Re: [qubes-users] Network manager applet icon not visible in KDE plasma systray - Fedora 24/25 VM

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 21:31, Adrian Rocha wrote:
> Hi, I created a new sys-net VM based on Fedora-24 template. The 
> network works fine but the systray applet icon isn't visible. If I 
> click the mouse over the systray space I can see the menu, connect 
> to the wifi, etc. Something is wrong with the icon. The icon is 
> visible in XFCE, so I think that is some issue in the new version 
> of the Network Manager Applet respect to the KDE systray. The 
> network manager applet version in Fedora-25 is 1.4.0 and 1.0.10
> for Fedora-23. I created a new template VM Fedora-25, but the
> issue persists. Any ideas?
> 

This is a known issue, but it was previously reported in a Debian 9
sys-net, whereas yours is based on Fedora. It sounds like the common
factor in both cases is KDE in dom0.

https://github.com/QubesOS/qubes-issues/issues/2283

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=s3cs
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1c819318-3125-685c-1b79-75b02f1ff38f%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Fedora Desktop in Qubes

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 16:20, Jean-Philippe Ouellet wrote:
> On Thu, Dec 22, 2016 at 1:17 AM, Andrew David Wong
>  wrote:
>> You'll want to install Dropbox in your TemplateVM so that you can
>> use it in AppVMs based on that TemplateVM. You can follow the
>> instructions on Dropbox's website for adding their repo in your
>> Fedora TemplateVM, then:
>> 
>> $ sudo dnf install nautilus-dropbox
> 
> However, be careful with which template you install it in!

This is *always* true for *anything* you install in *any* template.

> In particular, if this template is used for VMs which have network 
> access and also secrets you wish to never be in dropbox, then this
> may be a dangerously bad idea.

Dropbox only syncs the contents of its own folder, so this won't
happen by accident. (If you're assuming that Dropbox is malicious,
then of course it could potentially own the entire VM, just like any
other hypothetical VM-owning malware.)

> You may wish to create a separate template for this purpose.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYXg0hAAoJENtN07w5UDAw7r8QAM+xfZ1cHliH19RSc8mm54K7
MNgWq+gQhEtgVK8dKSU3COqWzL8+HXSIK0j5GCLBsa1L3z1bqq7tNIqt67Rjar4n
j67nkiLBFo6WCRZJeklToNHObmQOwTbZ8+6rBUU/bCuMYxYb/VisFYFnu8+CuJGz
V2WBfhb6FislQE/sXiSL9ufjryf24OuhtAA/8yNm60mcXXTYLB6TYNJeSNmj7gwz
Bjk2cMaRUKmSuwFjjGO8/pD+vWmz8PQp7NRyZT5CLoFyOP5Pj2UCm9p4MWmXK+sf
nSuvLJWj2A9Jf5kQGfq6gRyaHzrw8aJ5jjNaMWn5uZTeFlWf8LfRtGtX0WK5+1fH
1uQQuf5m01cBw0fAXBl+WRyOyUo+90LxQWRY/90fdjwCO710M+DSVHVQz78KHNmw
XVJ/Sr1q6vucDNtab2Ilb8yHkz0Ip5Dm4CQGIyHH4g37Kmi3wOfeLac+YxN6Y7/z
dCBcISe3qT8lAbCw8g/gWDni/xhLvRMJvyFD7sL7vIttwEPV/3RVL+2eZshsdwk4
M31HPXbN33HJNoVmn28czawslNLQGwIyENmtIOXQDXuLV4Lw3AiFNk7XZKYFY+O3
DMx0Em1CdocHtcPUdPGts7FqXkp2cilIG0DKeVn96CRaGgwmeRHbYadjZ9V4YWnv
ulJNZEHcXzVKPbAuEUCe
=sBqr
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b39810a-82af-7c9e-3a2e-899dc32f97a9%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] most secure way to add repo to template

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 15:25, Eva Star wrote:
> And additional question:
> 
> warning:
> /var/cache/dnf/rpmfusion-free-1f0078b3844b9b8a/packages/vlc-3.0.0-0.1.fc24.x86_64.rpm:
> Header V4 RSA/SHA1 Signature, key ID b7546f06: NOKEY
> Importing GPG key 0xB7546F06:
>  Userid : "RPM Fusion free repository for Fedora (24)
> "
>  Fingerprint: 55E7 903B 6087 98E4 EC78 64CD 9F63 8721 B754 6F06
>  From   : /etc/pki/rpm-gpg/RPM-GPG-KEY-rpmfusion-free-fedora-24
> Is this ok [y/N]:
> 
> 
> IS IT OK? What to do?
> 
> 

