB-VM, e.g. have the USB-Controller-PCI-Device assigned to it to use USB-Devices from there. When i try to start Win7, this happens (see the picture https://imgur.com/a/spnRC). [The german sentence in the picure is like: "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No FLR, PM or Bus Reset available."] I already have the PCI-Device assigned to it, original Qubes-USB-VM dont have it assigned anymore. the "strict pcireset"-qvm-prefs option is already turned on. Any suggestions to fix this? Thank you. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1506d1d8-f3cd-4b45-862c-b63fd79001b4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Yubikeys in Qubes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-02 01:57, vegard_petter...@fastmail.fm wrote: > fredag 2. desember 2016 00.54.55 UTC+1 skrev Micah Lee følgende: >> I just wrote a quick blog post about using Yubikeys in Qubes. >> Specifically, I wanted to share a script that will use qvm-usb to attach >> your Yubikey to your gpgvm no matter what USB port you plug it into. > > Thank you very much for this, Micah, it great to see usability scripts for > Qubes popping up! > > That said, I tested this and it turns out one needs to have a USB Qube set up > (aka USB-VM, sys-usb). > I followed the receipe here: https://www.qubes-os.org/doc/usb/ . > > My problem now is that I have a single PS/2 port, and have to switch between > using either a PS/2 mouse or a PS/2 keyboard, by plugging and unplugging the > connector. > If your PS/2 port supports it, you can buy an inexpensive splitter cable that will allow you to attach a PS/2 keyboard and a PS/2 mouse simultaneously. > Is there a simple way to completely disable the USB-Qube? > The command: "qubesctl top.disable qvm.sys-usb" in dom0 doesn't do much. > And rebooting the Qubes OS causes system hang; it does not boot anymore. > You can simply turn off autostart in the VM's settings, and don't start it. Or you can just delete the VM. You may also need to unhide USB controllers from dom0. I.e., reverse this procedure: https://www.qubes-os.org/doc/usb/#hide-all-usb-controllers-from-dom0 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYQo9gAAoJENtN07w5UDAwQ3UQAI7QqamQW171SJATCPnqOYxC orSincIN2dIpqx/gxtAN94QxxsOY932UZc35lIYYxt+5knk7IQueaVHPs0W9S+Bf ziSPbhe6RKDCbYdVt2Ii2/2heWXqo3kadXDPAW4iqulepccbg5MCo8spl3KKEs45 c7xysbxznSajSs0qqD0ZNZ6u+VftoLgs00e3UGI9+p8RaD1YL0yg2OTDrkvKfI6d OI9JZq1aH5+QJI310P8Fv+PHphPRtqbtS7nrAUm+v7vzU7bN533BpKBLi7wrB2kS TOvIRbRisL29TxgiicLpewnd22PiohebZK5lUK8MGHScF1qSy8z2ufzCkb5VnGww ikLwFUTF9ggLXJoIJHe4DpvQdCbFaSv5M2v5nnxKvr3zDkyqnpn10FZfedI80rSH 9cULPkWAJbiDTzcPExbpVKGrriWGgYf6ZfBaI9632NDGvUn6X0sbgIAq4uc0TWkA Lvfvpzu7pyPpWW4BQxD+cJ+IineP1gg63zjq40fMDlC5Kl2MFlGG1HNtRuaDBySM mTd6/R6zuVdGz14IXfNRPue8gf8xlnUPLylYaAVQBknIFFDnN0TahTcIUi9/rM0R /h0BP91KaEcMugt/aupia2m28VIcyaBkzSgEzMFqlQT8iTLXBPyhrPV7Vwr527Kl cpxOotUnJHyviDsyz3Wu =0sFQ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ce4d25d5-fb95-a7cc-6b5a-a645bdb0d071%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Yubikeys in Qubes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-02 18:50, Leeteqxv wrote: > On 02/12/16 20:15, Micah Lee wrote: >> On 12/01/2016 04:37 PM, Marek Marczykowski-Górecki wrote: >>> The tool run by qvm-usb does support alternative device identification >>> - using product and vendor ID. Also to specify which device to attach. >>> This isn't exposed by qvm-usb tool, because it may be ambiguous, but may >>> be useful here. See README for more details: >>> https://github.com/QubesOS/qubes-app-linux-usb-proxy >>> I acknowledge that your solution is better in some aspect: it exists and >>> works :) >> It seems, from my brief testing, that all Yubikeys of the same version >> have the same product and vendor ids. That still might be preferable