[qubes-users] Re: Thinkpad T460

2016-12-03 Thread Bernd Lorenzen

The output in the fedora  template is:

● tlp.service - TLP system startup/shutdown
   Loaded: loaded (/usr/lib/systemd/system/tlp.service; enabled; vendor 
preset: enabled)

   Active: active (exited) since Sun 2016-12-04 07:22:25 CET; 21s ago
 Docs: http://linrunner.de/tlp
  Process: 567 ExecStart=/usr/sbin/tlp init start (code=exited, 
status=0/SUCCESS)

 Main PID: 567 (code=exited, status=0/SUCCESS)
   CGroup: /system.slice/tlp.service

Warning: Journal has been rotated since unit was started. Log output is 
incomplete or unavailable.


and in dom0 console:

tlp.service
Loaded:not-found (Reason: No such file or directory)
Active: inactive (dead)


On 12/03/2016 09:53 PM, Jan Betlach wrote:

On Saturday, December 3, 2016 at 8:41:49 PM UTC+1, Bernd Lorenzen wrote:

Hello,

my Question is how i set the charge thresholds for my Lenovo Thinkpad T460.

I have installed the following packages tlp, tlp-rdw,tp-smapi-dkms and
acpi-call-dkms in both fedora aind debian template. Afterwards i changed
the thresholds in the config file /etc/default/tlp in both templates and
in dom0. But it doesn`t work. Do you know a workaround for this. I hope
did not forget some useful information for you.

Kind regards


Bernd Lorenzen


Has the service been started?
# systemctl status tlp


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/40128588-26e0-130e-877b-cc08dad81af9%40gmx.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Install on Dell XPS 13 (9350)

2016-12-03 Thread miaoski
I failed to assign my TP-LINK TL-WN722N wireless USB dongle to sys-net.  
Google'd a bit and found some docs, still no idea on how to do it.  Help is 
much appreciated.

Thanks!
miaoski

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/533295f8-59b1-4087-9ec5-e120127f5e17%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Install on Dell XPS 13 (9350)

2016-12-03 Thread miaoski
Installation finished with the help of a USB mouse.  Internal keyboard actually 
works.  However, UEFI boot entry is not created.

I booted to BIOS and added FS0:/EFI/qubes/xen-4.6.1.efi.
There's no problem booting to Dom0 and create default qubes + sys-usb.
Internal touchpad works as well.
Internal WiFi doesn't work as expected.  Mitigating with a USB dongle.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ed25975-f8da-432c-9cc2-d80bbd358f26%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS v3.2 on Chromebook Pixel 2015

2016-12-03 Thread rspeiglvera
On Saturday, December 3, 2016 at 7:19:08 PM UTC-8, raah...@gmail.com wrote:
> On Saturday, December 3, 2016 at 7:09:25 PM UTC-5, rspei...@gmail.com wrote:
> > I've tried to install Qubes on my Pixel twice. The install boots nicely and 
> > everything seems to go well. Once I reboot, the boot process gets hung up 
> > and never makes it past to the decryption step.
> > 
> > Any ideas or recommendations?
> 
> bios settings?

The Chromebook has legacy bios support through SeaBios on CoreBoot. There isn't 
anything to setup.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/add951ce-46c2-4382-a838-791807ce0c3a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Install on Dell XPS 13 (9350)

2016-12-03 Thread miaoski
Hi.

I have found a few threads about the installation of Qubes OS on a Dell XPS 13, 
but they are at least several months old.

I'm trying to install Qubes 3.2 onto Dell XPS 13 9350, which has a running 
Ubuntu 16.04 LTS.  The hardware matrix is,
* BIOS 1.2.3
* CPU i5-6200U @ 2.30 GHz
* Skylake
* FHD (mine is not QHD)
* Memory 8GB
* M.2.PCIe SSD
* TPM 1.2
* VT + DIO

I disabled secure boot and successfully booted in UEFI.  Anaconda was running 
well, GUI showed, but keyboard and mouse don't work in the screen of language 
selection.

I wanted to try adding options in GRUB, but [Tab] gave me "chainloader 
/EFI/BOOT/xen.efi".  I mounted USB disk with Qubes in Ubuntu, but its 
filesystem is ISO9660.  I can't change /EFI/BOOT/xen.cfg.

I thought I had a chance to use Qubes OS, since XPS 13 9350 is well supported 
by kernels newer than 4.4.  Any comments, please?


Thanks!
miaoski

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2b8abd08-6d61-421a-bf05-103f6efc49ab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts

2016-12-03 Thread raahelps
On Saturday, December 3, 2016 at 10:46:39 PM UTC-5, raah...@gmail.com wrote:
> Just don't get corrupted! haha   But really I think this is great!  I wish 
> all the success in the world.  I still think its the future.  I would for 
> sure by merch(I still want a sticker) too like an above user,  and i'm look 
> into credit card info.  
> 
> But ya, If you got a good sales guy to go to some small to midsize companies 
> and give a presentation, how can anyone refuse!!!???  This sounds exciting to 
> me.

oh and like Fran said don't be ashamed to name drop everyone and everything 
right off the bat.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8fb280fe-3e0b-4ff9-a816-76478daf66dc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts

2016-12-03 Thread raahelps
Just don't get corrupted! haha   But really I think this is great!  I wish all 
the success in the world.  I still think its the future.  I would for sure by 
merch(I still want a sticker) too like an above user,  and i'm look into credit 
card info.  

But ya, If you got a good sales guy to go to some small to midsize companies 
and give a presentation, how can anyone refuse!!!???  This sounds exciting to 
me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/004e1856-a28a-487c-8730-bcc608f89524%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to backup an iPhone under Qubes

2016-12-03 Thread raahelps
cause i can assign single device to a linux appvm no probs,  but not to the 
windows hvm.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bdedeb90-52e0-4b84-83de-d4d3809a73cd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to backup an iPhone under Qubes

2016-12-03 Thread raahelps
On Thursday, October 6, 2016 at 1:54:14 PM UTC-4, qu...@posteo.de wrote:
> Hi ,
> 
> thx for your reply.
> 
> On 06.10.2016 10:13, Grzesiek Chodzicki wrote:
> > W dniu środa, 5 października 2016 22:23:28 UTC+2 użytkownik
> > qu...@posteo.de napisał:
> > USB passthrough for HVM is currently broken, You need to either use a
> > Linux AppVM or do it over the network.
> 
> Is there a possibility to run iTunes on Linux in an AppVM? At least I am 
> not aware of it without a virtual machine with Windows.
> 
> Network would work in theory, but it would require a bridge, which is 
> not possible without patching in Qubes OS afaik.
> 
> Network backups also need to be setup for the first time via USB which I 
> can workaround atm by copying over the iTunes configuration from the 
> other VM but this still requires a bridge network device.
> 
> Regards

what about making an appvm from a win7 templatevm?  or prolly all still 
considered hvm which I think is the prob.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9b58537a-b185-4aff-b8c8-325d8de7489d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: anyone luck mounting an iphone 7?

2016-12-03 Thread raahelps
sorry for the spam ugh.  but I was wondering if there was a way to do like a 
gnome-session-save or quit in qubes?  probably not i'm thinking.  the command 
is there in fedora-23 but it don't work.  maybe cause its appvm?  What if I 
make a templatevm a sys-usb.  Is that possible? would it even make a diff?  

Gonna have to go galaxy s7 I think cause whats the diff anyway i've noticed now 
...  But I think alot of people would want this.  Really don't want to use 
icloud. or,  maybe use that in addition :)   but want hard copies of data for 
myself for sure. all over my house like Harold Thomas Martin III  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0159beb-19b2-4895-a9e1-cf69a6252c3d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: anyone luck mounting an iphone 7?

2016-12-03 Thread raahelps
On Saturday, December 3, 2016 at 11:05:38 AM UTC-5, raah...@gmail.com wrote:
> well i can get it working everytime on baremetal ubuntu now.  What I do is 
> set lock to 5 mins.  idevicepair pair,then leave device connected and log 
> out and in.  then  dcim folder then appears in file manager.  works 
> everytime.   Now to figure out how I reproduced this in qubes debian lol.
> 
> Unfortunately until they update libimobiledevice you can only back up camera 
> pictures + videos, and texted pics.   Can't back up music or downloads.

I forgot to add I compiled 1.2.1 but I doubt it matters.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/61435852-aaf1-458e-8a28-d289367bdc63%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS v3.2 on Chromebook Pixel 2015

2016-12-03 Thread raahelps
On Saturday, December 3, 2016 at 7:09:25 PM UTC-5, rspei...@gmail.com wrote:
> I've tried to install Qubes on my Pixel twice. The install boots nicely and 
> everything seems to go well. Once I reboot, the boot process gets hung up and 
> never makes it past to the decryption step.
> 
> Any ideas or recommendations?

bios settings?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e4d9fac4-c02f-4c68-ab2e-d1946145531c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qga.exe 100% CPU load (Windows Tools)

2016-12-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Dec 03, 2016 at 04:23:38PM +0100, Marc de Bruin wrote:
> Hi,
> 
> Occasionally, the Qubes GUI Agent (qga.exe) process turns into a CPU-hog for 
> no apparent reason. The process just turns into a flatliner, eating up one 
> complete core, which turns the Windows 7 machine into a very slow beast. 
> Nothing is crashing tho. Power-off/power-on the HVM seems to fix it.
> 
> AFAIK, I’m using the latest version of the Windows Integration Tools on Qubes 
> R3.2. 
> 
> Where should I start looking for problems? Any log-files that are recommended 
> to look at?

Take a look here: https://www.qubes-os.org/doc/windows-tools-3/

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYQ2zDAAoJENuP0xzK19csY2kIAI75LZNEajgIPnH7Vf9HtRq1
KQ0HIOEJiSPHw4B0bmT0Py5Sk7vBbc7/pUgMwhe4Y+Ftc/lxQgBJoN8q9KMFwPU5
cAmynGmOZ1gsIn04apI4WqE82Y6Dlxwlc+48zt+UlVL+e9q2+0UATknF+IUFUmFH
g+gxg2dTqN8dRxu6DEm/RD9DhVQRvqL1pIy9qb185W56xJw3BvmzneyIdcNud7b+
IU3D8W9ORWzyEka9IPQzXIDSAsGBSP0Yy0xBVF5pJ+5XP9DqZEPXXlop9hsSMjzU
V3ZwTflRflN4aXCZGLj7MpNhpBE9xBR61XwTpoaXZeOocKRY7dktKihb1BkNKEU=
=j23L
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161204010922.GN1145%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: custom kernel doesn't work installed in debian cloned template

2016-12-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Nov 30, 2016 at 08:52:19PM -0800, raahe...@gmail.com wrote:
> On Sunday, November 27, 2016 at 12:02:08 AM UTC-5, raah...@gmail.com wrote:
> > I followed instructions to install pvgrub2-xen in dom0. Then in template vm 
> > installed qubes-kernel-vm-support and grub2-common.  Then i installed the 
> > distribution kernel from debian repos with apt-get (3.16).   then 
> > update-grub and shutdown but It doesn't work right.  I eventually would 
> > like to be able to compile my own kernel,  was hoping it would be easier 
> > with pvgrub support but I think I must be missing something.
> > 
> > When I boot it after selecting pvgrub in kernel settings.   sudo xl console 
> > sows it has booted fine but then is asking me for a login.  If I type root 
> > i get root.   But I can't load any applications in the gui environment.  
> > from dom0 terminal or from the start menu on desktop. 
> > 
> > Thanks,
> > Rich
> 
> module doens't seem to be installing.  I do  sudo dkms autoinstall -k 
> 3.16.0-4-amd64  but I don't get any output.