Looks like the key is already in your TemplateVM (see the "From") line,
so it should be fine. IIRC, the key is included in the TemplateVM before
it ships. But, it doesn't hurt to check the fingerprint via out-of-band
and/or multi-band channels (e.g., on the website itself and via search
engines via multiple Tor circuits, VPNs, etc.).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=OEFT
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/660ecf58-9558-69cf-713c-8c680af615f9%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: most secure way to add repo to template

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 17:23, '01v3g4n10' via qubes-users wrote:
> On Friday, December 23, 2016 at 11:14:32 PM UTC, Eva Star wrote:
>> Hello,
>> 
>> What is the "right" way to add other repositories then RPMFusion
>> to template?
>> 
>> Do I need to disable Qubes Firewall, then download *.repo file
>> with curl and add it with sudo dnf intall newrepofile.repo ? Or
>> some other better and more secure way available?
>> 

It would be safer just to create the .repo file manually yourself in
/etc/yum.repos.d/

> I created a clone of my fedora-24 template and called it
> fedora-24-plus and then issued the following commands inside that
> template. Whether or not you create a clone or not depends on your
> trust of RPM Fusion.
> 
> sudo dnf config-manager --set-enabled rpmfusion-free
> rpmfusion-nonfree sudo dnf upgrade --refresh
> 
> https://www.qubes-os.org/doc/software-update-vm/
> 

Eva is asking about repos *other than* RPMFusion.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=SlVB
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f6f6fc2d-282d-0b79-cd95-d03b5353e800%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Network manager applet icon not visible in KDE plasma systray - Fedora 24/25 VM

2016-12-23 Thread Adrian Rocha
Hi,
I created a new sys-net VM based on Fedora-24 template. The network works fine 
but the systray applet icon isn't visible. If I click the mouse over the 
systray space I can see the menu, connect to the wifi, etc. Something is wrong 
with the icon. The icon is visible in XFCE, so I think that is some issue in 
the new version of the Network Manager Applet respect to the KDE systray.
The network manager applet version in Fedora-25 is 1.4.0 and 1.0.10 for 
Fedora-23.
I created a new template VM Fedora-25, but the issue persists.
Any ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/216995b5-445a-4661-9019-eac28c26efa1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] My Inability to play MP3 from Thunderbird email client

2016-12-23 Thread 'Gaea' via qubes-users


Andrew David Wong:
> On 2016-12-22 19:51, 'Gaea' via qubes-users wrote:
>> Thanks Monsieur Ouellet.
> 
>> I thought that there was a smaller version of Qubes that may be easier
>> for me. I am totally new to all this. Been with WINDOWS, but want
>> something more resistant to hacking & invasion of my privacy.
> 
>> I managed to install Qubes 3.2. Now my google voice mail that records
>> MP3 like voicemail.mp3 wont play. In windows all I have to do is click
>> on (Play)
> 
> 
> It sounds like you just need a media player. I recommend VLC, which you
> can download after enabling the RPMFusion repo. Instructions are here:
> 
> https://www.qubes-os.org/doc/software-update-vm/#rpmfusion-for-a-fedora-templatevm
> 
> 

Thanks Andrew.

Your suggestion works. I had actually followed web searches to RMFusion
site and other places and tried their recommendations and came up short.
And there it was in Qubes-OS docs. I am puzzeled that I did not hit it
in my searches. OR maybe I skipped Qubes-os site.

Following your pointer I was able to install VLC where others failed.
Once I had VLC installed and figured out file type associations now I
can listen to voicemail with a simple click.

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/60a9d5ea-aa4b-d09b-886f-8e9867447456%40lelantos.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes as Server OS?

2016-12-23 Thread Jean-Philippe Ouellet
On Fri, Dec 23, 2016 at 7:35 PM, Nicklaus McClendon
 wrote:
> On 12/23/2016 07:09 PM, Jean-Philippe Ouellet wrote:
>>> If you can't access dom0, qrexec is default allowed,
>>
>> Uhh What? Can you elaborate?
>
> qrexec usage is normally defined by an RPC. This RPC has a policy,
> either allow, deny, or ask. My understanding is that if you don't have
> access to dom0 to respond to a prompt, you must allow the running RPC
> by default if you want to use it. This argument, of course, hinges on
> my skepticism of secure remote dom0 access.
>
> I'm not sure what security is added by having a default allow Qubes
> RPC policy, but once again, this could be mitigated with secure dom0
> access.