to >> grepping for "Yubikey" though. >> >>> Is communication with YubiKey encrypted, or at least somehow >>> authenticated? Otherwise malicious USB VM could easily perform some kind >>> of man in the middle attack and for example sign document you really >>> didn't want to sign. Or decrypt arbitrary data. It's possible even when >>> physical confirmation (button) is required - by simply waiting until you >>> perform *some* operation. >> It is authenticated, but unfortunately I don't think in a secure way. >> When you use any OpenPGP smart card you have to set a PIN to use it, and >> you have to authenticate with the smart card using the PIN. In the case >> of Yubikeys, you type the PIN using the gpg pinentry program (some smart >> card readers have physical keypads to type the PIN, so software >> keyloggers on the computer can't steal the PIN). But I'm pretty sure >> that the PIN you type in, in plaintext, gets sent to the Yubikey, so >> your usbvm could probably log the PIN the very first time you use your >> smart card, and then use it as much as it wants after that without you >> knowing. >> >> Also, I'm pretty sure none of the communication is encrypted. To decrypt >> a message on a smart card, you send the ciphertext (and a PIN, if it >> isn't cached) to the smart card, and it decrypts it responds with the >> plaintext. So likely, the usbvm could spy on the plaintext of decrypted >> messages. >> >> Unfortunately Yubikeys don't support pressing the physical button for >> secret key operations. Those are preserved for 2FA and static passwords. >> >>> This is general problem with USB devices, which are hard to solve with >>> the current USB infrastructure (USB VM can do anything with any device >>> connected to it). Without some fundamental USB rework - probably at >>> hardware layer, I think the only alternative is protecting the data at >>> individual device protocol level (like you do with encrypted USB sticks >>> for example). >> Sad, but reality. >> > Is it not possible to configure this to having the Yubikey require the person > to press the key button manually/physically? > If not, such a limitation would lie in the software rather than in the > Yubikey, I assume, since the Yubikey support Challenge-Response and such > already? If possible, it is definetely preferable to work around potential > PIN theft and subsequent hidden (mis)use by requiring a manual/physical > action. > As Marek explained above, requiring a manual/physical button press doesn't solve the problem: "Is communication with YubiKey encrypted, or at least somehow authenticated? Otherwise malicious USB VM could easily perform some kind of man in the middle attack and for example sign document you really didn't want to sign. Or decrypt arbitrary data. It's possible even when physical confirmation (button) is required - by simply waiting until you perform *some* operation." - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYQo5OAAoJENtN07w5UDAwADMQALNqWqC2Z+BVz8Zfd0gKG2an U36zDNGJUM7ymj92AZqJw7gKQMHk46V4e3CPAQ1fCuuWG538nQzrhdkgMT5b242l Anc14DdfHpHC58ZhtHL8BFPS89ApuiqgEW0QMxqp751rIry53s9ox+eO/MpVlCrE X0RU7WKabBNP/lIxDtC9mf3yAtyhA9d4iHwyuRM+oARPe6MYxJJjKgz4HBYoRqOu SFDfs+rZ577fJSr6kvn/vNBtaXeWCldPXnIoCToTWoihO5F8qr3uLvMVWFj+wF3Q lnMv8W5192zDTcsEZGWWVPDAQ/VBF4LoEOBsUJyPYITOFong85fPYN0cGK1QOesH DWPxfTcTfIKLLnDnpPnkvRJGiT9ovilWyb9MK01KxLaQ2Ix1dsgrGvdDXntWHleg jGp4P/KT8U11omYJVDleWUv+1LSspHVVBPrbwn05WyPi4qN0uWphlFU2KoQtvDLs cCjV8uNpdDh6xKndTyrJibvcTNSigr5tvYpOySuMt/iO7LPGhDdOZ9zMY9KSo1cE p2Q5TdO1a6otB30+vphkn53XQlrXsvtOKIF1if2u7B5R1PyOxjKpz/7QN61913o3 roLxaSSYEF/6DWi289JayVsYutbXbxlnhzgqg8ac3ibmdgRNlSoT1EP4jmMPtReH LMj8MpxMuBq4I12wlr+R =2myJ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/39351458-901b-4706-7875-ac9d888fbc38%40qubes-os.org. For more options,