Take a look at dkms manual page - there is `dkms install` command for
manual operation. Get u2mfn module version from /usr/src.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYQ2neAAoJENuP0xzK19csOLMIAIJ6oA2kgads6C/IMpxgQx0I
gEb6VI9ZuY9U8QSHc5n+s61tcnl9/y+1su5kso6v3DX925wlQrmA0Ka1k3+YoKXV
3F1S6kg5PDZyzuysqBBU1v6WbjruFzgIohD1zNoRHU5sMU/SvjPaFadznuxolCPv
T6t0feM0Pkhd7OtBt04GUeWyRCd/UJ9umAa/JozgzWoLkLTqlfGGmpI3OG01tA9r
CFnwjRj92BzaRxUE7MwCcc8tVsoSDFH3Wwn9UwSHcSze6F1m2tcS4/pL2dm8bBUj
+WkhdcZQm93ap/ueIrPKDbe2IlW3c2WfPnC+Dajt3WmAMF3TVkzXgvuQSRjqj/s=
=ZCKE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161204005701.GL1145%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Dec 03, 2016 at 04:24:05PM -0800, Benjamin Richter wrote:
> Am Sonntag, 4. Dezember 2016 01:19:45 UTC+1 schrieb Marek 
> Marczykowski-Górecki:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> > 
> > On Sat, Dec 03, 2016 at 04:14:48PM -0800, Benjamin Richter wrote:
> > > I have revisited an earlier approach with some more success.
> > > I attached only the usb controller, not the bridges. This seems to work:
> > > 
> > > sudo lspci
> > > 00:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller 
> > > [Alpine Ridge]
> > > 00:01.0 Network controller: Intel Corporation Wireless 7265 (rev 59)
> > > 
> > > sudo lsusb
> > > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> > > Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
> > > Bus 002 Device 007: ID 046d:c51e Logitech, Inc. 
> > > Bus 002 Device 006: ID 1e4e:0898 Cubeternet 
> > > Bus 002 Device 005: ID 0572:1703 Conexant Systems (Rockwell), Inc. 
> > > Bus 002 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
> > > Bus 002 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
> > > Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> > > 
> > > So some devices are there, like the SD card reader, audio device and the 
> > > usb hubs. The usb hubs even work, the Logitec device is an external 
> > > keyboard I connected.
> > > 
> > > But the ethernet device is not there, nor the usb ethernet dongle that's 
> > > also connected to the usb hub. Both show up on dom0 if I connect them, 
> > > but since dom0 has no networking, I cannot say if they would work.
> > 
> > Maybe those are on the other USB controller - 00:14.0 ? Try attaching
> > that too to the sys-net.
> 
> No, that's the integrated controller, which is the source of the trouble, 
> since it also is used for keyboard and touchpad/touchscreen, so I cannot 
> attach that to a VM.
> 
> I've attached the ethernet dongle to the same port as the logitech keyboard, 
> but it does not show up anywhere.

If you see the device in dom0 in some configuration, take a look at its
sysfs path - it will have a hint on which controller is it. Like this:
lrwxrwxrwx 1 root root 0 Dec  4 01:32 /sys/bus/usb/devices/3-1 ->
../../../devices/pci-0/pci:00/:00:02.0/usb3/3-1

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYQ2RWAAoJENuP0xzK19csKxMH/3rkY6pxlWVSjltPRc1r2jGn
njWyqDEA6Zoe56gAQ3zS1ORX54hgpEw6omZgzB3bY9KI2U3ihLncJ4jF8mVwxa+S
rTCFF1Flqp8Olk2jTXc2lobdLcOQBMQXXfNq4GbpHkl0C+ZVIa1n7lndfJI9WA21
TKA3gsW/SY8EgBjYtFO0Emnhr5WMi3jYyt/qSWU8jrYn92IoZnx6CbpQp8xA/S8L
KLvt7WUnBjuFX+k4z9hodXHq6eU00YNqOEI4fm0+y92PPSjIGKbDhClCstSMMXRE
RqlbJmWpBasYBPm2pOg+1C0Vkeg593TtxahLd2k8MuFZUjrCjY4OXwA7+YkHFRA=
=4hF8
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161204003326.GK1145%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Benjamin Richter
Am Sonntag, 4. Dezember 2016 01:19:45 UTC+1 schrieb Marek Marczykowski-Górecki:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Sat, Dec 03, 2016 at 04:14:48PM -0800, Benjamin Richter wrote:
> > I have revisited an earlier approach with some more success.
> > I attached only the usb controller, not the bridges. This seems to work:
> > 
> > sudo lspci
> > 00:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller 
> > [Alpine Ridge]
> > 00:01.0 Network controller: Intel Corporation Wireless 7265 (rev 59)
> > 
> > sudo lsusb
> > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> > Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
> > Bus 002 Device 007: ID 046d:c51e Logitech, Inc. 
> > Bus 002 Device 006: ID 1e4e:0898 Cubeternet 
> > Bus 002 Device 005: ID 0572:1703 Conexant Systems (Rockwell), Inc. 
> > Bus 002 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
> > Bus 002 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
> > Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> > 
> > So some devices are there, like the SD card reader, audio device and the 
> > usb hubs. The usb hubs even work, the Logitec device is an external 
> > keyboard I connected.
> > 
> > But the ethernet device is not there, nor the usb ethernet dongle that's 
> > also connected to the usb hub. Both show up on dom0 if I connect them, but 
> > since dom0 has no networking, I cannot say if they would work.
> 
> Maybe those are on the other USB controller - 00:14.0 ? Try attaching
> that too to the sys-net.
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJYQ2EbAAoJENuP0xzK19cs1wwH/3jZh8JqNh1tqPJmaCxYzBA1
> nmCNJbZ7GDXk19ZJDfMeDsmaZ3OilvhjimAKf/43lvJMjQuzyneCjOwWW6Tef4zQ
> CRPb3gVdiE5DdJ1Gq5Yz93VRP41Y26eN26SIKEk6TQAHJCuC9ydrIFC32oi6imsG
> H+621Iv4f9zPiPta24fmoFQs2NdfAWZX6NHZpIXUULPZx5DncUsYwLRUttXUEIgg
> pgMJGbdsC6X8iRJIT3CpSZcRRgpJJNIdEeiPtk2odbB2yzeL3sapCmZiJAs0iOjw
> XMdKRfK9utExA8GH27Tkesiab7HR/PlHO8w2ztphLWxMmNLMEdMGSHQ4xXQM5kM=
> =LgKq
> -END PGP SIGNATURE-

No, that's the integrated controller, which is the source of the trouble, since 
it also is used for keyboard and touchpad/touchscreen, so I cannot attach that 
to a VM.

I've attached the ethernet dongle to the same port as the logitech keyboard, 
but it does not show up anywhere.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0123d96-1802-491d-89d7-3c54dcc65c8e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Dec 03, 2016 at 04:14:48PM -0800, Benjamin Richter wrote:
> I have revisited an earlier approach with some more success.
> I attached only the usb controller, not the bridges. This seems to work:
> 
> sudo lspci
> 00:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller [Alpine 
> Ridge]
> 00:01.0 Network controller: Intel Corporation Wireless 7265 (rev 59)
> 
> sudo lsusb
> Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
> Bus 002 Device 007: ID 046d:c51e Logitech, Inc. 
> Bus 002 Device 006: ID 1e4e:0898 Cubeternet 
> Bus 002 Device 005: ID 0572:1703 Conexant Systems (Rockwell), Inc. 
> Bus 002 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
> Bus 002 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
> Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> 
> So some devices are there, like the SD card reader, audio device and the usb 
> hubs. The usb hubs even work, the Logitec device is an external keyboard I 
> connected.
> 
> But the ethernet device is not there, nor the usb ethernet dongle that's also 
> connected to the usb hub. Both show up on dom0 if I connect them, but since 
> dom0 has no networking, I cannot say if they would work.

Maybe those are on the other USB controller - 00:14.0 ? Try attaching
that too to the sys-net.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYQ2EbAAoJENuP0xzK19cs1wwH/3jZh8JqNh1tqPJmaCxYzBA1
nmCNJbZ7GDXk19ZJDfMeDsmaZ3OilvhjimAKf/43lvJMjQuzyneCjOwWW6Tef4zQ
CRPb3gVdiE5DdJ1Gq5Yz93VRP41Y26eN26SIKEk6TQAHJCuC9ydrIFC32oi6imsG
H+621Iv4f9zPiPta24fmoFQs2NdfAWZX6NHZpIXUULPZx5DncUsYwLRUttXUEIgg
pgMJGbdsC6X8iRJIT3CpSZcRRgpJJNIdEeiPtk2odbB2yzeL3sapCmZiJAs0iOjw
XMdKRfK9utExA8GH27Tkesiab7HR/PlHO8w2ztphLWxMmNLMEdMGSHQ4xXQM5kM=
=LgKq
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161204001939.GA6741%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Benjamin Richter
I have revisited an earlier approach with some more success.
I attached only the usb controller, not the bridges. This seems to work:

sudo lspci
00:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller [Alpine 
Ridge]
00:01.0 Network controller: Intel Corporation Wireless 7265 (rev 59)

sudo lsusb
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 002 Device 007: ID 046d:c51e Logitech, Inc. 
Bus 002 Device 006: ID 1e4e:0898 Cubeternet 
Bus 002 Device 005: ID 0572:1703 Conexant Systems (Rockwell), Inc. 
Bus 002 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
Bus 002 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

So some devices are there, like the SD card reader, audio device and the usb 
hubs. The usb hubs even work, the Logitec device is an external keyboard I 
connected.

But the ethernet device is not there, nor the usb ethernet dongle that's also 
connected to the usb hub. Both show up on dom0 if I connect them, but since 
dom0 has no networking, I cannot say if they would work.

I cannot see an error in dmesg either. Am I missing something? Do I need to 
configure something else to enable the network devices in sys-net?

sudo dmesg | grep usb
[0.087164] usbcore: registered new interface driver usbfs
[0.087164] usbcore: registered new interface driver hub
[0.087164] usbcore: registered new device driver usb
[0.199812] usbcore: registered new interface driver usbserial
[0.199819] usbcore: registered new interface driver usbserial_generic
[0.199826] usbserial: USB Serial support registered for generic
[1.218031] usbcore: registered new interface driver usbhid
[1.218036] usbhid: USB HID core driver
[1.899801] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002
[1.899805] usb usb1: New USB device strings: Mfr=3, Product=2, 
SerialNumber=1
[1.899809] usb usb1: Product: Dummy host controller
[1.899813] usb usb1: Manufacturer: Linux 4.4.14-11.pvops.qubes.x86_64 
dummy_hcd
[1.899817] usb usb1: SerialNumber: dummy_hcd.0
[2.517386] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002
[2.517394] usb usb2: New USB device strings: Mfr=3, Product=2, 
SerialNumber=1
[2.517401] usb usb2: Product: xHCI Host Controller
[2.517406] usb usb2: Manufacturer: Linux 4.4.14-11.pvops.qubes.x86_64 
xhci-hcd
[2.517412] usb usb2: SerialNumber: :00:00.0
[2.517988] usb usb3: New USB device found, idVendor=1d6b, idProduct=0003
[2.517994] usb usb3: New USB device strings: Mfr=3, Product=2, 
SerialNumber=1
[2.518018] usb usb3: Product: xHCI Host Controller
[2.518024] usb usb3: Manufacturer: Linux 4.4.14-11.pvops.qubes.x86_64 
xhci-hcd
[2.518030] usb usb3: SerialNumber: :00:00.0
[2.870258] usb 2-1: new high-speed USB device number 2 using xhci_hcd
[3.039597] usb 2-1: New USB device found, idVendor=05e3, idProduct=0610
[3.039641] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[3.039676] usb 2-1: Product: USB2.1 Hub
[3.039699] usb 2-1: Manufacturer: GenesysLogic
[3.333235] usb 2-1.1: new high-speed USB device number 3 using xhci_hcd
[3.458450] usb 2-1.1: New USB device found, idVendor=05e3, idProduct=0610
[3.458501] usb 2-1.1: New USB device strings: Mfr=1, Product=2, 
SerialNumber=0
[3.458545] usb 2-1.1: Product: USB2.0 Hub
[3.458572] usb 2-1.1: Manufacturer: GenesysLogic
[3.582241] usb 2-1.3: new low-speed USB device number 4 using xhci_hcd
[3.697415] usb 2-1.3: New USB device found, idVendor=046d, idProduct=c51e
[3.697467] usb 2-1.3: New USB device strings: Mfr=0, Product=0, 
SerialNumber=0
[3.698170] usb 2-1.3: ep 0x81 - rounding interval to 64 microframes, ep 
desc says 80 microframes
[3.698255] usb 2-1.3: ep 0x82 - rounding interval to 64 microframes, ep 
desc says 80 microframes
[3.702613] input: HID 046d:c51e as 
/devices/pci-0/pci:00/:00:00.0/usb2/2-1/2-1.3/2-1.3:1.0/0003:046D:C51E.0001/input/input1
[3.753888] hid-generic 0003:046D:C51E.0001: input,hidraw0: USB HID v1.11 
Keyboard [HID 046d:c51e] on usb-:00:00.0-1.3/input0
[3.762024] input: HID 046d:c51e as 
/devices/pci-0/pci:00/:00:00.0/usb2/2-1/2-1.3/2-1.3:1.1/0003:046D:C51E.0002/input/input2
[3.814541] hid-generic 0003:046D:C51E.0002: input,hiddev0,hidraw1: USB HID 
v1.11 Mouse [HID 046d:c51e] on usb-:00:00.0-1.3/input1
[3.823050] usb 2-1.1.2: new full-speed USB device number 5 using xhci_hcd
[4.128399] usb 2-1.1.2: New USB device found, idVendor=0572, idProduct=1703
[4.128445] usb 2-1.1.2: New USB device strings: Mfr=1, Product=2, 
SerialNumber=3
[4.128476] usb 2-1.1.2: Product: ASUS USB Audio
[4.128496] usb 2-1.1.2: Manufacturer: ASUS
[4.128514] usb 2-1.1.2: SerialNumber: 
sudo dmesg | grep usb
[0.087164] usbcore: registered new interfa

[qubes-users] Qubes OS v3.2 on Chromebook Pixel 2015

2016-12-03 Thread rspeiglvera
I've tried to install Qubes on my Pixel twice. The install boots nicely and 
everything seems to go well. Once I reboot, the boot process gets hung up and 
never makes it past to the decryption step.