I don't think manually allowing each time something must be used makes
much sense at all in a server environment (where everything is
expected to be automated, rather than as a direct result of user
actions). The qrexec policy framework makes sense as a mechanism to
clearly define allowed inter-vm data flow.

Given that actions on a server are not likely to be directly
user-triggered anyway, I don't think a user would even have much
meaningful information with which to even detect when an "allow" is
unexpected, and therefore I don't think is more useful than "allow
always".

> I think the NIC still must be trusted in some form or fashion,
> however, as a rogue attacker in the network vm could just shut off
> access to whatever secure management VM being utilized. I'm not sure
> how to classify this though.

Simple Denial of Service. And sure, but there are tons of other ways
to do that which do not involve exploiting flaws in my NIC, and (more
importantly) doing so doesn't lead an attacker to any more useful
ability than they had already with respect to the things I'm actually
trying to protect.

> I was suggesting that Qubes features may not provide more security in a 
> server environment.

The case I am making is for their utility (hopefully) without
significantly reduced security. I am definitely not claiming increased
security compared to Xen alone.


Anyway, I didn't mean to start a discussion arguing in favor of Qubes
over other things as a server. It is clearly not designed for that. I
only meant to point out that those who see fit to use it as a server
are not necessarily unjustified in doing so.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_Bpf1x_jKXQp4gg-CZJNCXKfYKC3aopcWJkSrPMDXaudg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread Unman
On Sat, Dec 24, 2016 at 12:30:01AM +, Unman wrote:
> On Fri, Dec 23, 2016 at 11:22:19PM +, 5okw9s+3z82eo5bmcv8k via 
> qubes-users wrote:
> > I've just deleted the file, but the "Template: fedora-23" -> Add more 
> > shortcuts" is still there ... :(
> > 
> 
> Strange, it removed the entry for me.
> 
> have you tried xfdesktop --reload?
> 
What about in .config/menus?
Do you have a user-fedora-23-vm entry there in applications-merged?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161224020654.GA4463%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: most secure way to add repo to template

2016-12-23 Thread '01v3g4n10' via qubes-users
On Friday, December 23, 2016 at 11:14:32 PM UTC, Eva Star wrote:
> Hello,
> 
> What is the "right" way to add other repositories then RPMFusion to 
> template?
> 
> Do I need to disable Qubes Firewall, then download *.repo file with curl 
> and add it with sudo dnf intall newrepofile.repo ?
> Or some other better and more secure way available?
> 
> 
> -- 
> Regards

I created a clone of my fedora-24 template and called it fedora-24-plus and 
then issued the following commands inside that template. Whether or not you 
create a clone or not depends on your trust of RPM Fusion.
sudo dnf config-manager --set-enabled rpmfusion-free rpmfusion-nonfree
sudo dnf upgrade --refresh

https://www.qubes-os.org/doc/software-update-vm/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/719a2351-6bf4-49bd-a5b4-4561496afdca%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: most secure way to add repo to template

2016-12-23 Thread '01v3g4n10' via qubes-users
On Friday, December 23, 2016 at 11:14:32 PM UTC, Eva Star wrote:
> Hello,
> 
> What is the "right" way to add other repositories then RPMFusion to 
> template?
> 
> Do I need to disable Qubes Firewall, then download *.repo file with curl 
> and add it with sudo dnf intall newrepofile.repo ?
> Or some other better and more secure way available?
> 
> 
> -- 
> Regards
I created a clone of my fedora-24 template and called it fedora-24-plus and 
then issued the following commands inside that template. Whether or not you 
create a clone or not depends on your trust of RPM Fusion.

sudo dnf config-manager --set-enabled rpmfusion-free rpmfusion-nonfree
sudo dnf upgrade --refresh

https://www.qubes-os.org/doc/software-update-vm/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/28084b5a-e584-4870-aa7b-5ae30b743629%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes as Server OS?

2016-12-23 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/23/2016 07:09 PM, Jean-Philippe Ouellet wrote:
>> If you can't access dom0, qrexec is default allowed,
> 
> Uhh What? Can you elaborate?

qrexec usage is normally defined by an RPC. This RPC has a policy,
either allow, deny, or ask. My understanding is that if you don't have
access to dom0 to respond to a prompt, you must allow the running RPC
by default if you want to use it. This argument, of course, hinges on
my skepticism of secure remote dom0 access.

>> which removes the added security of it.
> 
> Definitely not entirely.

