Re: [Solved, Bugfix] Re: [qubes-users] fedora-24-minimal and WiFi: Shows network, but does not connect

2016-12-06 Thread Foppe de Haan
On Tuesday, December 6, 2016 at 4:10:51 PM UTC+1, Robert Mittendorf wrote:
> I solved the problem using
> 
> dnf install notification-daemon gnome-keyring
> 
> without this it is not possible to store credentials for a new network
> or change existing ones.

confirmed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2296331f-5b9e-4d96-b1ea-0e547e01d42d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 3.2(R2) USB Connecting to DOM0 by Default

2016-12-06 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-06 18:44, Ben Wika wrote:
> On Thursday, 11 August 2016 22:38:27 UTC+10:30, ama...@riseup.net  wrote:
>> My understanding is that by default Qubes Dom0 is protected from USB 
>> attacks by disallowing access to USB's.
>> To the contrary,on my system, USB's have direct access to Dom0 - I plug 
>> in a usb -popup shows it's connected to dom0 - i have direct access via 
>> dom0 to the files on the usb.
>>
>> Is it just me? or it it a system failure?
> 
> so to be clear, having no usb qube makes dom0 vulnerable? (i had the same 
> setup until i got myself ps2 splitter) 
> 

Correct. If you're not using a USB qube (i.e., your USB controllers are left in 
dom0), then a malicious USB device plugged into a USB port can compromise dom0.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=MxBx
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/afcacc50-7cf1-4532-6c5a-ea020491211b%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 2/3 of VMs randomly lose network access; sys-net, sys-firewall, and others normal

2016-12-06 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-06 09:01, Eva Star wrote:
> On 12/04/2016 05:19 PM, Marek Marczykowski-Górecki wrote:
>> 3. Restart qubes-firewall service and see whether it helps:
>>
>> sudo systemctl restart qubes-firewall
>>
> 
> One my VM loss network access again.
>> qubesdb-read /qubes-iptables-error
> blank
> 
>> sudo systemctl status qubes-firewall
> give me this https://i.imgur.com/KUkHODf.png
> it's the last call.
> before all calls show me the same:
> https://i.imgur.com/UwfdUSI.png (5 mins later, 9 mins later only difference)
> 
> Then (sorry) I forget about step 3 from instruction and restart my VM.
> It helps. And firewall after that show me 15 lines output (vs 14 lines before)
> https://i.imgur.com/JoIaZxN.png
> See the last line! It's show after I shutdown problem VM.
> 
> As I'm already wrote I still think the problem with background updates... 
> Maybe race condition or something like this that freeze update task and all 
> network access?
> 

FWIW, `systemctl restart qubes-firewall` fixed it for me last time.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYR5S1AAoJENtN07w5UDAwHLEQAIa4xd2D1aRU262ZQ7wHrQVX
eyE6BdipuYKeJ8CmfEP7eo5pACFgyECjGhEZk3Zm/nsWnuIJvFYXhiej/iFWdtOh
CUvIpZ/lYzPWY+RgnJmxf2JwJ8mwwdT5WewTPqEJKmMGHeOyfV5l5NsB1s4ChBUX
dlR1Q0e4r2XWEnDeoeIRMdvVQJezWQ3GiMKvDTHBVwxt8jkbQxVwP2f1RuhvMk39
e7+luxLdSj3BAAt5jQUCIVTivVuUFBwQNrHU7ZOq+m5TrxsYN4srJOTVvMXFAXDb
aF21vAIvm+H3dxnQUEGm7UvbjVoM/KfABWHe9ROGm7mk6F/imF3E9AHbJ39yWWmY
vsWRE558N8qmNqMtaqLfW8aqtmnJfhq9bC8pAVjrtClKFnRzhPho6LG6QqmWbbn0
gPp6T3y5Qp0tom54MTte14jRVCF2HkLbOSUQ9g8M1RIc+A0eLP3eeIP0HMsXxAr5
s4++USG05dftv0mQ44zf2zmXR1NGSHSLi1TNHi4DZaSWAQQiGqSE7enYTHlj7Iu/
k89naxECNYbqnCKk/Nxh54jBv1gI1AxqeZ7oWGv0y084Zdx8H2sbglDerW6D3xrn
DLaSGOuQqRY5eVTN0PyJbpFhzBijLE1b4jf3SuB+XlNhvZ8A5vDQUUJDo6K8T9OL
BF5OM2TkSj6+sHhuW81H
=YV5S
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d5f866c-47e5-a900-0b25-99c8e213f688%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 3.2(R2) USB Connecting to DOM0 by Default