Any ideas or recommendations?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e6de0e1a-e457-4185-8afd-58be1a6d38f1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How do I get Qubes 4.0 pre-release/dev build?

2016-12-03 Thread rspeiglvera
On Saturday, December 3, 2016 at 3:01:48 PM UTC-8, bent...@cloudctrl.nl wrote:
> I get an error wheb running make get-sources when i get to libvirt library, ? 
> Do I need to modify some sourcefile? Please help. BTW I just downloaded the 
> qubes builder from qubes-os, and I used your config. Is this correct or 
> should I be using a different qubes-builder?

Same here, the error is:
No valid signed tag found!
Makefile:187: recipe for target 'core-libvirt.get-sources' failed

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ebaee0f9-2597-42c5-80a7-7ae97a1702f7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Trouble reading data CD under Qubes

2016-12-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Dec 03, 2016 at 03:21:48AM -0800, Pawel Debski wrote:
> Folks,
> 
> I have a PC with two SATA controllers: primary master holds my SDD with 
> Qubes, while secondary master has CD drive attached.
> 
> When I insert a data CD it gets mounted by dom0 and the files are accessible. 
> I do not want to open these files in dom0 however. So in the VM Manager I 
> right click my favourite perssonal-full-sw appVM that I created previously 
> and select:
> 
> Attach/detach block devices -> Attach dom0:sr0
> 
> and nothing happens. 
> 
> Even more: CD content is still visible in dom0 and /dev/sr0 is still mounted 
> in /run/media/pdebski/CDTITLE
> 
> How can I better diagnose the problem?

I think the problem is you have it mounted in dom0. If unmount it there,
it should just work.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYQ1nPAAoJENuP0xzK19cs7dkH/3tixTrrQAaozHR6A+J3Z/wX
wqheJcIwYdGYxGYd4wKC2breqED7tuVertg771ZhwJsN+YOshLiPywfY13Xj52cV
Yfr3JYLkSFyhuE8PSQjQm5Zzovhm/PNOoMuBBsVm2l/afTv66iDedxpoisEGk2PO
fc38ZaCVy5eXtE8cWuIqIUDXoVelD2Qlr2rxIBbewykCFqK0DgcxTUkh2qwrBlF3
7O1K1+hOmYkKFaOoM0lUoRuBUeG6Lh0hm+hHk0KlJuEW1uPzV/6SfWgZO2bu13UR
6x5LiXSMIxLzLnGyzzx0uMVhOAuWoNJeVPwm4AEi5AIsXyTek+LyU8F4WZVbF/k=
=/m+X
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161203234831.GI1145%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Dec 03, 2016 at 07:13:41AM -0800, Benjamin Richter wrote:
> Here I attached the PCI devices of the docking station to sys-net an rebooted 
> for good measure.
> As you can see, the bridges show up, but the usb controller and the usb 
> devices do not, I have not Idea why.
> 
> [user@sys-net ~]$ sudo lspci
> 00:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> Ridge 2C 2015]
> 00:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> Ridge 2C 2015]
> 00:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> Ridge 2C 2015]
> 00:03.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> Ridge 2C 2015]
> 00:05.0 Network controller: Intel Corporation Wireless 7265 (rev 59)
> [user@sys-net ~]$ sudo lsusb
> Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

Indeed above there is a place for USB controller - 00:04.0. Check kernel
messages (dmesg) in sys-net - maybe there you'll find something
interesting about it.


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYQ1k/AAoJENuP0xzK19cskr8IAIMkU+SpqnlJWP3eO0nMuZvM
XudqaQp16jGCgqblKu3Vc+666+cxHMSHVKmIp6dmJHyZyP4h6JL28FsZCYsKHst/
0MMsBHoxFnJMOsxD+T1561pRlg0VzEAP/n47PXRUMgMZ0wBxIHpA6hgffPVfeytB
rLBK5XNLdn3hunN8mS4lxL/JW8TQZePVszHjTBF1SRwshFCs7VTdwaYVjvLIAucb
0owoP9EXnLx1XWFsk04B58zWYc3KS3pmPgFqGBUaueZ9kbZvxGlIBx/bbwfXGaE3
MNeQiXC4KCJnx8C5QP8HFXWjSSpBi1u8+gyglncOIzj7Gz3sV3Zv+ReVjIRTK38=
=Qg5E
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161203234606.GH1145%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: "Start Button" and "Task Bar" are Missing

2016-12-03 Thread cmschube
On Wednesday, October 26, 2016 at 11:25:44 AM UTC-5, sco...@gmail.com wrote:
> I installed R3.2 yesterday and everything looked and worked fine, but today 
> when I started my machine up, I only have the VM Manager window - no 'task 
> bat' and no 'start' button.
> 
> How can I get them back without doing a complete re-install?

I realize this is a bit old, but I found that that the xfce4-panel wasn't 
running/started. Running that in Dom0 made the panel re-appear.

Hopes this helps someone. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aedea7b6-c60e-4300-a819-e998568f7a56%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How do I get Qubes 4.0 pre-release/dev build?

2016-12-03 Thread bentvader
I get an error wheb running make get-sources when i get to libvirt library, ? 
Do I need to modify some sourcefile? Please help. BTW I just downloaded the 
qubes builder from qubes-os, and I used your config. Is this correct or should 
I be using a different qubes-builder?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/128ceb54-3f88-4cd1-86aa-5430b44f9bef%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes and HiDPI

2016-12-03 Thread Jean-Philippe Ouellet
On Sat, Dec 3, 2016 at 9:12 AM, Marc de Bruin  wrote:
> With what will it be replaced in Qubes 4?

Assuming you mean qubes-manager, then...

Discussion here: https://github.com/QubesOS/qubes-issues/issues/2132

WIP code here: https://github.com/bnvk/qubes-manager-new

Some early screenshots here: https://github.com/QubesOS/qubes-issues/issues/1870

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_Bq3zxwr7Gi2TS74ySteGF8KuCLz9Mt0VNHLAvVxM62ww%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] console window manager

2016-12-03 Thread Jean-Philippe Ouellet
On Fri, Dec 2, 2016 at 6:58 PM, Eva Star  wrote:
> xdotool not pre-installed (maybe it's better?)

It will be in a future version:
https://github.com/QubesOS/qubes-core-admin-linux/blob/be1d984364de9641312f56def13b0af27cfe1cd4/rpm_spec/core-dom0-linux.spec#L51

Pulled in as part of a work-in-progress effort to prevent graphical
denial-of-service attacks:
https://github.com/QubesOS/qubes-issues/issues/881

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_D844Wof-eno9gWv9kNaaHT785s%2BygoggA_Afb7LmMUKA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users]

2016-12-03 Thread Grzegorz Chodzicki

Bądź mną
Nikomu bliżej nieznana osóbka
Załóż partię
Nazwij ją: "1000 złotych na każde dziecko"
Załóż funpage partii, pisz tylko o 1000 złotych na każde dziecko
Reklamuj się natrętnie, zwłaszcza na forach PiS
Reklamuj się też na forach pro socjalnych
Ludzie pytają Cię o różne rzeczy
Zawsze, nieważne o co pytany, opowiadaj o 1000 złotych na każde dziecko
Idź do urzędu stanu cywilnego, zmień imię i nazwisko na "1000 złotych na 
każde dziecko"

Spamuj nie tylko Internet, proś Grażyny z forów by agitowały na Twoją rzecz
Załóż pełno patusiarskich, lokalnych grup nacisku
Wieszaj na MOPS'ach i innych urzędach ulotki
Plakaty
Banery
W zasadzie to niech robią to Grażyny, ty im tylko wysyłasz szablony
Zakładasz własne forum pt. 1000 złotych na dziecko
Opowiadasz o tym, jak zbawienne skutki to przyniesie
Każdy drobny hejt banujesz
Każdą próbę polemiki  banujesz
Każdego o nie polsko brzmiącym nazwisku, banujesz
Najgorsze kółko wzajemnej adoracji jakie widział świat
Jest was coraz więcej
Ludzie się przekonują, nie tylko patusy
Mówisz: Macie czas, róbcie dzieci i o nic się nie martwcie
PiS hurrdurzy, ale to nic przy hurrdurzeniu reszty
Zaczynają Cię zapraszać do mediów
Na początek lokalna gazeta, lokalne radio, lokalne TV
Przychodzi czas na media krajowe
Na każde pytanie odpowiadasz bardzo zwięźle i ogólnie
Od razu przełączasz się na 1000 złotych na dziecko
Ludzie mają o to ogromny ból dupy
No, oprócz coraz większej rzeszy Twoich wyborców

Nadchodzą wybory
Organizujesz w każdej mieścinie: "Marsz 1000 złotych na dziecko"
Nie tylko MOPSy, teraz wszystko oblepiasz tymi plakatami
Rozkazujesz armii Grażyn wieszać to na balkonach
One to robią, bo w końcu hehe, 1000 złotych
Masz pierwszą całkowicie oddolną kampanię wyborczą
Idziesz na debatę
Krzyczysz o złodziejach, półśrodkach
Krzyczysz o 1000 złotych na dziecko
Wyciągasz sobie zza pleców ogromną flagę
Zasłaniasz wszystko
Śpiewasz hymn i nią machasz, zagłuszasz rozmówców
Wyprowadzają Cię z TV, na odchodne krzyczysz, by ludzie nie dali się 
zmanipulować propagandzie!


Po wyborach
Wygrałeś, nawet bardziej niż PiS poprzednio
Udało Ci się do Sejmu wprowadzić prawie trzystu posłów
W Senacie jeszcze lepiej
Mówisz, że przemówisz do Narodu
Wybierasz największy plac
Zjeżdżają się ludzie z całej Polski
Kochają Cię
Wielbią
Noszą Twoje zdjęcia, jak obrazy świętych na Boże Ciało
To jest ten moment
Wchodzisz na mównicę
Wznosisz ręce jak papież
Tłum wiwatuje
Bierzesz mikrofon
JEBAĆ ROSZCZENIOWĄ HOŁOTĘ!
Tłum wiwatuje, bo jeszcze nie załapał o co chodzi
JEBAĆ BIEDĘ
Wciąż wiwatują, ale myślą, że mówisz o czymś innym niż jest naprawdę
SPIERDALAJCIE
Cisza
Martwa cisza
Jest tak skondensowana i martwa, jak dżem z martwych płodów
A ty... Wtykasz w ten dżem nachosa
I opierdalasz go na ich oczach
ZAPIERDALAJCIE DO ROBOTY, OD PAŃSTWA NIE DOSTANIECIE NIC
JESTEŚCIE JEBANYMI ZŁODZIEJAMI
SOCJAL JEST NIEMORALNY
PODATKI TO KRADZIEŻ
ZA RUCHANIE NAJWYŻEJ AIDS DOSTANIECIE, NIE PIENIĄDZE
ANTYNATALIZM KURWY
A TAK W OGÓLE, TO WAMI GARDZĘ
ELO
Cisza trwa jeszcze trzy sekundy, wykorzystujesz je by sprężystym krokiem 
opuścić scenę i wejść do wozu opancerzonego

Siedzi w nim Rothbard i Mises
Dobra robota ziomuś, chwalą Cię
Thx
Skręcacie sobie blanta, a gdy minęła trzecia sekunda
BUM!
Bomba atomowa to nic, przy sile pękających w jednej chwili milionów odbytów
Zaczyna się wielka bitwa na ulicach
Z rozstawionych wszędzie głośników puszczasz "Ostatnia Niedziela"
Halo, wojsko? Mamy zamieszki w centrum Warszawy...