I'm not sure what security is added by having a default allow Qubes
RPC policy, but once again, this could be mitigated with secure dom0
access.

> 
>> If you're remotely accessing dom0, you're adding the networking
>> stack to the TCB,
> 
> Not necessarily. At least your NIC need not be trusted, potentially
> more.

I think the NIC still must be trusted in some form or fashion,
however, as a rogue attacker in the network vm could just shut off
access to whatever secure management VM being utilized. I'm not sure
how to classify this though. An attack on the NIC could stop remote
management, but I don't think this would harm security. In any case,
there is a lot to be added to the TCB by allowing network access, like
a management VM, that makes me question its usefulness.

>> and once again have a basic Xen installation with extra
>> unnecessary overhead.
> 
> ... and if overhead is your primary concern, why even bother with
> Xen at all? Why not use containers or such.

Overhead relative to functionality. A type 1 hypervisor offers better
isolation than containers, and I was suggesting that Qubes features
may not provide more security in a server environment.

- -- 
kulinacs 
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEPL+ie5e8l/3OecVUuXLc0JPgMlYFAlhdwsoACgkQuXLc0JPg
MlaxFxAAl8ElXNawe9okc1RkzE6jbZUyEXK4r3n2SHsdZh1L2VIgmDBhcZankrm5
FoTMCpcqpoUIFde1PyaA5ZiIC9wCgDaiLMRHRkblCV6CYZ+7mufb0hUUX98jngLS
Qkgee6lE0qB4iZWbtMKyOjlZbkODe1y8L65MjYB6qEy28IaXlHD64rptMi86qnvS
4Wag811+4Uox9reWCY5cmqriyMmx5sQN2cauWOausYIB8GRk/yYRXAk4Ex7bSuYh
DXHrS2RIyZ9w5M7By1hcKaD+n29AJ42xVmJPlnK7kcTV67yO/gW7PDjwlLQj5W7F
b2Ql4IBv56eTjP16cEeiq95K24enfx6drHBJuyRbopGVleAsGP4ZXroxZbufPxpf
vrV6hdcxPoDZ+vigfdQTP5pxtZYk4msut0rAYi/36fhhvCkSmYYPDEZXUzlFg0us
wSCw/9Tf/mir5aG7vNa4UzF2NKJRZHoudG+Td5cAJULpCgnocaQ+K27fOpA3UrK2
LzEuZi1iG5KbXyRueeOi+PYYtDuf86vFBxS1z79fooEN1mu8ksv4IsJcG5lbs6p2
C3398XeoyuE5oy+fzSXgU+Yem2w5AQ4PNIfzU+5XDXG9tBHXMXbjL/EhHAIxldgq
C0fce2Sfdw+pPj6nyE5qDe0gsvCotQgkjC1/NZmx/i/7FqaOUL8=
=SWEu
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9fb2cfd4-7b14-84d4-e3f7-6328bc0bf288%40kulinacs.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread Unman
On Fri, Dec 23, 2016 at 11:22:19PM +, 5okw9s+3z82eo5bmcv8k via qubes-users 
wrote:
> I've just deleted the file, but the "Template: fedora-23" -> Add more 
> shortcuts" is still there ... :(
> 

Strange, it removed the entry for me.

have you tried xfdesktop --reload?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161224003001.GA11565%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes as Server OS?

2016-12-23 Thread raahelps
On Friday, December 23, 2016 at 6:41:27 PM UTC-5, Jean-Philippe Ouellet wrote:
> On Fri, Dec 23, 2016 at 6:10 PM,   wrote:
> > but if its sole purpose is just being a server then who even cares if dom0 
> > is compromised or not?
> 
> I strongly disagree.
> 1) If your server performs more than one purpose, having strong trust
> boundaries as (attempted to be) provided by Xen is still very much
> desired.
> 2) A non-compromised dom0 still adds another layer of defense against
> an adversary who has fully compromised a guest from being able to
> persist via access to low-level devices, such as possibly reflashing
> your bios. This of course has to be weighed against the risk of
> additional complexity introduced by running a hypervisor in the first
> place. Xen does have bugs...
> 
> > might as well just use xenserver.
> 
> Sure. For a lot of use cases I agree that indeed makes more sense. I'm
> only claiming that, while Qubes is not designed with servers as a
> priority at all, there are still features that one may find beneficial
> in that context.
> 
> > I would use a cloud instead imo lol.
> 
> Different strokes for different folks. :)

ya but my point is if it infects the guest then who cares about dom0. but you 
say your server would be used for more then one purpose so I guess its diff. 
But even still.  unless you plan to have all your diff "server vms" 
integrate/interact with each other in some way it doesn't make sense to me to 
use qubes instead of xen.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6c053905-f514-4eb2-9e6a-846d105d0c5d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes as Server OS?