2016-12-06 Thread Ben Wika
On Thursday, 11 August 2016 22:38:27 UTC+10:30, ama...@riseup.net  wrote:
> My understanding is that by default Qubes Dom0 is protected from USB 
> attacks by disallowing access to USB's.
> To the contrary,on my system, USB's have direct access to Dom0 - I plug 
> in a usb -popup shows it's connected to dom0 - i have direct access via 
> dom0 to the files on the usb.
> 
> Is it just me? or it it a system failure?

so to be clear, having no usb qube makes dom0 vulnerable? (i had the same setup 
until i got myself ps2 splitter) 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6a659dd0-b690-4918-893f-06fd3d23917a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Creating an OpenWrt netvm

2016-12-06 Thread Chris Laprise

On 12/06/2016 07:58 PM, jonathanri...@gmail.com wrote:

Hi, I'd just like an update on this, as I am looking to do the same.
OpenWRT seems the best for NetVM as it has all that I could think of.
Also multiple instances for VPNs should not use too much ram.
So if you got it running, could you post your config in git ?
Thanks



This might not be a good idea. Qubes security model says that NICs are 
high-risk devices that should be isolated by themselves. If you combine 
that with your firewall, VPN and other sensitive routing infrastructure 
then a breech caused by your NIC could allow an attacker to monitor and 
control your firewall, VPN etc.


OTOH, combining firewall and VPN functions in the same VM is probably 
fine since those processes are relatively low-risk.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd64d023-fc2d-7db9-efb7-7f0110f4f6c2%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New Kernel Issues?

2016-12-06 Thread lowson . chris
Never mind I figured it out :)

If anyone has the same issues you can change the booted version by editing 
/boot/efi/EFI/qubes/xen.cfg

Update the default var at the top and reboot.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/30272a7d-e616-4236-81c1-7c32a26f7851%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Creating an OpenWrt netvm

2016-12-06 Thread jonathanrioux
Hi, I'd just like an update on this, as I am looking to do the same.
OpenWRT seems the best for NetVM as it has all that I could think of. 
Also multiple instances for VPNs should not use too much ram.
So if you got it running, could you post your config in git ?
Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/afc332f2-d246-4794-a51f-d1204ceb0333%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install

2016-12-06 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Dec 06, 2016 at 12:21:51PM -0800, Ronald Duncan wrote:
> On Tuesday, 6 December 2016 13:30:05 UTC, Ronald Duncan  wrote:
> > Looks like I will need to reinstall since things are not working/strange 
> > and I remember that when it first started up it did not go through the 
> > initial set up smoothly, and then would not boot.
> > 
> > Probably need to set up with nouveau.modeset=0 and then see the results:)
> 
> Is there a way on the first boot after install prior to configuration to set 
> nouveau.modeset=0

You can add it from grub menu. In UEFI mode (where grub is not used),
just after installation - before reboot - go to tty2 and edit
/mnt/sysroot/boot/efi/EFI/qubes/xen.cfg and add nouveau.modeset=0 there
(not sure if its mounted at exactly /mnt/sysroot - see `mount` output to
be sure).

> The configuration stage on first boot hangs and is buggy, and I would like to 
> have a clean boot to configure, I have access to the /boot and so can alter 
> config files.  There is a big kernal config file, but no command line 
> parameters, and the boot seems to be immediate with no grub delay.

No grub - you're probably using UEFI. See above.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYR1bXAAoJENuP0xzK19csPOsH/23hRcP4/S/M1zmi9HNVLQ1z
LtPjiBfPCtDIs60Xw8vJPUXZmT9Ucx7xk7mt5nR55dXmpAUJkfZVEA8//IluuRmv
Z5Giu5n+xO9kc5HDEBmwOc1Yj4MmqX+Ld+qsLDIj5fAPFAQn29yoonvMYJHDI/4W
unlsS3j2wyQZ5gHhpYg5PaSlysIOdCY1/zsfI9aUgrUgExaaN98cT8fV7GGSlJQ5
jn1za0tFm0cNjhWES6uu1vo9hlfmngh6/JOToVf72RFO3VIJWaTOW9h1GE+dUB32
HciOkEKjipNZL/q/CCzchev4s1HkElAKqgnWWaTmNVSVjQROi0bzEZRBtTslojE=
=v9NJ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161207002455.GA8061%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Chainloading to the Qubes bootloader