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eb8b22e1-522a-b6c1-b104-b002db6ae0ba%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] I2P and/or I2PBerry as an netowrking qube

2016-12-03 Thread Pawel Debski
Folks,

did anyone of you tried I2P as a gateway instead of sys-net qube to route all 
traffic from certain AppVMs?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7c09d87e-9b20-41e7-85b8-b2d767b52399%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Thinkpad T460

2016-12-03 Thread Jan Betlach
On Saturday, December 3, 2016 at 8:41:49 PM UTC+1, Bernd Lorenzen wrote:
> Hello,
> 
> my Question is how i set the charge thresholds for my Lenovo Thinkpad T460.
> 
> I have installed the following packages tlp, tlp-rdw,tp-smapi-dkms and 
> acpi-call-dkms in both fedora aind debian template. Afterwards i changed 
> the thresholds in the config file /etc/default/tlp in both templates and 
> in dom0. But it doesn`t work. Do you know a workaround for this. I hope 
> did not forget some useful information for you.
> 
> Kind regards
> 
> 
> Bernd Lorenzen


Has the service been started?
# systemctl status tlp

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/66729a6a-2e8f-4ceb-be9a-9ba56cde5bda%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HDMI not working on my Dell Inspiron 17 7999

2016-12-03 Thread Jonathann Giroux



Hello guys, I just install Qubes on my Dell Inspiron 17 7999 and it's working 
greatexcept for te hdmi port. My second screen in hdmi is not working at all. 
Any ideas why? Thanks. 😊

Sent from Samsung tablet

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd3vs8imygn3qjajin6dxse9.1480796322284%40email.android.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Yubikeys in Qubes

2016-12-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Dec 03, 2016 at 11:24:28AM -0800, Micah Lee wrote:
> On 12/02/2016 06:50 PM, Leeteqxv wrote:
> > Is it not possible to configure this to having the Yubikey require the
> > person to press the key button manually/physically?
> > If not, such a limitation would lie in the software rather than in the
> > Yubikey, I assume, since the Yubikey support Challenge-Response and such
> > already? If possible, it is definetely preferable to work around
> > potential PIN theft and subsequent hidden (mis)use by requiring a
> > manual/physical action.
> 
> The problem here is that products that can be used as OpenPGP smart
> cards, like the Yubikey, can't just make arbitrary features like
> challenge-response for secret key operations. They need to implement the
> OpenPGP specification so that all software that works with them (GnuPG,
> OpenKeychain, others) can implement the same spec, and everything can just.
> 
> The spec currently supports requiring a PIN to do secret key operations,
> with rate limiting that makes too many invalid PIN guesses locks the
> card. In order to support challenge-response as well I think the OpenPGP
> smart card spec would need to get updated, which is a much longer
> process that just writing some new software.

Some kind of OTP probably could be framed into PIN. Anyway, this does
not solve much bigger problem, that is no protection of the data itself
- - USB VM can intercept the communication and replace/capture what you
want to sign/decrypt.
If there is some protocol to use smartcard over the network, such
protocol probably handle this problem. Not sure if it's possible to use
it here, especially when limited to what Yubikey firmware supports...

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYQyEoAAoJENuP0xzK19csNroH/1QEeJN2MwHbBTo+g3JlNsNZ
MXs22kmz41evg7lKwwoAuA8/XihRppv0EBPUyEMMi1JmlGgd4Phlafok3rFmILnd
cRG3NsV6Wv69/9aSbxfId6NEEjO5toKdt4DLhR5nVwVamFOCqgVGLxchGzRMMN8E
JrhJ1mxn3w12AufFvtMF7jKXNIiY3REf6kVBjqUcsJmwnW1Tt4WJ+KS8IShCEaJm
i7IfWggxlzKgo4rMXdK22m7G9uvncG6TAMZuonHu92pzuLDoU40iPdpEUmQJyKtF
pibJExdgXHkJicl3j5kwHV0JOyNzgCQkId4fhsVxvexYeuvh9nRaUKwZN+wiAsw=
=Nu+O
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161203194648.GZ2130%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Thinkpad T460

2016-12-03 Thread Bernd Lorenzen

Hello,

my Question is how i set the charge thresholds for my Lenovo Thinkpad T460.

I have installed the following packages tlp, tlp-rdw,tp-smapi-dkms and 
acpi-call-dkms in both fedora aind debian template. Afterwards i changed 
the thresholds in the config file /etc/default/tlp in both templates and 
in dom0. But it doesn`t work. Do you know a workaround for this. I hope 
did not forget some useful information for you.


Kind regards


Bernd Lorenzen



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/95b8c5f8-8b7c-c02b-3bf5-9179f3b14dee%40gmx.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Yubikeys in Qubes

2016-12-03 Thread Micah Lee
On 12/02/2016 06:50 PM, Leeteqxv wrote:
> Is it not possible to configure this to having the Yubikey require the
> person to press the key button manually/physically?
> If not, such a limitation would lie in the software rather than in the
> Yubikey, I assume, since the Yubikey support Challenge-Response and such
> already? If possible, it is definetely preferable to work around
> potential PIN theft and subsequent hidden (mis)use by requiring a
> manual/physical action.

The problem here is that products that can be used as OpenPGP smart
cards, like the Yubikey, can't just make arbitrary features like
challenge-response for secret key operations. They need to implement the
OpenPGP specification so that all software that works with them (GnuPG,
OpenKeychain, others) can implement the same spec, and everything can just.

The spec currently supports requiring a PIN to do secret key operations,
with rate limiting that makes too many invalid PIN guesses locks the
card. In order to support challenge-response as well I think the OpenPGP
smart card spec would need to get updated, which is a much longer
process that just writing some new software.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7b55411b-5d84-6919-3e6e-1be2b8e429a7%40micahflee.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Benjamin Richter
Am Samstag, 3. Dezember 2016 16:32:37 UTC+1 schrieb Grzesiek Chodzicki:
> W dniu sobota, 3 grudnia 2016 16:13:41 UTC+1 użytkownik Benjamin Richter 
> napisał:
> > Here I attached the PCI devices of the docking station to sys-net an 
> > rebooted for good measure.
> > As you can see, the bridges show up, but the usb controller and the usb 
> > devices do not, I have not Idea why.
> > 
> > [user@sys-net ~]$ sudo lspci
> > 00:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> > Ridge 2C 2015]
> > 00:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> > Ridge 2C 2015]
> > 00:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> > Ridge 2C 2015]
> > 00:03.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> > Ridge 2C 2015]
> > 00:05.0 Network controller: Intel Corporation Wireless 7265 (rev 59)
> > [user@sys-net ~]$ sudo lsusb
> > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> 
> Qubes disables hotplugging Thunderbolt/Firewire/Express Card devices for 
> security reasons ergo this is not a bug it's a feature. Dunno how to disable 
> that.

OK. But this should not prevent the device from being attached to a VM, I think.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/29f4057c-9b09-46bd-ba56-4df48bffdc61%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Rethinking my security requirements

2016-12-03 Thread Todd Lasman
Currently, I'm booting my system using an anti-evil maid USB stick, but
frankly, this is becoming an annoyance. My security needs aren't that
great, and my risk for such an attack is quite low. I'm considering
getting rid of AEM, and either booting off a USB stick, or just putting
the entire system on my hard drive (which would make the Xen updates
much easier). To that end, I wanted to get an idea from the group how
you're managing your system. Specifically:

1. Are you using a laptop or desktop?
2. How much at risk is your system/data? How would you rate your threat
model?
3. Do you keep /boot on the hard drive, or do you boot from a USB or
other external device?
4. Do you use anti-evil maid?

Thanks for helping me with this informal poll!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a223276d-562b-c6f2-e430-4d6f7b17df2b%40nowlas.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Cannot start qubes-guid

2016-12-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Dec 03, 2016 at 05:22:05PM -, ferd...@sigaint.org wrote:
> Hi
> Each time that I create a new appVM based on whonix-ws, the appVM shows a
> message "Error starting VM: Cannot start qubes-guid!", after 30 seconds
> the message leaves and all works normally. This doesn't appear with new
> appVM based on fedora or debian.
> Is it anything that can be considered normal?

Do applications in such Whonix AppVMs work anyway? How do you start the
VM - from the menu, or "start" button from Qubes Manager?
Is it fresh install, or upgraded from previous Qubes release?

Also, take a look at guid log - it's in /var/log/qubes/guid.VMNAME.log
(replace VMNAME with actual VM name) - also accessible from Qubes
Manager - right click on the VM).

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYQxXwAAoJENuP0xzK19csdf4H/Aw5RrEHoiKQdqRbIhvCdj0x
ZI180Lwt3OS31EjzNAePrjuhAEmF3cSaoPxgLK+5FnZ+ah2mN6M+YPolN2Q70JYl
Kvp8oplQWdN9FQqe4n0oC/BL5gUFoJJjZ/U8LpD9eAfUrq1urODLj/xWW8tZilg4
G8sG2dU7QpprAWHAbXil4kpsYVrSgyfXjdVLbts7wafBCIgMtnfAPQhzeKm36yZ7
fSjoLP9ICGjXBaR0QfU8eTLlltAKcx2ewQgszbk46bIgy8vnoeKtFiAbUyc8YwN2
nbuS0jCR2rII3tbEY2y8rybenka11gmG0DhmDnrNWdUbFo2NGxoDmxAeONl12Uw=
=jb4m
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161203185856.GE1145%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] console window manager

2016-12-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Dec 03, 2016 at 02:58:48AM +0300, Eva Star wrote:
> On 12/03/2016 02:50 AM, Marek Marczykowski-Górecki wrote:
> 
> > > > > > And additional question, how to get the new created window ID from 
> > > > > > qvm-run ?
> > > > > > 
> > > > > > 
> > > > > For KDE, there's kstart. For Xfce4, you'd have to install something, 
> > > > > e.g., devilspie2.
> > > > > 
> > > > I believe that some other tool available that work with Xfce4. And it's 
> > > > already available at dom0. When this user wrote about it then I check 
> > > > and it was there (at dom0 already installeted)
> > > > 
> > > 
> > > Oh, really? I would be interested in using that, as well. Please let me 
> > > know if you find it. :)
> > 
> > Is that about wmctl or xdotool?
> 
> Yes, wmctrl :) thanks :)
> It can show all windows `wmctrl 0l`, but how to get id of last window opened
> with qvm-run to move it then to the specific desktop?

I don't know. Some idea is to run wmctrl before starting an application
and after. Then compare results.

> Looks like very old tool, but hope it work. xdotool not pre-installed (maybe
> it's better?)

xdotool is different - it's more about interacting with windows (mouse,
keyboard etc) than managing windows itself - but can do that too.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYQxUSAAoJENuP0xzK19cs8m0H/06X8u2iFYgPHk2MUqG1u5+I
gH+dl46mQ8iyMHpN5hcv5BJ7Vqhv9I8ocskba93ZU300F7sVghkf950VINNWn+tv
iZQqG13bLnl7KOVGeuConZydfpucb5ES5T0oOzDbhcpqqtP86nNvScnzu6CtVz9Y
lrxmz1EsVF8qz9l5OwofH3cgGcKPm45SVR50Oj6CdbZdWi/TaTXfOuUada701CBC
lwpDKFK33MxTuQVgMBFSq/li/gDXOIQ0KcziaqfiqQsqQ6ckn+d+iSbMkCJNSlBF
J2Trqzjx0IYg5MGAkGUoIcdp9UBenWYavWIjunUnksVv5SNrVPko+2+5qa2bv58=
=8EN4
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161203185514.GD1145%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem

2016-12-03 Thread gamer.ffo via qubes-users
Am Samstag, 3. Dezember 2016 18:11:33 UTC+1 schrieb Grzesiek Chodzicki:
> W dniu sobota, 3 grudnia 2016 17:47:25 UTC+1 użytkownik 
> game...@googlemail.com napisał:
> > Am Samstag, 3. Dezember 2016 16:30:40 UTC+1 schrieb Grzesiek Chodzicki:
> > > W dniu sobota, 3 grudnia 2016 15:35:21 UTC+1 użytkownik 
> > > game...@googlemail.com napisał:
> > > > Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki:
> > > > > W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik 
> > > > > game...@googlemail.com napisał:
> > > > > > Hi,
> > > > > > for comfortable use of USB-only scanners and other devices such as 
> > > > > > this, it would be nice to have Win7 as USB-VM, e.g. have the 
> > > > > > USB-Controller-PCI-Device assigned to it to use USB-Devices from 
> > > > > > there. 
> > > > > > 
> > > > > > When i try to start Win7, this happens (see the picture 
> > > > > > https://imgur.com/a/spnRC).
> > > > > > [The german sentence in the picure is like:
> > > > > > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be 
> > > > > > reseted. No FLR, PM or Bus Reset available."]
> > > > > > I already have the PCI-Device assigned to it, original Qubes-USB-VM 
> > > > > > dont have it assigned anymore. 
> > > > > > the "strict pcireset"-qvm-prefs option is already turned on. Any 
> > > > > > suggestions to fix this?
> > > > > > Thank you.
> > > > > 
> > > > > set pci_strictreset to false and try again.
> > > > 
> > > > Wow...yeah, thank you. That was a pointless fail by me.
> > > > 
> > > > Anyway: Now, i have the problem that connected usb-devices dont show in 
> > > > windows7. At first boot after pci-passthough-change, win7 showed that 
> > > > it couldnt find any driver for the "new" usb-controller. I tried to fix 
> > > > it with Xen PV Bus-Driver, but it didnt work.
> > > 
> > > Check if You have VT-d enabled in BIOS/UEFI
> > 
> > Yes, it is. 
> > But i installed Qubes with vt-d disabled und reenabled it like it is 
> > mentioned here: https://www.qubes-os.org/doc/thinkpad-troubleshooting/
> 
> Can you paste the output of xl dmesg | grep -i vt-d ?