2016-12-23 Thread Jean-Philippe Ouellet
On Fri, Dec 23, 2016 at 6:04 PM, Nicklaus McClendon
 wrote:
> I'm intrigued. How is qrexec utilized?

Something which I have not set up yet, but intend to soon, is a split
email server model, where the MTA and MDA are in separate VMs, and
incoming mail is delivered over qrexec. This would have the property
that an exploited SMTP server would not have any access to
already-delivered mails (assuming residual message contents are not
left hanging around in memory too long). Furthermore, I could have
multiple separate mail-sink VMs (with local mail storage and IMAP
servers), which are connected to separately via different instances of
my mail client on my Qubes laptop.

This means I could heuristically filter my mail based on assumed
purpose (for example, mail to a qubes mailing list go to one VM, mail
from my bank goes to another, etc.). This means a compromised mail
client on my Qubes laptop would be restricted to only the mail that
domain is expected to have, and pivoting from that compromised client
to compromising my IMAP server would not be sufficient to obtain the
mail from a different domain.

Additionally, the usual mail pipeline suspects like spamassasin,
clamav, etc. could be run in a DispVM per message (a super heavyweight
solution to be sure, but should not matter for personal mail workloads
on my own server).

> If you can't access dom0, qrexec is default allowed,

Uhh What? Can you elaborate?

As far as I understand and can verify, this is not the case:
[user@dom0 ~]$ /usr/lib/qubes/qrexec-policy --just-evaluate 56 disp8
disp9 qubes.Filecopy foo
[user@dom0 ~]$ echo $?
0
[user@dom0 ~]$ DISPLAY= /usr/lib/qubes/qrexec-policy --just-evaluate
56 disp8 disp9 qubes.Filecopy foo
qrexec-policy: cannot connect to X server
[user@dom0 ~]$ echo $?
1

> which removes the added security of it.

Definitely not entirely.

> If you're remotely accessing dom0, you're adding the networking stack to the 
> TCB,

Not necessarily. At least your NIC need not be trusted, potentially more.

> and once again have a basic Xen installation with extra unnecessary overhead.

... and if overhead is your primary concern, why even bother with Xen
at all? Why not use containers or such.

> qrexec with a networked dom0 doesn't seem anymore secure than using SSH to 
> run remote scripts between networked VMs.

Assuming you mean SSH between the VMs, I'm not sure I agree.
Networking has a much larger attack surface, and you are relying on
crypto with keys that can be stolen rather than vchan where the
authenticity of source and dest and integrity of msg contents are
already trusted. OTOH, OpenSSH has a pretty stellar track record and
has likely received more scrutiny than vchan (which I have not audited
myself yet either), so I can certainly understand the contrary
argument too.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_B8-NH1Da3S%2BLu0bhAZhp_vnUNsL-bLK_A2HHOaUykFzw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes as Server OS?

2016-12-23 Thread Jean-Philippe Ouellet
On Fri, Dec 23, 2016 at 6:10 PM,   wrote:
> but if its sole purpose is just being a server then who even cares if dom0 is 
> compromised or not?

I strongly disagree.
1) If your server performs more than one purpose, having strong trust
boundaries as (attempted to be) provided by Xen is still very much
desired.
2) A non-compromised dom0 still adds another layer of defense against
an adversary who has fully compromised a guest from being able to
persist via access to low-level devices, such as possibly reflashing
your bios. This of course has to be weighed against the risk of
additional complexity introduced by running a hypervisor in the first
place. Xen does have bugs...

> might as well just use xenserver.

Sure. For a lot of use cases I agree that indeed makes more sense. I'm
only claiming that, while Qubes is not designed with servers as a
priority at all, there are still features that one may find beneficial
in that context.

> I would use a cloud instead imo lol.