2016-12-06 Thread justin . h . holguin
On Tuesday, December 6, 2016 at 1:52:00 PM UTC-8, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Tue, Dec 06, 2016 at 12:18:09PM -0800, justin.h.holg...@gmail.com wrote:
> > My primary OS is Ubuntu and it's likely to stay that way (I need 
> > vagrant/virtualbox for work), but I'd like to spend some time using Qubes 
> > when I can. 
> > 
> > In my ideal setup, my laptop would boot into Ubuntu by default, but have a 
> > grub entry to switch over to the Qubes bootloader on demand.
> > 
> > This setup isn't covered by https://www.qubes-os.org/doc/multiboot/ so I 
> > figured I'd give it a shot myself.
> > 
> > I installed Qubes, but elected not to make the install device bootable 
> > (since I want to keep Ubuntu in charge of booting). Then I found the Qubes 
> > bootloader partition at /dev/sda7 and attempted to add a chainloader entry 
> > to /etc/grub.d/40_custom like this:
> > 
> > menuentry "Qubes Chainloader" {
> >   insmod chain
> >   insmod ext2
> >   set root=(hd0,gpt7)
> >   chainloader /EFI/qubes/xen-4.6.1.efi
> > }
> > 
> > I can select 'Qubes Chainloader' at the grub menu, but it just flashes a 
> > message (I think it's something like "Loading xen-4.6.1.efi") for the 
> > briefest instant before dumping me back into grub. For what it's worth, I 
> > know it's at least finding the .efi file because it no longer complains 
> > that it can't.
> > 
> > TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot 
> > partition at /dev/sda7?
> 
> Is /dev/sda7 your ESP? If so, remove 'set root' line.

I'm not sure it qualifies as "the" ESP (I don't know EFI very well), but 
/dev/sda7 holds the Qubes /boot partition. It's not the partition that boots by 
default; that would be /dev/sda1.

If I do remove the setroot line, how will grub know that xen.efi is on 
/dev/sda7?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/229038f8-1bd4-44a4-a2d2-85d0fb0b8750%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Chainloading to the Qubes bootloader

2016-12-06 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Dec 06, 2016 at 12:18:09PM -0800, justin.h.holg...@gmail.com wrote:
> My primary OS is Ubuntu and it's likely to stay that way (I need 
> vagrant/virtualbox for work), but I'd like to spend some time using Qubes 
> when I can. 
> 
> In my ideal setup, my laptop would boot into Ubuntu by default, but have a 
> grub entry to switch over to the Qubes bootloader on demand.
> 
> This setup isn't covered by https://www.qubes-os.org/doc/multiboot/ so I 
> figured I'd give it a shot myself.
> 
> I installed Qubes, but elected not to make the install device bootable (since 
> I want to keep Ubuntu in charge of booting). Then I found the Qubes 
> bootloader partition at /dev/sda7 and attempted to add a chainloader entry to 
> /etc/grub.d/40_custom like this:
> 
> menuentry "Qubes Chainloader" {
>   insmod chain
>   insmod ext2
>   set root=(hd0,gpt7)
>   chainloader /EFI/qubes/xen-4.6.1.efi
> }
> 
> I can select 'Qubes Chainloader' at the grub menu, but it just flashes a 
> message (I think it's something like "Loading xen-4.6.1.efi") for the 
> briefest instant before dumping me back into grub. For what it's worth, I 
> know it's at least finding the .efi file because it no longer complains that 
> it can't.
> 
> TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot 
> partition at /dev/sda7?

Is /dev/sda7 your ESP? If so, remove 'set root' line. Generally take a
look at issue 794[1], long story short - xen.efi does not work when loaded
by grub using grub filesystem driver (instead of EFI filesystem
handling). Not setting 'root' variable should trigger EFI internal
filesystem handling.

[1] https://github.com/qubesos/qubes-issues/issue/794

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYRzL5AAoJENuP0xzK19csEDkH/ijAHRGnNZg9IbQLQbxbYAs0
Xzgo/WKThdzZLKK7PXfi7+tQyHFw/DmHs5UOmIvvDSYSRxDUP/FfGEfOm7nhxOcQ
Lh+xKK/W7QCOnNERXtuXkcxHLGimYCMeen3ellAacJb8/Zg4ETTOP/O7OruAw3cr
FOPMR5YnOwGU9UX6/yt0yi27W8e88jOJYV8QSp4gsGiEtWbi7tlJqzHsl28hWu+P
PuW+wT7o3Y8bg+HsIu01d0zmavq9qI/+Smgm9kePdL6FiVq8ulpg9fI8GCYcdBdz
81+YIgzcTDraYjs0mFH62O78TSVW0F+uqnYGpZW4tHM4eN/NMfEB8hSoEa+dw+Y=
=lHPA
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161206215150.GC1149%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: qubes r2b3 first run, I don't know how to set wireless connection

2016-12-06 Thread larry . crane . 2000
I just downloaded qubes 3.2 (my guess). Had a terrible time installing on a 
Toshiba Satellite. 

Now I can't connect to the Internet via WiFi. Found this post. 

I tried rfkill list all, with command not found. Not sure that would apply to 
this version any way.

The other instructions mentioned above weren't helpful, I didn't see netvm, but 
I did see sys-net on Qubes VM Manager. 