xl dmesg:
 Xen 4.6.3-24.fc23
(XEN) Xen version 4.6.3 (user@) (gcc (GCC) 5.3.1 20160406 (Red Hat 5.3.1-6)) 
debug=n Wed Nov 23 00:15:57 UTC 2016
(XEN) Latest ChangeSet: 
(XEN) Bootloader: GRUB 2.02~beta2
(XEN) Command line: placeholder console=none dom0_mem=min:1024M 
dom0_mem=max:4096M iommu=no-igfx
(XEN) Video information:
(XEN)  VGA is text mode 80x25, font 8x16
(XEN)  VBE/DDC methods: V2; EDID transfer time: 1 seconds
(XEN) Disc information:
(XEN)  Found 1 MBR signatures
(XEN)  Found 1 EDD information structures
(XEN) Xen-e820 RAM map:
(XEN)   - 0009d000 (usable)
(XEN)  0009d000 - 000a (reserved)
(XEN)  000e - 0010 (reserved)
(XEN)  0010 - 99bb9000 (usable)
(XEN)  99bb9000 - aca89000 (reserved)
(XEN)  aca89000 - aca8a000 (ACPI NVS)
(XEN)  aca8a000 - b7f7f000 (reserved)
(XEN)  b7f7f000 - b7fcf000 (ACPI NVS)
(XEN)  b7fcf000 - b7fff000 (ACPI data)
(XEN)  b7fff000 - b810 (reserved)
(XEN)  b860 - bc80 (reserved)
(XEN)  f800 - fc00 (reserved)
(XEN)  fd00 - fe80 (reserved)
(XEN)  fec0 - fec01000 (reserved)
(XEN)  fed0 - fed01000 (reserved)
(XEN)  fed1 - fed1a000 (reserved)
(XEN)  fed84000 - fed85000 (reserved)
(XEN)  fee0 - fee01000 (reserved)
(XEN)  ff80 - 0001 (reserved)
(XEN)  0001 - 00024280 (usable)
(XEN) ACPI: RSDP 000F0120, 0024 (r2 LENOVO)
(XEN) ACPI: XSDT B7FD0188, 00D4 (r1 LENOVO TP-N1C  0 PTEC2)
(XEN) ACPI: FACP B7FF4000, 00F4 (r5 LENOVO TP-N1C   1150 PTEC2)
(XEN) ACPI: DSDT B7FDD000, 12331 (r2 LENOVO TP-N1C   1150 INTL 20141107)
(XEN) ACPI: FACS B7FAA000, 0040
(XEN) ACPI: TCPA B7FFC000, 0032 (r2 LENOVO TP-N1C  2 PTEC2)
(XEN) ACPI: SSDT B7FFB000, 03A2 (r2 LENOVO TcgTable 1000 INTL 20141107)
(XEN) ACPI: UEFI B7FC1000, 0042 (r1 LENOVO TP-N1C   1150 PTEC2)
(XEN) ACPI: SSDT B7FF6000, 4E0A (r2 LENOVO  SaSsdt  3000 INTL 20141107)
(XEN) ACPI: SSDT B7FF5000, 05C5 (r2 LENOVO PerfTune 1000 INTL 20141107)
(XEN) ACPI: ECDT B7FF3000, 0052 (r1 LENOVO TP-N1C   1150 PTEC2)
(XEN) ACPI: HPET B7FF2000, 0038 (r1 LENOVO TP-N1C   1150 PTEC2)
(XEN) ACPI: APIC B7FF1000, 00BC (r3 LENOVO TP-N1C   1150 PTEC2)
(XEN) ACPI: MCFG B7FF, 003C (r1 LENOVO TP-N1C   1150 PTEC2)
(XEN) ACPI: SSDT B7FDB000, 18D2 (r1 LENOVO SataAhci 1000 INTL 20141107)
(XEN) ACPI: DBGP B7FDA000, 0034 (r1 LENOVO TP-N1C   1150 PTEC2)
(XEN) ACPI: DBG2 B7FD9000, 0054 (r0 LENOVO TP-N1C   1150 PTEC2)
(XEN) ACPI: BOOT B7FD8000, 0028 (r1 LENOVO TP-N1C   115

[qubes-users] Cannot start qubes-guid

2016-12-03 Thread ferddej
Hi
Each time that I create a new appVM based on whonix-ws, the appVM shows a
message "Error starting VM: Cannot start qubes-guid!", after 30 seconds
the message leaves and all works normally. This doesn't appear with new
appVM based on fedora or debian.
Is it anything that can be considered normal?

Thank you

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe39cce66d08fe93ecb8be0afe338f4e.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem

2016-12-03 Thread Grzesiek Chodzicki
W dniu sobota, 3 grudnia 2016 17:47:25 UTC+1 użytkownik game...@googlemail.com 
napisał:
> Am Samstag, 3. Dezember 2016 16:30:40 UTC+1 schrieb Grzesiek Chodzicki:
> > W dniu sobota, 3 grudnia 2016 15:35:21 UTC+1 użytkownik 
> > game...@googlemail.com napisał:
> > > Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki:
> > > > W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik 
> > > > game...@googlemail.com napisał:
> > > > > Hi,
> > > > > for comfortable use of USB-only scanners and other devices such as 
> > > > > this, it would be nice to have Win7 as USB-VM, e.g. have the 
> > > > > USB-Controller-PCI-Device assigned to it to use USB-Devices from 
> > > > > there. 
> > > > > 
> > > > > When i try to start Win7, this happens (see the picture 
> > > > > https://imgur.com/a/spnRC).
> > > > > [The german sentence in the picure is like:
> > > > > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be 
> > > > > reseted. No FLR, PM or Bus Reset available."]
> > > > > I already have the PCI-Device assigned to it, original Qubes-USB-VM 
> > > > > dont have it assigned anymore. 
> > > > > the "strict pcireset"-qvm-prefs option is already turned on. Any 
> > > > > suggestions to fix this?
> > > > > Thank you.
> > > > 
> > > > set pci_strictreset to false and try again.
> > > 
> > > Wow...yeah, thank you. That was a pointless fail by me.
> > > 
> > > Anyway: Now, i have the problem that connected usb-devices dont show in 
> > > windows7. At first boot after pci-passthough-change, win7 showed that it 
> > > couldnt find any driver for the "new" usb-controller. I tried to fix it 
> > > with Xen PV Bus-Driver, but it didnt work.
> > 
> > Check if You have VT-d enabled in BIOS/UEFI
> 
> Yes, it is. 
> But i installed Qubes with vt-d disabled und reenabled it like it is 
> mentioned here: https://www.qubes-os.org/doc/thinkpad-troubleshooting/

Can you paste the output of xl dmesg | grep -i vt-d ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe9d4843-1c39-4d4f-899b-66a2e96e1a51%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem

2016-12-03 Thread gamer.ffo via qubes-users
Am Samstag, 3. Dezember 2016 16:30:40 UTC+1 schrieb Grzesiek Chodzicki:
> W dniu sobota, 3 grudnia 2016 15:35:21 UTC+1 użytkownik 
> game...@googlemail.com napisał:
> > Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki:
> > > W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik 
> > > game...@googlemail.com napisał:
> > > > Hi,
> > > > for comfortable use of USB-only scanners and other devices such as 
> > > > this, it would be nice to have Win7 as USB-VM, e.g. have the 
> > > > USB-Controller-PCI-Device assigned to it to use USB-Devices from there. 
> > > > 
> > > > When i try to start Win7, this happens (see the picture 
> > > > https://imgur.com/a/spnRC).
> > > > [The german sentence in the picure is like:
> > > > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. 
> > > > No FLR, PM or Bus Reset available."]
> > > > I already have the PCI-Device assigned to it, original Qubes-USB-VM 
> > > > dont have it assigned anymore. 
> > > > the "strict pcireset"-qvm-prefs option is already turned on. Any 
> > > > suggestions to fix this?
> > > > Thank you.
> > > 
> > > set pci_strictreset to false and try again.
> > 
> > Wow...yeah, thank you. That was a pointless fail by me.
> > 
> > Anyway: Now, i have the problem that connected usb-devices dont show in 
> > windows7. At first boot after pci-passthough-change, win7 showed that it 
> > couldnt find any driver for the "new" usb-controller. I tried to fix it 
> > with Xen PV Bus-Driver, but it didnt work.
> 
> Check if You have VT-d enabled in BIOS/UEFI

Yes, it is. 
But i installed Qubes with vt-d disabled und reenabled it like it is mentioned 
here: https://www.qubes-os.org/doc/thinkpad-troubleshooting/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3e216db3-81de-414a-95df-b3c84d41b3c1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: First impressions

2016-12-03 Thread raahelps
On Saturday, December 3, 2016 at 8:07:58 AM UTC-5, Ray Brainer wrote:
> This is my first week of usage and impressions about the Qubes.
> The idea of isolation seemed wonderful before using it.
> Now I find very unhandy what I deal with in Qubes.
> 
> 1) No way of desktop sharing, though I need it very much. I read some ideas 
> on the point here  
> https://groups.google.com/forum/#!msg/qubes-users/-JEfgOF-TaI/kIU_JCmUCAAJ
> It sounds almost impossible. I use Zoom and Viber to share screen. Have no 
> idea of screen forwarding to a VM.
> 
> 2) Cross-clipboard operations don't work by any means. Cross-usage of 
> applications, user-generated shortcuts to apps - everything seems a problem.
> 3) Appear empty windows I've never seen before in usual apps like Skype, 
> qbittorrent, VLC etc.
> 4) No free space for software and libraries. There is a huge risk of loosing 
> data when resizing images. I lost it twice, though I repeated every step from 
> the guide.
> 5) Templates are based on pretty specific distros like Fedora and Debian. It 
> takes time for Arch and Windows templates to create.
> 6) It is not very easy to direct webcam on a particular VM.
> 
> Again, the idea is excellent. If there is a way to save my time on points 1-3 
> I would be thankful.

I don't know anything about screen sharing.  But what do you mean cross 
clipboard operations don't work? 
cross usage applications sounds like defeats purpose of isolation but I might 
be misunderstanding you. 

I've never seen empty windows appearing in vlc.  weird.

In KDE it was much easier to make shortcuts to launch specific apps right in 
the menu.  XFCE unfortunately does not make this easy anymore.  You actually 
have to edit a cfg file to do it, but its possible.

I never lost any data increasing a vm size.

I do have a win7 vm, and it was indeed little tricky to install. Took me two 
tries to get windows tools working.but Linux is linux to me though.  I use 
debian as well as fedora simply for packages available in debian not in fedora. 
 But those two distros pretty much have everything covered for me in linux 
world and imo and are the two best regarding general security.  Arch was always 
my distro of choice for traditional vms cause its very minimal by default,  but 
I have no need for it in qubes.