Different strokes for different folks. :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_DVX-8EvfKJ9fH2Suc5A9ZkaihMgPn4LgtMcAZ1LowhUQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] most secure way to add repo to template

2016-12-23 Thread Eva Star

And additional question:

warning: 
/var/cache/dnf/rpmfusion-free-1f0078b3844b9b8a/packages/vlc-3.0.0-0.1.fc24.x86_64.rpm: 
Header V4 RSA/SHA1 Signature, key ID b7546f06: NOKEY

Importing GPG key 0xB7546F06:
 Userid : "RPM Fusion free repository for Fedora (24) 
"

 Fingerprint: 55E7 903B 6087 98E4 EC78 64CD 9F63 8721 B754 6F06
 From   : /etc/pki/rpm-gpg/RPM-GPG-KEY-rpmfusion-free-fedora-24
Is this ok [y/N]:


IS IT OK? What to do?


--
Regards

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2b9cf4c3-ae11-8bb3-3164-f2f573507731%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread 5okw9s+3z82eo5bmcv8k via qubes-users
I've just deleted the file, but the "Template: fedora-23" -> Add more 
shortcuts" is still there ... :(






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5845f4029b83791b53e0e5115b7f22e2a352%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes refuses to boot

2016-12-23 Thread raahelps
Did you check your bios settings?  w/e awesomebunny said,  check for usb 
settings or external drive settings.  maybe something somewhere.  and besides 
not burning it with rufus don't know what else to suggest.  never had those 
live usb issues.  only used it twice on two diff machines.  one I built for 
qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/784972dc-cd7c-4b04-a73b-24327a82c109%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] most secure way to add repo to template

2016-12-23 Thread Eva Star

Hello,

What is the "right" way to add other repositories then RPMFusion to 
template?


Do I need to disable Qubes Firewall, then download *.repo file with curl 
and add it with sudo dnf intall newrepofile.repo ?

Or some other better and more secure way available?


--
Regards

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/277a83cc-2759-6c83-6f43-07fa65a333d2%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes as Server OS?

2016-12-23 Thread raahelps
)

but if its sole purpose is just being a server then who even cares if dom0 is 
compromised or not?  might as well just use xenserver.   if you talking about 
hosting something on your home desktop i guess thats a different story. I would 
use a cloud instead imo lol.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b82bb135-8e54-43b0-b071-3c24373eda04%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes as Server OS?

2016-12-23 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/23/2016 05:18 PM, Jean-Philippe Ouellet wrote:
> ... except with decent dom0 disaggregation working out of the box, 
> and I'm personally making good use of qrexec in a server context
> as well.
> 
> Securely accessing dom0 remotely is left as an exercise for the 
> reader. ;)
> 

I'm intrigued. How is qrexec utilized? qrexec is better than networked
access in the case of Qubes because it is verified through dom0, which
is part of the TCB. If you can't access dom0, qrexec is default allowed,
which removes the added security of it. If you're remotely accessing
dom0, you're adding the networking stack to the TCB, and once again have
a basic Xen installation with extra unnecessary overhead. qrexec with a
networked dom0 doesn't seem anymore secure than using SSH to run remote
scripts between networked VMs.
- -- 
kulinacs 
-BEGIN PGP SIGNATURE-
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=2+BL
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84d8b7d8-4f21-3d3d-7b4a-955a66d0a705%40kulinacs.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Strategy: Qubes needs flexible automation more than other OSes due to its security-by-separation architecture: Should we initiate a cross-platform project?

2016-12-23 Thread Jean-Philippe Ouellet
On Thu, Dec 22, 2016 at 11:00 PM, Leeteqxv  wrote:
> (Ref. "I wish there was a magical menu entry that could do this:"
> - "Enforce restarting sys-net/sys-Firewall and temporarily take down any
> open VM that are blocking the restart, and then subsequently start them all
> again afterwards WITH all the software that was running inside each one
> too...")
>
> (If that is too much to ask for a script, then imagine the daunting task
> every time one has to do that manually.)

You mean like this?
https://gist.github.com/jpouellet/aaeecdf34b2d066371a5acfead978467/d23fcecb7150fa10921c54ba9dac9ed7f0e5c20a

But it is likely that you actually want this instead:
https://www.qubes-os.org/doc/wireless-troubleshooting/

> Qubes has a deeper motivation for this kind of automation than other OSes
> due to the consequences of security dilemmas stemming from the separation of
> tasks/VMs etc.
>
> Maybe Qubes does not have a choice, but to actually tackle this challenge at
> it roots.
>
> If I am right about that, then we can look at this from a strategic point of
> view, as an oppurtunity to take the lead:
>
> The above linked other issue is a good example on exactly what we want a
> computer to automate in general.

Or... we could focus on the massive backlog of qubes-specific problems to solve.