Would appreciate any help with this. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a1d4f23e-f67b-43f3-8e62-b753d6f93e92%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Chainloading to the Qubes bootloader

2016-12-06 Thread Micah Lee
On 12/06/2016 12:31 PM, justin.h.holg...@gmail.com wrote:
> On Tuesday, December 6, 2016 at 12:24:08 PM UTC-8, Micah Lee wrote:
>> On 12/06/2016 12:18 PM, justin.h.holg...@gmail.com wrote:
>>> TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot 
>>> partition at /dev/sda7?
>>
>> It's kind of old at this point, but I wrote a blog post awhile ago about
>> dual-booting Ubuntu and Qubes, including the chainloading details:
>>
>> https://micahflee.com/2014/04/dual-booting-qubes-and-ubuntu-with-encrypted-disks/
> 
> Right! I came across that and I was hoping to basically do the reverse, where 
> the Ubuntu bootloader comes first and has an option for Qubes. Unfortunately, 
> I couldn't get it to work.

You could set chainloading to Ubuntu's grub as the default option in the
Qubes grub. You'll boot to Qubes grub, wait 3 seconds, boot to Ubuntu
grub, wait 3 seconds, boot to Ubuntu.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3ef8461d-5377-db0e-5da4-510b715a4df8%40micahflee.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Chainloading to the Qubes bootloader

2016-12-06 Thread justin . h . holguin
On Tuesday, December 6, 2016 at 12:24:08 PM UTC-8, Micah Lee wrote:
> On 12/06/2016 12:18 PM, justin.h.holg...@gmail.com wrote:
> > TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot 
> > partition at /dev/sda7?
> 
> It's kind of old at this point, but I wrote a blog post awhile ago about
> dual-booting Ubuntu and Qubes, including the chainloading details:
> 
> https://micahflee.com/2014/04/dual-booting-qubes-and-ubuntu-with-encrypted-disks/

Right! I came across that and I was hoping to basically do the reverse, where 
the Ubuntu bootloader comes first and has an option for Qubes. Unfortunately, I 
couldn't get it to work.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d02d0dd4-307b-44c8-9fae-89e37b5f3cfc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Chainloading to the Qubes bootloader

2016-12-06 Thread Micah Lee
On 12/06/2016 12:18 PM, justin.h.holg...@gmail.com wrote:
> TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot 
> partition at /dev/sda7?

It's kind of old at this point, but I wrote a blog post awhile ago about
dual-booting Ubuntu and Qubes, including the chainloading details:

https://micahflee.com/2014/04/dual-booting-qubes-and-ubuntu-with-encrypted-disks/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5b0c20d2-d221-575c-49fe-f8063173c159%40micahflee.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install

2016-12-06 Thread Ronald Duncan
On Tuesday, 6 December 2016 13:30:05 UTC, Ronald Duncan  wrote:
> Looks like I will need to reinstall since things are not working/strange and 
> I remember that when it first started up it did not go through the initial 
> set up smoothly, and then would not boot.
> 
> Probably need to set up with nouveau.modeset=0 and then see the results:)

Is there a way on the first boot after install prior to configuration to set 
nouveau.modeset=0

The configuration stage on first boot hangs and is buggy, and I would like to 
have a clean boot to configure, I have access to the /boot and so can alter 
config files.  There is a big kernal config file, but no command line 
parameters, and the boot seems to be immediate with no grub delay.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/365b0738-f05e-4445-9edf-2f864d2e9009%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Chainloading to the Qubes bootloader

2016-12-06 Thread justin . h . holguin
My primary OS is Ubuntu and it's likely to stay that way (I need 
vagrant/virtualbox for work), but I'd like to spend some time using Qubes when 
I can. 

In my ideal setup, my laptop would boot into Ubuntu by default, but have a grub 
entry to switch over to the Qubes bootloader on demand.

This setup isn't covered by https://www.qubes-os.org/doc/multiboot/ so I 
figured I'd give it a shot myself.

I installed Qubes, but elected not to make the install device bootable (since I 
want to keep Ubuntu in charge of booting). Then I found the Qubes bootloader 
partition at /dev/sda7 and attempted to add a chainloader entry to 
/etc/grub.d/40_custom like this:

menuentry "Qubes Chainloader" {
  insmod chain
  insmod ext2
  set root=(hd0,gpt7)
  chainloader /EFI/qubes/xen-4.6.1.efi
}

I can select 'Qubes Chainloader' at the grub menu, but it just flashes a 
message (I think it's something like "Loading xen-4.6.1.efi") for the briefest 
instant before dumping me back into grub. For what it's worth, I know it's at 
least finding the .efi file because it no longer complains that it can't.

TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot 
partition at /dev/sda7?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9c7e827-b344-4d01-8063-7e584acf4987%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues

2016-12-06 Thread Benjamin Richter
The only thing I could find is this, from dom0s dmesg:

[   29.251207] xhci_hcd :05:00.0: remove, state 1
[   29.251216] usb usb4: USB disconnect, device number 1
[   29.251218] usb 4-1: USB disconnect, device number 2
[   29.251219] usb 4-1.1: USB disconnect, device number 3
[   29.251220] usb 4-1.1.1: USB disconnect, device number 4
[   29.253988] xhci_hcd :05:00.0: USB bus 4 deregistered
[   29.254071] xhci_hcd :05:00.0: remove, state 1
[   29.254079] usb usb3: USB disconnect, device number 1
[   29.254081] usb 3-1: USB disconnect, device number 2
[   29.254084] usb 3-1.1: USB disconnect, device number 3
[   29.254086] usb 3-1.1.2: USB disconnect, device number 6
[   29.289813] usb 3-1.1.4: USB disconnect, device number 7
[   29.290279] usb 3-1.2: USB disconnect, device number 4
[   29.399835] xhci_hcd :05:00.0: USB bus 3 deregistered
[   29.400369] pciback :05:00.0: seizing device
[   29.400479] xen: registering gsi 18 triggering 0 polarity 1
[   29.400484] Already setup the GSI :18
[   29.803790] loop: module loaded
[   30.366119] xen_pciback: vpci: :05:00.0: assign to virtual slot 0
[   30.366446] pciback :05:00.0: registering for 1
[   30.367301] xen_pciback: vpci: :3a:00.0: assign to virtual slot 1
[   30.367631] pciback :3a:00.0: registering for 1
[   31.693098] xen-blkback: event-channel 17
[   31.693193] xen-blkback: /local/domain/1/device/vbd/51712:using single page: 
ring-ref 8
[   31.693323] xen-blkback: ring-pages:1, event-channel 17, protocol 1 
(x86_64-abi) persistent grants
[   31.705391] xen-blkback: event-channel 18
[   31.705512] xen-blkback: /local/domain/1/device/vbd/51728:using single page: 
ring-ref 9
[   31.705603] xen-blkback: ring-pages:1, event-channel 18, protocol 1 
(x86_64-abi) persistent grants
[   31.713185] xen-blkback: event-channel 19
[   31.713372] xen-blkback: /local/domain/1/device/vbd/51744:using single page: 
ring-ref 10
[   31.713503] xen-blkback: ring-pages:1, event-channel 19, protocol 1 
(x86_64-abi) persistent grants
[   31.721737] xen-blkback: event-channel 20
[   31.721815] xen-blkback: /local/domain/1/device/vbd/51760:using single page: 
ring-ref 11
[   31.721890] xen-blkback: ring-pages:1, event-channel 20, protocol 1 
(x86_64-abi) persistent grants
[   32.696932] pciback :05:00.0: Driver tried to write to a read-only 
configuration space field at offset 0x8a, size 2. This may be harmless, but if 
you have problems with your device:
   1) see permissive attribute in sysfs
   2) report problems to the xen-devel mailing list along with 
details of your device obtained from lspci.
[   32.697621] pciback :05:00.0: enabling device ( -> 0002)

Permissive mode is already enabled for the device, so I think the only 
remaining thing is to report this to the xen-devel list...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ccfeef3-4576-4199-aa55-313429e66388%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Persistent audio issues in a particular appvm (Qubes 3.1)

2016-12-06 Thread Jonathan Diamond
Thanks Marek, using the start-pulseaudio-with-vchan script does the trick and 
fixes the problem.

I had already looked through journalctl and couldn't see anything obvious, I'll 
look at the .xsession-errors as you suggested perhaps that will explain things.

Jon 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5f8780f1-dcfa-4476-951b-f1bf2e30527b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 2/3 of VMs randomly lose network access; sys-net, sys-firewall, and others normal

2016-12-06 Thread Eva Star

On 12/04/2016 05:19 PM, Marek Marczykowski-Górecki wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Nov 30, 2016 at 09:19:06PM +0300, Eva Star wrote:

On 11/27/2016 02:04 AM, Marek Marczykowski-Górecki wrote:


Do you see some correlation with:
 - starting/stopping another VM?
 - affected VMs have or not firewall rules?

Also, check if restarting qubes-firewall service in sys-firewall helps
(and check it status first).



Seems I have the same issue! (Maybe) I think it's correlate with CHECKING
UPDATES on dom0 or templates. When Qubes do that check - other VM still not
responsive. I wrote about this at the Xen 4.6.3 thread.