Yes you can only direct webcam to appvm with terminal command for now.  I'm 
sure they will include a way in qubes-manager eventually.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d301fb8e-0d30-4883-8c70-9505e28c8d17%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Trouble reading data CD under Qubes

2016-12-03 Thread raahelps
On Saturday, December 3, 2016 at 7:33:29 AM UTC-5, Pawel Debski wrote:
> W dniu sobota, 3 grudnia 2016 12:53:02 UTC+1 użytkownik Grzesiek Chodzicki 
> napisał:
> > W dniu sobota, 3 grudnia 2016 12:21:49 UTC+1 użytkownik Pawel Debski 
> > napisał:
> > > Folks,
> > > 
> > > I have a PC with two SATA controllers: primary master holds my SDD with 
> > > Qubes, while secondary master has CD drive attached.
> > > 
> > > When I insert a data CD it gets mounted by dom0 and the files are 
> > > accessible. I do not want to open these files in dom0 however. So in the 
> > > VM Manager I right click my favourite perssonal-full-sw appVM that I 
> > > created previously and select:
> > > 
> > > Attach/detach block devices -> Attach dom0:sr0
> > > 
> > > and nothing happens. 
> > > 
> > > Even more: CD content is still visible in dom0 and /dev/sr0 is still 
> > > mounted in /run/media/pdebski/CDTITLE
> > > 
> > > How can I better diagnose the problem?
> > 
> > Try using qvm-block -l and then attach the device using qvm-block. If that 
> > fails, you can attach the entire sata controller (and not just the drive)
> 
> Here is the progress:
> 
> (in dom0)
> qvm-block -l
> dom0:sr0 ... attached to fedora-full-sw as xvdi
> 
> now in fedora-full-sw Konsole I need
> 
> [user@fedora-usb ~]$ su - root
> [root@fedora-usb ~]# mkdir CD
> [root@fedora-usb ~]# mount /dev/xvdi CD
> [root@fedora-usb ~]# df
> Filesystem 1K-blocksUsed Available Use% Mounted on
> ...
> /dev/xvdi   80388038 0 100% /root/CD
> 
> and voilà, I can read the files.
> 
> HOWEVER: can you imagine a normal user doing this?
> (I can't, she/he would kill me with his laughter ;-)
> 
> How can I make Fedora read the CD and mount it automagically so all is 
> visible in AppVM File Manager just after inserting CD?

cdroms are pretty outdated now.  I don't even have one on my latest box.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f0beec4-280c-4475-9fef-73ff4cba1028%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: anyone luck mounting an iphone 7?

2016-12-03 Thread raahelps
well i can get it working everytime on baremetal ubuntu now.  What I do is set 
lock to 5 mins.  idevicepair pair,then leave device connected and log out 
and in.  then  dcim folder then appears in file manager.  works everytime.   
Now to figure out how I reproduced this in qubes debian lol.

Unfortunately until they update libimobiledevice you can only back up camera 
pictures + videos, and texted pics.   Can't back up music or downloads.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ab2712d-8a24-44dd-bd0e-866566e5409a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Grzesiek Chodzicki
W dniu sobota, 3 grudnia 2016 16:13:41 UTC+1 użytkownik Benjamin Richter 
napisał:
> Here I attached the PCI devices of the docking station to sys-net an rebooted 
> for good measure.
> As you can see, the bridges show up, but the usb controller and the usb 
> devices do not, I have not Idea why.
> 
> [user@sys-net ~]$ sudo lspci
> 00:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> Ridge 2C 2015]
> 00:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> Ridge 2C 2015]
> 00:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> Ridge 2C 2015]
> 00:03.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
> Ridge 2C 2015]
> 00:05.0 Network controller: Intel Corporation Wireless 7265 (rev 59)
> [user@sys-net ~]$ sudo lsusb
> Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

Qubes disables hotplugging Thunderbolt/Firewire/Express Card devices for 
security reasons ergo this is not a bug it's a feature. Dunno how to disable 
that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/80ff8ba5-e51b-4e8c-8154-d0c1791ad4d8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem

2016-12-03 Thread Grzesiek Chodzicki
W dniu sobota, 3 grudnia 2016 15:35:21 UTC+1 użytkownik game...@googlemail.com 
napisał:
> Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki:
> > W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik 
> > game...@googlemail.com napisał:
> > > Hi,
> > > for comfortable use of USB-only scanners and other devices such as this, 
> > > it would be nice to have Win7 as USB-VM, e.g. have the 
> > > USB-Controller-PCI-Device assigned to it to use USB-Devices from there. 
> > > 
> > > When i try to start Win7, this happens (see the picture 
> > > https://imgur.com/a/spnRC).
> > > [The german sentence in the picure is like:
> > > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No 
> > > FLR, PM or Bus Reset available."]
> > > I already have the PCI-Device assigned to it, original Qubes-USB-VM dont 
> > > have it assigned anymore. 
> > > the "strict pcireset"-qvm-prefs option is already turned on. Any 
> > > suggestions to fix this?
> > > Thank you.
> > 
> > set pci_strictreset to false and try again.
> 
> Wow...yeah, thank you. That was a pointless fail by me.
> 
> Anyway: Now, i have the problem that connected usb-devices dont show in 
> windows7. At first boot after pci-passthough-change, win7 showed that it 
> couldnt find any driver for the "new" usb-controller. I tried to fix it with 
> Xen PV Bus-Driver, but it didnt work.

Check if You have VT-d enabled in BIOS/UEFI

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0fb27c79-895f-4f80-ac1f-299b554aa43d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qga.exe 100% CPU load (Windows Tools)

2016-12-03 Thread Marc de Bruin
Hi,

Occasionally, the Qubes GUI Agent (qga.exe) process turns into a CPU-hog for no 
apparent reason. The process just turns into a flatliner, eating up one 
complete core, which turns the Windows 7 machine into a very slow beast. 
Nothing is crashing tho. Power-off/power-on the HVM seems to fix it.

AFAIK, I’m using the latest version of the Windows Integration Tools on Qubes 
R3.2. 

Where should I start looking for problems? Any log-files that are recommended 
to look at?

Greetz,
Marc.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/A72E9C8F-404F-4F9E-9C36-B1B3291D8C53%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Benjamin Richter
Here I attached the PCI devices of the docking station to sys-net an rebooted 
for good measure.
As you can see, the bridges show up, but the usb controller and the usb devices 
do not, I have not Idea why.

[user@sys-net ~]$ sudo lspci
00:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
Ridge 2C 2015]
00:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
Ridge 2C 2015]
00:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
Ridge 2C 2015]
00:03.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
Ridge 2C 2015]
00:05.0 Network controller: Intel Corporation Wireless 7265 (rev 59)
[user@sys-net ~]$ sudo lsusb
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3cba92f5-4bb5-483e-b605-a64f11df5639%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Benjamin Richter
Here a log of the docking station attached to dom0. This only works, if the 
station is attached on boot, hotplugging does not seem to work. If I attach the 
station to the running system, the PCI devices show up, but the USB devices 
don't.

sudo lspci
00:00.0 Host bridge: Intel Corporation Skylake Host Bridge/DRAM Registers (rev 
08)
00:02.0 VGA compatible controller: Intel Corporation HD Graphics 520 (rev 07)
00:04.0 Signal processing controller: Intel Corporation Skylake Processor 
Thermal Subsystem (rev 08)
00:05.0 Multimedia controller: Intel Corporation Skylake Imaging Unit (rev 01)
00:13.0 Non-VGA unclassified device: Intel Corporation Device 9d35 (rev 21)
00:14.0 USB controller: Intel Corporation Sunrise Point-LP USB 3.0 xHCI 
Controller (rev 21)
00:14.2 Signal processing controller: Intel Corporation Sunrise Point-LP 
Thermal subsystem (rev 21)
00:14.3 Multimedia controller: Intel Corporation Device 9d32 (rev 01)
00:15.0 Signal processing controller: Intel Corporation Sunrise Point-LP Serial 
IO I2C Controller #0 (rev 21)
00:15.1 Signal processing controller: Intel Corporation Sunrise Point-LP Serial 
IO I2C Controller #1 (rev 21)
00:15.2 Signal processing controller: Intel Corporation Sunrise Point-LP Serial 
IO I2C Controller #2 (rev 21)
00:16.0 Communication controller: Intel Corporation Sunrise Point-LP CSME HECI 
#1 (rev 21)
00:17.0 SATA controller: Intel Corporation Sunrise Point-LP SATA Controller 
[AHCI mode] (rev 21)
00:1c.0 PCI bridge: Intel Corporation Device 9d10 (rev f1)
00:1d.0 PCI bridge: Intel Corporation Device 9d1a (rev f1)
00:1f.0 ISA bridge: Intel Corporation Sunrise Point-LP LPC Controller (rev 21)
00:1f.2 Memory controller: Intel Corporation Sunrise Point-LP PMC (rev 21)
00:1f.3 Audio device: Intel Corporation Sunrise Point-LP HD Audio (rev 21)
00:1f.4 SMBus: Intel Corporation Sunrise Point-LP SMBus (rev 21)
01:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
Ridge 2C 2015]
02:00.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
Ridge 2C 2015]
02:01.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
Ridge 2C 2015]
02:02.0 PCI bridge: Intel Corporation DSL6340 Thunderbolt 3 Bridge [Alpine 
Ridge 2C 2015]
05:00.0 USB controller: Intel Corporation DSL6340 USB 3.1 Controller [Alpine 
Ridge]
3a:00.0 Network controller: Intel Corporation Wireless 7265 (rev 59)
sudo lsusb
Bus 004 Device 005: ID 0bda:8153 Realtek Semiconductor Corp. 
Bus 004 Device 003: ID 05e3:0620 Genesys Logic, Inc. 
Bus 004 Device 002: ID 05e3:0620 Genesys Logic, Inc. 
Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 003 Device 004: ID 046d:c51e Logitech, Inc. 
Bus 003 Device 007: ID 1e4e:0898 Cubeternet 
Bus 003 Device 006: ID 0572:1703 Conexant Systems (Rockwell), Inc. 
Bus 003 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
Bus 003 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 004: ID 0b05:1838 ASUSTek Computer, Inc. 
Bus 001 Device 003: ID 8087:0a2a Intel Corp. 
Bus 001 Device 002: ID 04f2:b5b1 Chicony Electronics Co., Ltd 
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7f680038-25b4-42b2-825b-18097cda56ca%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-03 Thread Benjamin Richter
Hi,

my earlier post seems to have gotten lost somewhere, so here again, in more 
detail.
I've got an Asus Transformer 3 Pro and installed Qubes 3.2 on it.

It works surprisingly well. Network, USB, display, touchscreen, keyboard and 
touchpad are working right away.

It's troublesome the tablet has no Ethernet and only one USB controller, which 
means I cannot simply use a USB-Ethernet device.

I haven't tried bluetooth yet.

I've also got the Thunderbolt docking station, which contains a HDMI and VGA 
port, Ethernet, two USB 3 and one USB-C Ports, a SD card reader and audio ports 
It also charges the tablet while leaving a USB-C port available.

Unfortunately, I have not been able to use the docks USB controller inside a 
VM. I can attach the controller, but the devices (like the integrated ethernet 
or external USB devices) never show up in the VM. I'll post some logs showing 
this later.

So far the short report on the Transformer 3.

Kind regards,
Benjamin

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/de9707da-fc6a-49e7-8449-4d0616365185%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-ASUSTeK_COMPUTER_INC_-T303UA-20161203-131517.yml
Description: Binary data


Qubes-HCL-ASUSTeK_COMPUTER_INC_-T303UA-20161203-131517.cpio.gz
Description: Binary data


[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem

2016-12-03 Thread gamer.ffo via qubes-users
Am Samstag, 3. Dezember 2016 12:54:04 UTC+1 schrieb Grzesiek Chodzicki:
> W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik 
> game...@googlemail.com napisał:
> > Hi,
> > for comfortable use of USB-only scanners and other devices such as this, it 
> > would be nice to have Win7 as USB-VM, e.g. have the 
> > USB-Controller-PCI-Device assigned to it to use USB-Devices from there. 
> > 
> > When i try to start Win7, this happens (see the picture 
> > https://imgur.com/a/spnRC).
> > [The german sentence in the picure is like:
> > "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No 
> > FLR, PM or Bus Reset available."]
> > I already have the PCI-Device assigned to it, original Qubes-USB-VM dont 
> > have it assigned anymore. 
> > the "strict pcireset"-qvm-prefs option is already turned on. Any 
> > suggestions to fix this?
> > Thank you.
> 
> set pci_strictreset to false and try again.

Wow...yeah, thank you. That was a pointless fail by me.