> The world does not need the (overhyped) "Artificial Intelligence"
> developments so much as really flexible automation like this example. We are
> far away from creating anything intelligence-like, but these automation bits
> are well within our reach even without any "A.I."
>
> Because we are all in the same boat regarding all the dilemmas, caveats and
> workarounds in the struggle to stay as secure as possibl as convenient as
> possible, Qubes has a unique challenge that is much larger and much more
> deep felt than any other OS users has: for a workable interface to this kind
> of automation.
>
> Maybe an opportunity or potential benefit lies within this challenge:
>
> Could we invite A.I. developers into a cross-platform Linux project that
> aims at providing tools to let users manage, configure, schedule, etc.
> automation like this through the GUI, so we make sure we are at the helm of
> such developments and thus have even greater influence to affect its
> direction to cover our (extra) needs?

There is already way more work to do than man-hours available.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_CWM935RUz5H%2BCdzDctvG0o%2BUc72e87i-Jne3O_s5GyFw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread Unman
On Fri, Dec 23, 2016 at 10:13:51AM -0800, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-12-23 10:03, 5ognsv+cgmw660ivgebs via qubes-users wrote:
> > Unfortunately no. Hi suggestion was the same as proposed on the
> > qubes page - https://www.qubes-os.org/doc/remove-vm-manually/
> > 
> > It only removes all the icons on the xfce menu with the exception
> > of the one I just mentioned "Template: fedora-23" -> Add more
> > shortcuts"
> > 
> 
> Sorry, didn't realize it was already on the page.
> 
> Ok, how about this?
> 
>   $ rm ~/.local/share/desktop-directories/fedora-23-vm.directory
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org

Look in /etc/xdg/menus.
You will want to remove the file fedora-23-vm.menu, which is probably in
applications-merged.

Try that

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161223214125.GA9793%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes refuses to boot

2016-12-23 Thread user
On Friday, December 23, 2016 at 2:07:51 PM UTC-5, raah...@gmail.com wrote:
> from windows you can try rawrite32.exe  thats what I use. 
> https://www.netbsd.org/~martin/rawrite32/download.html  might sound like a 
> long shot, but worth a try at least.I have had Qubes usb problems myself 
> cause either bad drive or not enough space.  one time everything worked right 
> and I was just missing a kernel I wanted to install from the repos, or for 
> some reason I had a different default kernel,  and i coudln't figure out why 
> lol.

On Friday, December 23, 2016 at 2:09:06 AM UTC-5, tai...@gmx.com wrote:
> I have had many problems with rufus fucking up linux iso writing.
> 
> Try using dd to write the iso in linux (NOTE: BE VERY CAREFUL - Use 
> /dev/disk/by-id to do writing instead of /dev/sdX or else you could 
> easily nuke your data)
> 
> Whats the model of your laptop you want to install on? I check manual 
> for you to see what is up.

I don't think it's an error with writing the iso to my usb because my other 
(older) laptop can boot from the live usb fine. My main laptop I'm trying to 
boot from is an Alienware M17X (which is on the compatibility list). 

So far, I've tried booting from the live iso and installed qubes with varying 
success. On my Alienware, I can't boot the live iso and get a blinking cursor 
booting the installed qubes. On an old Gateway laptop, I can boot the live iso 
fine, but the installed qubes reboots. Finally, on an old desktop, both the 
live and the installation yield a blinking cursor (with the live's appearing a 
few minutes after selecting from the GRUB menu).

I'm about ready to just give up and wait until Qubes gets broader hardware 
compatibility and stability.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d189780-eb7e-4ee9-825c-016791bcbe3d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes refuses to boot

2016-12-23 Thread raahelps
On Friday, December 23, 2016 at 12:42:04 AM UTC-5, QubesPls wrote:
> On Wednesday, December 21, 2016 at 10:54:03 PM UTC-5, raah...@gmail.com 
> > maybe a silly question but can you boot another os from usb drive?
> 
> Yes, I can boot other linux distros like Debian and Mint perfectly fine from 
> my USB. Qubes installed to my external HDD (I also installed it to another 
> USB, but both have the same result) doesn't show the GRUB menu, only a 
> blinking cursor that's unresponsive to keyboard input.
> 
> When I tried the Qubes live image, I can select an option from the GRUB menu 
> and it tries to boot, but fails with the following (made the drive with 
> Rufus):
> Warning: /dev/disk/by-label/Qubes-R3.1-alpha1.1-x86_64-LIVE does not exist
> Warning: /dev/mapper/live-rw does not exist
> 
> I also tried to boot from the installation on the extrnal HDD on another 
> (significantly older w/ winXP) laptop and it repeatedly reboots during the 
> boot process (after the GRUB menu, but before entering the LUKS passphrase). 
> However, it does boot up the live image completely fine.

from windows you can try rawrite32.exe  thats what I use. 
https://www.netbsd.org/~martin/rawrite32/download.html  might sound like a long 
shot, but worth a try at least.I have had Qubes usb problems myself cause 
either bad drive or not enough space.  one time everything worked right and I 
was just missing a kernel I wanted to install from the repos, or for some 
reason I had a different default kernel,  and i coudln't figure out why lol.   