More troubleshooting steps:

1. When problem appears, try in sys-firewall:

qubesdb-read /qubes-iptables-error

This should print last error of firewall reload. I guess it may be about
some DNS resolution failure (if any rule use DNS name instead of IP).
This shouldn't affect all the VMs - only the one for which name
resolution failed, but maybe something is wrong here.

2. Check status and logs of qubes-firewall service:

sudo systemctl status qubes-firewall

Should be "active (running)" and a series of "qubes-firewall[xxx]:
/qubes-iptables" messages. If you see anything else, let me know.

3. Restart qubes-firewall service and see whether it helps:

sudo systemctl restart qubes-firewall



One my VM loss network access again.
> qubesdb-read /qubes-iptables-error
blank

> sudo systemctl status qubes-firewall
give me this https://i.imgur.com/KUkHODf.png
it's the last call.
before all calls show me the same:
https://i.imgur.com/UwfdUSI.png (5 mins later, 9 mins later only 
difference)


Then (sorry) I forget about step 3 from instruction and restart my VM.
It helps. And firewall after that show me 15 lines output (vs 14 lines 
before)

https://i.imgur.com/JoIaZxN.png
See the last line! It's show after I shutdown problem VM.

As I'm already wrote I still think the problem with background 
updates... Maybe race condition or something like this that freeze 
update task and all network access?




--
Regards

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ccfd8b9-99d9-23d1-f0ab-85ce32efd2a4%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes' Firefox and videos

2016-12-06 Thread Franz
Swami

On Tue, Dec 6, 2016 at 8:14 AM, Swâmi Petaramesh 
wrote:

> Hi,
>
> I'm a longtime Linux user, but I have been using Qubes for "only" 3 months.
>
> I have noticed that a lot of videos that work well in Firefox on my other
> "usual" distributions do not work in the Firefox that comes with Qubes
> (i.e. all videos embedded in Twitter, most videos embedded in news
> sites...).
>
> I've tried to install more codecs and Flashplayer in the template VM, but
> to no avail.
>
> Does anybody have a clue ?
>
> Also, although I have installed the system in my own language, in my
> AppVMs I get everything in english. That's not much of an issue, but I'd
> prefer to get my own language interface and I'm not sure where to change
> this in the Qubes context.
>

On template, sudo gnome-control-center is very easy to use and works
perfectly to change the language of all applications.

Once It was about selecting the personal ragional language icon, then
change the language or add a language in the language tab, then  go to
system tab and click on copy setting. This change remains after reboot.

Then something changed, but it is even easier

You will have no problems.

English is not my mother language, but I prefer to keep it in English
because when I get some error message in English it is much more
straightforward to search for similar problems and solutions.

Best
Fran


>
> TIA for any help.
>
> Kind regards.
>
> --
> ॐ
>
> Swâmi Petaramesh  PGP 9076E32E
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/ms
> gid/qubes-users/3aca4178-0a95-395f-2bc4-b55806bd4d37%40petaramesh.org.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qD6-Of0X8WtOg0TA9uDNfYaNb9Zfi5g-8Sj__oFW6egVA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[Solved, Bugfix] Re: [qubes-users] fedora-24-minimal and WiFi: Shows network, but does not connect

2016-12-06 Thread Robert Mittendorf
I solved the problem using

dnf install notification-daemon gnome-keyring

without this it is not possible to store credentials for a new network
or change existing ones.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa238679-eae8-2052-2c40-a1e0f8edf658%40digitrace.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install

2016-12-06 Thread Ronald Duncan
Looks like I will need to reinstall since things are not working/strange and I 
remember that when it first started up it did not go through the initial set up 
smoothly, and then would not boot.

Probably need to set up with nouveau.modeset=0 and then see the results:)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8dc044d0-2c1d-490c-a012-8751df9c9afe%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install

2016-12-06 Thread Ronald Duncan
On Tuesday, 6 December 2016 13:11:41 UTC, Ronald Duncan  wrote:
> Changing grub config to  boot with nouveau.modeset=0 gave me a good 
> repeatable boot.
> 
> Now qubes is usable will investigate if everything else works:)

Thanks to Marek Marczykowski-Górecki 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cc72ddfe-6249-4db1-8f17-3c6d2131a884%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install

2016-12-06 Thread Ronald Duncan
Changing grub config to  boot with nouveau.modeset=0 gave me a good repeatable 
boot.