Anyway: Now, i have the problem that connected usb-devices dont show in 
windows7. At first boot after pci-passthough-change, win7 showed that it 
couldnt find any driver for the "new" usb-controller. I tried to fix it with 
Xen PV Bus-Driver, but it didnt work.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a90690fb-2592-4a3e-8574-102f82730b4b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [qubes-devel] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts

2016-12-03 Thread Kopimi Security
On Saturday, December 3, 2016 at 12:13:35 AM UTC+1, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 12/02/16 11:17, Kopimi Security wrote:
> > On Thursday, December 1, 2016 at 12:56:11 AM UTC+1, Andrew David Wong wrote:
> >> Unfortunately, the financial necessity of shifting our priorities to 
> >> commercial
> >> clients will mean that we have less time to work on features that benefit 
> >> the
> >> wider, security-minded open source community, which has been our focus for 
> >> the
> >> past seven years.  This deeply saddens us. (We all use Qubes on our 
> >> personal
> >> computers too!) However, the reality is that ITL can't afford to sustain 
> >> the
> >> open source development of Qubes for much longer. We're running out of 
> >> time.
> >>
> >> In an attempt to keep the open source development of Qubes going, we've 
> >> teamed
> >> up with Open Collective [07], which makes it easier to donate to the Qubes
> >> project.  Now, in addition to our Bitcoin fund [08], we can also accept
> >> donations via credit card. ITL will not benefit from of any of the money 
> >> donated
> >> through Open Collective. Instead, the funds will be paid directly to 
> >> individual
> >> developers who have been hired to work on the open source edition of Qubes.
> > 
> > I'm excited about this, and wish to support Qubes.
> > My first thoughts are "How can Qubes reach a broader community", and "Can 
> > the HOWTO's be made more approachable?".
> > For example, the section 'assigning-devices' on the /doc/, didn't get into 
> > how to actually use a mouse with a sys-usb qube, before at the very end.
> > And there, the way it was written gave the impression of giving the answer 
> > almost as an afterthought, as if it should have been obvious to everybody.
> > As such, it reads as it was written by somebody "too close to the problem".
> > Somebody being so familiar with the system that outsiders' inability to 
> > grasp the "obvious", escapes him. Or her.
> > This is not a unique issue for ITL though, the same problem pops up 
> > everywhere when highly technical minded people try to convey something to 
> > people who just wants to be *users*!
> > 
> > So that's what I'm thinking, maybe it would be good for the 
> > "evangelization" of Qubes to make some very simple, brief, and to-the-point 
> > videos and howto's?
> > 
> 
> Yes, certainly. Would you be willing to help us with that? :)
> 

Absolutely!
Would it be okay if I started with some of the /doc/-articles?
I've noticed that some of them could benefit from an update, as an example the 
one on Kali (https://www.qubes-os.org/doc/pentesting/kali/).

Please let me know if this is something that I could help out with.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cc29f7a9-af14-460b-94d1-de12c1bec0eb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes and HiDPI

2016-12-03 Thread Marc de Bruin
Op 2 dec. 2016, om 03:19 heeft Jean-Philippe Ouellet  het volgende 
geschreven:
> 
> On Thu, Dec 1, 2016 at 6:25 PM, pixel fairy  wrote:
>> On Thursday, December 1, 2016 at 2:58:21 PM UTC-5, Marc de Bruin wrote:
>> 
>>> Is there a way to get around this? Doesn't the Qubes VM Manager “window” 
>>> proportionally scale itself related to the occupied pixels of the text due 
>>> to the font? Or am I missing something?
>>> 
>> 
>> Im missing something here, why not just set your screen res in dom0 to 
>> 1920x1080 or whatever you find comfortable?
> 
> FWIW this is what I have done, and I don't mind it.
> 

I will do the same, no problem. I just couldn’t believe it didn’t rescale 
proportionally. It is the first thing you learn when programming GUIs I guess? 
;-) Nevermind. Qubes rulezzz. With what will it be replaced in Qubes 4? 

Thanks,

Greetz,
Marc.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39E48086-07F5-4807-8A32-E4084700E5CA%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Trouble reading data CD under Qubes

2016-12-03 Thread Grzesiek Chodzicki
W dniu sobota, 3 grudnia 2016 13:33:29 UTC+1 użytkownik Pawel Debski napisał:
> W dniu sobota, 3 grudnia 2016 12:53:02 UTC+1 użytkownik Grzesiek Chodzicki 
> napisał:
> > W dniu sobota, 3 grudnia 2016 12:21:49 UTC+1 użytkownik Pawel Debski 
> > napisał:
> > > Folks,
> > > 
> > > I have a PC with two SATA controllers: primary master holds my SDD with 
> > > Qubes, while secondary master has CD drive attached.
> > > 
> > > When I insert a data CD it gets mounted by dom0 and the files are 
> > > accessible. I do not want to open these files in dom0 however. So in the 
> > > VM Manager I right click my favourite perssonal-full-sw appVM that I 
> > > created previously and select:
> > > 
> > > Attach/detach block devices -> Attach dom0:sr0
> > > 
> > > and nothing happens. 
> > > 
> > > Even more: CD content is still visible in dom0 and /dev/sr0 is still 
> > > mounted in /run/media/pdebski/CDTITLE
> > > 
> > > How can I better diagnose the problem?
> > 
> > Try using qvm-block -l and then attach the device using qvm-block. If that 
> > fails, you can attach the entire sata controller (and not just the drive)
> 
> Here is the progress:
> 
> (in dom0)
> qvm-block -l
> dom0:sr0 ... attached to fedora-full-sw as xvdi
> 
> now in fedora-full-sw Konsole I need
> 
> [user@fedora-usb ~]$ su - root
> [root@fedora-usb ~]# mkdir CD
> [root@fedora-usb ~]# mount /dev/xvdi CD
> [root@fedora-usb ~]# df
> Filesystem 1K-blocksUsed Available Use% Mounted on
> ...
> /dev/xvdi   80388038 0 100% /root/CD
> 
> and voilà, I can read the files.
> 
> HOWEVER: can you imagine a normal user doing this?
> (I can't, she/he would kill me with his laughter ;-)
> 
> How can I make Fedora read the CD and mount it automagically so all is 
> visible in AppVM File Manager just after inserting CD?

The easiest (although not really obvious) way would be to attach the entire 
SATA controller to the VM. Works for USB, should work for SATA too.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d255e13c-317b-4ff2-a020-adc4455b4180%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL – Asus UX303LNB "Zenbook", and more

2016-12-03 Thread rob_66
Hello everybody. Just some setup information.

As a quite unexperienced, unprofessional linux user (18 months) I
switched over to wonderful Qubes about a week ago. This is hard work, to
be honest, but I like it.

A very similar machine is already on the list: https://www.qubes-os.org/hcl/

Everything seems to work fine – no extreme-tuning yet, intense video
testing, very special key combinations etc.

Network printer Samsung SCX-4500 (printing via disposable VM), scanning
not tested
Asus wifi router RT-AC56U, Merlin, OpenVPN
Second display 21,5-inch Full HD (Mini DisplayPort)
Mouse and USB keyboard – I know ... (via sys-usb)

Minor issue: NetworkManager doesn't remember wifi password. Certainly my
fault somewhere.

MAC address anonymizing (macchanger, scripts, fedora 24, following
https://www.qubes-os.org/doc/anonymizing-your-mac-address/) killed
networking completely. Resetting the router was painful. Project
discontinued.

And here are the VMs and Templates, WIP, all set up following
https://www.qubes-os.org/doc/:

sys-net : fed-24-mini-clone
sys-firewall : fed-24-mini-clone
sys-usb : fedora-24 as NetVM (will be switched over to fed-24-mini-clone)
internet : fedora-24
vault : fedora-24 : no NetVM, of course
personal : fedora-24 : no NetVM
work : fedora-24 : no NetVM
mail (with Split GPG): fedora-24 : just contacts mail provider
banking : fedora-24 : just contacts bank
fedora-24-disposable-dvm : fedora-24-disposable
offline-bitcoin : debian-8-backports
watching-bitcoin : debian-8-backports

Send all your Bitcoins. Now!;) https://www.qubes-os.org/donate/

Best,

rob

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o1uf38%24gu5%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-ASUSTeK_COMPUTER_INC_-UX303LNB-20161203-021814.yml
Description: application/yaml


[qubes-users] First impressions

2016-12-03 Thread Ray Brainer
This is my first week of usage and impressions about the Qubes.
The idea of isolation seemed wonderful before using it.
Now I find very unhandy what I deal with in Qubes.

1) No way of desktop sharing, though I need it very much. I read some ideas on 
the point here  
https://groups.google.com/forum/#!msg/qubes-users/-JEfgOF-TaI/kIU_JCmUCAAJ
It sounds almost impossible. I use Zoom and Viber to share screen. Have no idea 
of screen forwarding to a VM.

2) Cross-clipboard operations don't work by any means. Cross-usage of 
applications, user-generated shortcuts to apps - everything seems a problem.
3) Appear empty windows I've never seen before in usual apps like Skype, 
qbittorrent, VLC etc.
4) No free space for software and libraries. There is a huge risk of loosing 
data when resizing images. I lost it twice, though I repeated every step from 
the guide.
5) Templates are based on pretty specific distros like Fedora and Debian. It 
takes time for Arch and Windows templates to create.
6) It is not very easy to direct webcam on a particular VM.

Again, the idea is excellent. If there is a way to save my time on points 1-3 I 
would be thankful.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/96990085-a0c8-4175-aaa6-d63072503410%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts

2016-12-03 Thread Grzesiek Chodzicki
This is a wonderful idea, there are about 20k Qubes users out there, if we al 
give you guys an equivalent of Windows license price you should be set for a 
millenium. I'd also love to see some Qubes merchandise available to buy so I 
can up my swag game while simultaneously contributing funds.

Also, you forgot to post this to qubes-announce Andrew.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8c8ea3ed-320c-4f11-a012-ffb537c6c8e0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts

2016-12-03 Thread Grzesiek Chodzicki
W dniu czwartek, 1 grudnia 2016 00:56:11 UTC+1 użytkownik Andrew David Wong 
napisał:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Dear Qubes Community,
> 
> Since the initial launch [01] of Qubes OS back in April 2010, work on Qubes
> has been funded in several different ways.  Originally a pet project, it was
> first supported by Invisible Things Lab [02] (ITL) out of the money we earned
> on various R&D and consulting contracts. Later, we decided that we should try 
> to
> commercialize it. Our idea, back then, was to commercialize Windows AppVM
> support.  Unlike the rest of Qubes OS, which is licensed under GPLv2, we 
> thought
> we would offer Windows AppVM support under a proprietary license. Even though 
> we
> made a lot of progress on both the business and technical sides of this
> endeavor, it ultimately failed.
> 
> Luckily, we got a helping hand from the Open Technology Fund [03] (OTF), which
> has supported [04] the project for the past two years. While not a large
> sum of money in itself, it did help us a lot, especially with all the work
> necessary to improve Qubes' user interface, documentation, and outreach to new
> communities.  Indeed, the (estimated) Qubes user base has grown [05]
> significantly over that period. Thank you, OTF!
> 
> But Qubes is more than just a nice UI: it's an entirely new, complex system --
> a system that aims to change the game of endpoint security. Consequently, it
> requires expertise covering a wide spectrum of topics: from understanding
> low-level aspects of hardware and firmware (and how they translate to the
> security of a desktop system), to UI design, documentation writing, and
> community outreach. Even if we consider only the "security research" aspect of
> Qubes, this area alone easily scales beyond the capabilities of a single human
> being.
> 
> In order to continue to deliver on its promise of strong desktop security, 
> Qubes
> must retain and expand its core team, and this requires substantial funding. 
> At
> this point, we believe the only realistic way to achieve this is through
> commercialization, supplemented by community funding.
> 
> 
> Commercialization
> =
> 
> We're taking a different approach to commercialization this time.  Building on
> the success of the recent Qubes 3.2 release, which has been praised by users 
> for
> its stability and overall usability, we will begin offering commercial 
> editions
> (licenses) of Qubes OS to corporate customers. We believe that the maturity of
> Qubes, combined with its powerful new management stack [06], makes it ripe
> for adoption by any corporation with significant security needs.
> 
> Commercial editions of Qubes OS will be customized to meet special corporate
> requirements. For example, two features that might be particularly attractive 
> to
> corporate customers are (1) "locking down" dom0 in order to separate the user
> and administrator roles and (2) integrating our local management stack with a
> corporation's remote management infrastructure. These are both examples of
> features that our developers are capable of implementing now, on Qubes 3.2.
> 
> We plan to partner with one to three corporate clients in order to run a pilot
> program throughout the first half of 2017.  After it has been successfully
> completed, we'll then widen our offer to more corporate customers and,
> ultimately, to small business customers. Our main constraint is the 
> scalability
> required to cover each additional client. Hence, we plan to focus on larger
> customers first.
> 
> Let there be no misunderstanding: Qubes OS will always remain open source. We
> anticipate that the majority of our commercialization efforts will involve the
> creation of custom Salt configurations, and perhaps writing a few additional
> apps and integration code. In the event that any corporate features require
> reworking the core Qubes code, that new code will remain open source.
> 
> We considered many other ways of attempting to commercialize Qubes before
> arriving at this model. One possibility that some of our users have inquired
> about is that we sell dedicated Qubes hardware (i.e. laptops). However, there
> are a number of challenges here, both in terms of making the hardware
> trustworthy enough to merit our "seal of approval", and from a business and
> logistics perspective. For these reasons, we don't plan to pursue this option 
> in
> the immediate future.
> 
> 
> Community funding
> =
> 
> Unfortunately, the financial necessity of shifting our priorities to 
> commercial
> clients will mean that we have less time to work on features that benefit the
> wider, security-minded open source community, which has been our focus for the
> past seven years.  This deeply saddens us. (We all use Qubes on our personal
> computers too!) However, the reality is that ITL can't afford to sustain the
> open source development of Qubes for much longer. We're running out of time.
>

[qubes-users] Re: Trouble reading data CD under Qubes

2016-12-03 Thread Pawel Debski
W dniu sobota, 3 grudnia 2016 12:53:02 UTC+1 użytkownik Grzesiek Chodzicki 
napisał:
> W dniu sobota, 3 grudnia 2016 12:21:49 UTC+1 użytkownik Pawel Debski napisał:
> > Folks,
> > 
> > I have a PC with two SATA controllers: primary master holds my SDD with 
> > Qubes, while secondary master has CD drive attached.
> > 
> > When I insert a data CD it gets mounted by dom0 and the files are 
> > accessible. I do not want to open these files in dom0 however. So in the VM 
> > Manager I right click my favourite perssonal-full-sw appVM that I created 
> > previously and select:
> > 
> > Attach/detach block devices -> Attach dom0:sr0
> > 
> > and nothing happens. 
> > 
> > Even more: CD content is still visible in dom0 and /dev/sr0 is still 
> > mounted in /run/media/pdebski/CDTITLE
> > 
> > How can I better diagnose the problem?
> 
> Try using qvm-block -l and then attach the device using qvm-block. If that 
> fails, you can attach the entire sata controller (and not just the drive)

Here is the progress:

(in dom0)
qvm-block -l
dom0:sr0 ... attached to fedora-full-sw as xvdi

now in fedora-full-sw Konsole I need

[user@fedora-usb ~]$ su - root
[root@fedora-usb ~]# mkdir CD
[root@fedora-usb ~]# mount /dev/xvdi CD
[root@fedora-usb ~]# df
Filesystem 1K-blocksUsed Available Use% Mounted on
...
/dev/xvdi   80388038 0 100% /root/CD

and voilà, I can read the files.

HOWEVER: can you imagine a normal user doing this?
(I can't, she/he would kill me with his laughter ;-)

How can I make Fedora read the CD and mount it automagically so all is visible 
in AppVM File Manager just after inserting CD?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7f58ba9e-f8fd-4da6-8ab5-3cf321cc85c3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qvm-block man page inconsistency

2016-12-03 Thread Pawel Debski
man qvm-block
...
qvm-block -a [options]  

while in fact it is 

qvm-block --help
...
qvm-block -a [options]  :

(same error with https://www.qubes-os.org/doc/dom0-tools/qvm-block/)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d49fff5c-d4c4-4807-bf69-8b823dbd32a0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem

2016-12-03 Thread Grzesiek Chodzicki
W dniu sobota, 3 grudnia 2016 12:05:52 UTC+1 użytkownik game...@googlemail.com 
napisał:
> Hi,
> for comfortable use of USB-only scanners and other devices such as this, it 
> would be nice to have Win7 as USB-VM, e.g. have the USB-Controller-PCI-Device 
> assigned to it to use USB-Devices from there. 
> 
> When i try to start Win7, this happens (see the picture 
> https://imgur.com/a/spnRC).
> [The german sentence in the picure is like:
> "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No 
> FLR, PM or Bus Reset available."]
> I already have the PCI-Device assigned to it, original Qubes-USB-VM dont have 
> it assigned anymore. 
> the "strict pcireset"-qvm-prefs option is already turned on. Any suggestions 
> to fix this?
> Thank you.

set pci_strictreset to false and try again.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/69337ff1-d082-46df-89ba-cf53f6f00cd1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Trouble reading data CD under Qubes

2016-12-03 Thread Grzesiek Chodzicki
W dniu sobota, 3 grudnia 2016 12:21:49 UTC+1 użytkownik Pawel Debski napisał:
> Folks,
> 
> I have a PC with two SATA controllers: primary master holds my SDD with 
> Qubes, while secondary master has CD drive attached.
> 
> When I insert a data CD it gets mounted by dom0 and the files are accessible. 
> I do not want to open these files in dom0 however. So in the VM Manager I 
> right click my favourite perssonal-full-sw appVM that I created previously 
> and select:
> 
> Attach/detach block devices -> Attach dom0:sr0
> 
> and nothing happens. 
> 
> Even more: CD content is still visible in dom0 and /dev/sr0 is still mounted 
> in /run/media/pdebski/CDTITLE
> 
> How can I better diagnose the problem?

Try using qvm-block -l and then attach the device using qvm-block. If that 
fails, you can attach the entire sata controller (and not just the drive)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1fab03b7-2acf-4ed5-a355-67dcf58e44f4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem

2016-12-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-03 03:05, gamer.ffo via qubes-users wrote:
> Hi,
> for comfortable use of USB-only scanners and other devices such as this, it 
> would be nice to have Win7 as USB-VM, e.g. have the USB-Controller-PCI-Device 
> assigned to it to use USB-Devices from there. 
> 
> When i try to start Win7, this happens (see the picture 
> https://imgur.com/a/spnRC).
> [The german sentence in the picure is like:
> "libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No 
> FLR, PM or Bus Reset available."]
> I already have the PCI-Device assigned to it, original Qubes-USB-VM dont have 
> it assigned anymore. 
> the "strict pcireset"-qvm-prefs option is already turned on. Any suggestions 
> to fix this?
> Thank you. 
> 

To work around this issue, pci_strictreset should be turned *off*, not on. 
(I.e., it should be set to "false," not "true.")

See: 
https://www.qubes-os.org/doc/user-faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=iT2i
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5cc139e8-6526-9b37-4290-29d69db68ec6%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Trouble reading data CD under Qubes

2016-12-03 Thread Pawel Debski
Folks,

I have a PC with two SATA controllers: primary master holds my SDD with Qubes, 
while secondary master has CD drive attached.

When I insert a data CD it gets mounted by dom0 and the files are accessible. I 
do not want to open these files in dom0 however. So in the VM Manager I right 
click my favourite perssonal-full-sw appVM that I created previously and select:

Attach/detach block devices -> Attach dom0:sr0

and nothing happens. 

Even more: CD content is still visible in dom0 and /dev/sr0 is still mounted in 
/run/media/pdebski/CDTITLE

How can I better diagnose the problem?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7acd0cd7-e5ec-4d80-afd0-ec0dbbc4b2e9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Win7 as USB-VM: "No PCI-Reset available" libvirt-Problem

2016-12-03 Thread gamer.ffo via qubes-users
Hi,
for comfortable use of USB-only scanners and other devices such as this, it 
would be nice to have Win7 as USB-VM, e.g. have the USB-Controller-PCI-Device 
assigned to it to use USB-Devices from there. 

When i try to start Win7, this happens (see the picture 
https://imgur.com/a/spnRC).
[The german sentence in the picure is like:
"libvirt.libvirtError: Internal Bug/Fail: PCI-Device can't be reseted. No FLR, 
PM or Bus Reset available."]
I already have the PCI-Device assigned to it, original Qubes-USB-VM dont have 
it assigned anymore. 
the "strict pcireset"-qvm-prefs option is already turned on. Any suggestions to 
fix this?
Thank you. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1506d1d8-f3cd-4b45-862c-b63fd79001b4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Yubikeys in Qubes

2016-12-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-02 01:57, vegard_petter...@fastmail.fm wrote:
> fredag 2. desember 2016 00.54.55 UTC+1 skrev Micah Lee følgende:
>> I just wrote a quick blog post about using Yubikeys in Qubes.
>> Specifically, I wanted to share a script that will use qvm-usb to attach
>> your Yubikey to your gpgvm no matter what USB port you plug it into.
> 
> Thank you very much for this, Micah, it great to see usability scripts for 
> Qubes popping up!
> 
> That said, I tested this and it turns out one needs to have a USB Qube set up 
> (aka USB-VM, sys-usb).
> I followed the receipe here: https://www.qubes-os.org/doc/usb/ .
> 
> My problem now is that I have a single PS/2 port, and have to switch between 
> using either a PS/2 mouse or a PS/2 keyboard, by plugging and unplugging the 
> connector.
> 

If your PS/2 port supports it, you can buy an inexpensive splitter cable that 
will allow you to
attach a PS/2 keyboard and a PS/2 mouse simultaneously.

> Is there a simple way to completely disable the USB-Qube? 
> The command: "qubesctl top.disable qvm.sys-usb" in dom0 doesn't do much.
> And rebooting the Qubes OS causes system hang; it does not boot anymore.
> 

You can simply turn off autostart in the VM's settings, and don't start it.
Or you can just delete the VM. You may also need to unhide USB controllers from 
dom0.
I.e., reverse this procedure:

https://www.qubes-os.org/doc/usb/#hide-all-usb-controllers-from-dom0

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=0sFQ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ce4d25d5-fb95-a7cc-6b5a-a645bdb0d071%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Yubikeys in Qubes

2016-12-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-02 18:50, Leeteqxv wrote:
> On 02/12/16 20:15, Micah Lee wrote:
>> On 12/01/2016 04:37 PM, Marek Marczykowski-Górecki wrote:
>>> The tool run by qvm-usb does support alternative device identification
>>> - using product and vendor ID. Also to specify which device to attach.
>>> This isn't exposed by qvm-usb tool, because it may be ambiguous, but may
>>> be useful here. See README for more details:
>>> https://github.com/QubesOS/qubes-app-linux-usb-proxy
>>> I acknowledge that your solution is better in some aspect: it exists and
>>> works :)
>> It seems, from my brief testing, that all Yubikeys of the same version
>> have the same product and vendor ids. That still might be preferable to
>> grepping for "Yubikey" though.
>>
>>> Is communication with YubiKey encrypted, or at least somehow
>>> authenticated? Otherwise malicious USB VM could easily perform some kind
>>> of man in the middle attack and for example sign document you really
>>> didn't want to sign. Or decrypt arbitrary data. It's possible even when
>>> physical confirmation (button) is required - by simply waiting until you
>>> perform *some* operation.
>> It is authenticated, but unfortunately I don't think in a secure way.
>> When you use any OpenPGP smart card you have to set a PIN to use it, and
>> you have to authenticate with the smart card using the PIN. In the case
>> of Yubikeys, you type the PIN using the gpg pinentry program (some smart
>> card readers have physical keypads to type the PIN, so software
>> keyloggers on the computer can't steal the PIN). But I'm pretty sure
>> that the PIN you type in, in plaintext, gets sent to the Yubikey, so
>> your usbvm could probably log the PIN the very first time you use your
>> smart card, and then use it as much as it wants after that without you
>> knowing.
>>
>> Also, I'm pretty sure none of the communication is encrypted. To decrypt
>> a message on a smart card, you send the ciphertext (and a PIN, if it
>> isn't cached) to the smart card, and it decrypts it responds with the
>> plaintext. So likely, the usbvm could spy on the plaintext of decrypted
>> messages.
>>
>> Unfortunately Yubikeys don't support pressing the physical button for
>> secret key operations. Those are preserved for 2FA and static passwords.
>>
>>> This is general problem with USB devices, which are hard to solve with
>>> the current USB infrastructure (USB VM can do anything with any device
>>> connected to it). Without some fundamental USB rework - probably at
>>> hardware layer, I think the only alternative is protecting the data at
>>> individual device protocol level (like you do with encrypted USB sticks
>>> for example).
>> Sad, but reality.
>>
> Is it not possible to configure this to having the Yubikey require the person 
> to press the key button manually/physically?
> If not, such a limitation would lie in the software rather than in the 
> Yubikey, I assume, since the Yubikey support Challenge-Response and such 
> already? If possible, it is definetely preferable to work around potential 
> PIN theft and subsequent hidden (mis)use by requiring a manual/physical 
> action.
> 

As Marek explained above, requiring a manual/physical button press doesn't
solve the problem:

"Is communication with YubiKey encrypted, or at least somehow
authenticated? Otherwise malicious USB VM could easily perform some kind
of man in the middle attack and for example sign document you really
didn't want to sign. Or decrypt arbitrary data. It's possible even when
physical confirmation (button) is required - by simply waiting until you
perform *some* operation."

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=2myJ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39351458-901b-4706-7875-ac9d888fbc38%40qubes-os.org.
For more options,