Now qubes is usable will investigate if everything else works:)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e2bc5bd-dbdd-45cb-a9dd-3dff077e3b27%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Stuck during boot with processor stuck - now with journalctl logs

2016-12-06 Thread Ronald Duncan
On Sunday, 27 November 2016 21:21:01 UTC, Marek Marczykowski-Górecki  wrote:
> -BEGIN PGP SIGNED MESSAGE-
> This assume you can boot your system. Does the hang happen all the time,
> or only sometimes? If the former, try disabling nouveau driver (which
> looks to be the problematic one), for example using nouveau.modeset=0
> kernel option.
Just got back from travelling.
Changing grub to boot with nouveau.modeset=0 gave me a good boot :)
Just tried rebooting and it shutdown cleanly and booted up fine.
Big Thanks!!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2d6fead8-9f5b-4b34-84f9-c1cc51f66550%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Trouble installing Windows SP1 7 64-bit on Qubes 3.2

2016-12-06 Thread Jarle Thorsen
tirsdag 6. desember 2016 11.07.52 UTC+1 skrev Swâmi Petaramesh følgende:
> Hello,
> 
> I run Qubes 3.2 on an HP ProBook 6470b laptop
> 
> I'm trying to install Windows 7 64-bit SP1 following instructions : 
> https://www.qubes-os.org/doc/hvm/
> 
> I'm using an ISO file sitting in an AppVM.
> 
> I could create the VM and start it, it first starts in character mode 
> and displays a "Windows is loading files..." progress bar (so I'm sure 
> that the VM boots and can access the ISO image), then shifts to graphics 
> mode and displays "Starting Windows" in a nice font, and then... sits 
> there forever without any visible activity, and no error message.
> 
> Any clue ?
> 
> I know that my Qubes setup is able to run Windows 7 in an HVM as I have 
> created another Win7 HVM, with a Windows 7 converted from a VirtualBox 
> installation, and it works good. But this one is 32-bit, and I'm trying 
> to install a 64-bit version as I read that Qubes Windows tools support 
> only a 64-bit Windows installation...
> 
> Thanks in advance for your help.
> 
> Kind regards.

I have experienced the same thing (and was actually just now about to create a 
new topic when I saw you beat me to it).

As far as I can tell the problem is caused by some update to the system (using 
qubes-dom0-update) as everything works just fine on a fresh Qubes 3.2 system.

This is my experience:

1. Installed Qubes 3.2
2. Installed Windows 32-bit HVM just fine.
3. (started testing QubesOS, including updating dom0)
4. Discovered that I should have installed win7-x64 in the first place.
5. Tried installing win7-x64, but booting the install media hung at exactly the 
same place as described by thread starter.
6. Made a fresh install of Qubes 3.2 and now win7-x64 installed just fine.
7. (started testing QubesOS, including updating dom0)
8. Now I want to make a win7-x64 Template, using the same install media, and I 
am once again stuck...

How should we proceed to debug what is causing this problem?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7f10d8b5-f9e8-4705-a5cd-8de7b05aa1f3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes' Firefox and videos

2016-12-06 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-06 03:14, Swâmi Petaramesh wrote:
> Hi,
> 
> I'm a longtime Linux user, but I have been using Qubes for "only" 3 months.
> 
> I have noticed that a lot of videos that work well in Firefox on my other 
> "usual" distributions do not work in the Firefox that comes with Qubes (i.e. 
> all videos embedded in Twitter, most videos embedded in news sites...).
> 
> I've tried to install more codecs and Flashplayer in the template VM, but to 
> no avail.
> 
> Does anybody have a clue ?
> 
> Also, although I have installed the system in my own language, in my AppVMs I 
> get everything in english. That's not much of an issue, but I'd prefer to get 
> my own language interface and I'm not sure where to change this in the Qubes 
> context.
> 
> TIA for any help.
> 
> Kind regards.
> 

Make sure hardware acceleration is disabled in your browser's settings.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=skYY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44d9cf23-8b39-01b5-5378-0c7654241cc0%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Thinkpad T460

2016-12-06 Thread Cyrinux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Le 03/12/2016 à 21:53, Jan Betlach a écrit :
> On Saturday, December 3, 2016 at 8:41:49 PM UTC+1, Bernd Lorenzen
> wrote:
>> Hello,
>> 
>> my Question is how i set the charge thresholds for my Lenovo
>> Thinkpad T460.
>> 
>> I have installed the following packages tlp,
>> tlp-rdw,tp-smapi-dkms and acpi-call-dkms in both fedora aind
>> debian template. Afterwards i changed the thresholds in the
>> config file /etc/default/tlp in both templates and in dom0. But
>> it doesn`t work. Do you know a workaround for this. I hope did
>> not forget some useful information for you.
>> 
>> Kind regards
>> 
>> 
>> Bernd Lorenzen
> 
> 
> Has the service been started? # systemctl status tlp
> 

Hi,
If this is like the T450, ensure that you have correctly compile the
acpi_call module.

Do you really have it?

lsmod|grep -q acpi_call && echo "Installed"

Personnaly I have allways trouble with dkms, I have manually build
from /usr/src/akmods/*.src.rpm,
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=qtrp
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o24j6d%24mhn%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Asus Transformer 3 Pro with Thunderbolt dock problems

2016-12-06 Thread Benjamin
Hi!

I got an Asus Transformer 3 Pro tablet and installed qubes on it.
This works unexpectedly well. The resolution is difficult (2880px on a 12" 
display), but the touchscreen works and the stylus works very well.

But the Transformer having only one USB controller and no Ethernet is a 
drawback.

I hoped to fix this with the Thunderbolt docking station, which has an 
additional USB controller and network device integrated. But I have not been 
able to pass those USB devices through to sys-net.

I'll post some lspci and lsusb logs here after rebooting, to show the whole 
picture.

Has anyone tried getting Thunderbolt devices to work in a qube?

Kind regards,
Benjamin

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/93ba58b2-e934-4cd5-944d-760301ed1661%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes' Firefox and videos

2016-12-06 Thread Swâmi Petaramesh

Hi,

I'm a longtime Linux user, but I have been using Qubes for "only" 3 months.

I have noticed that a lot of videos that work well in Firefox on my 
other "usual" distributions do not work in the Firefox that comes with 
Qubes (i.e. all videos embedded in Twitter, most videos embedded in news 
sites...).


I've tried to install more codecs and Flashplayer in the template VM, 
but to no avail.


Does anybody have a clue ?

Also, although I have installed the system in my own language, in my 
AppVMs I get everything in english. That's not much of an issue, but I'd 
prefer to get my own language interface and I'm not sure where to change 
this in the Qubes context.


TIA for any help.

Kind regards.

--
ॐ

Swâmi Petaramesh  PGP 9076E32E

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3aca4178-0a95-395f-2bc4-b55806bd4d37%40petaramesh.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Trouble installing Windows SP1 7 64-bit on Qubes 3.2

2016-12-06 Thread Swâmi Petaramesh

Hello,

I run Qubes 3.2 on an HP ProBook 6470b laptop

I'm trying to install Windows 7 64-bit SP1 following instructions : 
https://www.qubes-os.org/doc/hvm/


I'm using an ISO file sitting in an AppVM.

I could create the VM and start it, it first starts in character mode 
and displays a "Windows is loading files..." progress bar (so I'm sure 
that the VM boots and can access the ISO image), then shifts to graphics 
mode and displays "Starting Windows" in a nice font, and then... sits 
there forever without any visible activity, and no error message.


Any clue ?

I know that my Qubes setup is able to run Windows 7 in an HVM as I have 
created another Win7 HVM, with a Windows 7 converted from a VirtualBox 
installation, and it works good. But this one is 32-bit, and I'm trying 
to install a 64-bit version as I read that Qubes Windows tools support 
only a 64-bit Windows installation...


Thanks in advance for your help.

Kind regards.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/10214626-eb3c-9bde-631f-3f36bc67c47e%40petaramesh.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VT-d support in hcl report

2016-12-06 Thread taii...@gmx.com

On 11/26/2016 07:14 PM, te...@outoftheblue.pl wrote:

On Thu, 24 Nov 2016 09:33:23 +0100
Zrubi  wrote:


Well, as you noted the qubes-hcl-report tool relays on xl info, and xl
dmesg output.
If both states tat IOMMU is enabled:


virt_caps: hvm hvm_directio
(XEN) I/O virtualisation enabled

  what else can it say?

If you 100% sure that this is a false positive, then we should address
this issue for sure.
However I can't see how we can check if IOMMU is really working? Maybe
we can try DMA attack PoC script and try to break out from a netvm for
example?
(of course not as part of the hcl report :)

Thanks for your reply. After reading it I realized that I should
probably ask at Xen devel mailing list. I am not 100% sure, but the
specs about my HW says so(and I am 100% sure about what HW I have).

Anyway, I like the idea of DMA PoC attack. Sounds like a definitve
measure of VT-d separation. Are there any PoCs publicly available?

Regards,
tezeb

One of the side problems is that interrupt remapping support (or the 
lack of it) is not mentioned at all in HCL reports/tests and not 
mentioned to the average user who doesn't understand intels weird 
marketing speak [1], even some newer devices where the chipset 
theoretically supports it have it not activated for whatever reason.


[1] intel says "VT-d" instead of IOMMU, to make it seem like they are 
the only ones with the technology, and they fail to mention what version 
of it the chips feature (newer versions have better performance and the 
first few versions lack interrupt remapping which sucks and entirely 
breaks their shitty TXT/TPM technologies - intels reply to support 
message "buy a new computer")


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b387c86a-ffad-f281-f372-b67bc43d5997%40gmx.com.
For more options, visit https://groups.google.com/d/optout.