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f55ed68f-47f0-4375-ac22-8ef06e81cf9b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread 5ohvwk+ettamka73uo1w via qubes-users
I've done that also and the shortcut is still there :|






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21a222c8042d02146dd934ab6b697ce93c37%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 10:03, 5ognsv+cgmw660ivgebs via qubes-users wrote:
> Unfortunately no. Hi suggestion was the same as proposed on the
> qubes page - https://www.qubes-os.org/doc/remove-vm-manually/
> 
> It only removes all the icons on the xfce menu with the exception
> of the one I just mentioned "Template: fedora-23" -> Add more
> shortcuts"
> 

Sorry, didn't realize it was already on the page.

Ok, how about this?

  $ rm ~/.local/share/desktop-directories/fedora-23-vm.directory

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=CMsi
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/693b6d68-1496-ff0f-0df1-bca519103512%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Unable to set coherent dma mask: disabling DMA

2016-12-23 Thread raahelps
On Friday, December 23, 2016 at 1:06:27 PM UTC-5, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Fri, Dec 23, 2016 at 10:04:00AM -0800, raahe...@gmail.com wrote:
> > I get the same exact messages on boot I noticed.   and right before that 
> > during boot I get 
> > 
> > Kernel: Error: Driver 'processor_aggregator' is already registered, 
> > aborting...
> > 
> > Also in journalctl I get dom0 Kernel: pnp 00:05: [dma 0 disabled]
> >  dom0 Kernel: pnp 00:06: [dma 0 disabled]
> > 
> > Does this mean iommu is not working right?  I don't notice any problems 
> > with qubes.
> 
> Most likely DMA handling for this particular device (whatever it is) is
> incompatible with Xen. If you don't observe any negative effects,
> nothing to worry about.
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJYXWeeAAoJENuP0xzK19cstQAIAI3Q71XDb2D7inEdLcZYt2xo
> DHjvmoFjbsEljpGpz+XOGK4AGIk8T/BCPGUyIpXN5AfQAlSqYTII3od83HpoYs7H
> T3gndp7r+wuiunuOWCY8rDdeQsqN5dr3Q6jYI8mz4HxNOeOHrm2kNTGElU2uIGL7
> 3TjjxTjq/EuzsaMDF9bH8IBi1x7rexbqg/lYc/8rqfWjm+3IFLTIxYOHGX/kVVie
> B6EEATWCIr0C7nt4IQB2N1JzjTL+3qmVUkylaJxZJsyKlhIiF6LBdl79oBOE16Q1
> 9aKIX7dOZBLQvmnFB0VP2uXEw69uw1C0EN1cmr36VaYPHTZeKpXfO4GNY1gvkbM=
> =a3d6
> -END PGP SIGNATURE-

tks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/57edac40-e81f-4919-817f-01cf5860a6d4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Unable to set coherent dma mask: disabling DMA

2016-12-23 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Dec 23, 2016 at 10:04:00AM -0800, raahe...@gmail.com wrote:
> I get the same exact messages on boot I noticed.   and right before that 
> during boot I get 
> 
> Kernel: Error: Driver 'processor_aggregator' is already registered, 
> aborting...
> 
> Also in journalctl I get dom0 Kernel: pnp 00:05: [dma 0 disabled]
>  dom0 Kernel: pnp 00:06: [dma 0 disabled]
> 
> Does this mean iommu is not working right?  I don't notice any problems with 
> qubes.

Most likely DMA handling for this particular device (whatever it is) is
incompatible with Xen. If you don't observe any negative effects,
nothing to worry about.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYXWeeAAoJENuP0xzK19cstQAIAI3Q71XDb2D7inEdLcZYt2xo
DHjvmoFjbsEljpGpz+XOGK4AGIk8T/BCPGUyIpXN5AfQAlSqYTII3od83HpoYs7H
T3gndp7r+wuiunuOWCY8rDdeQsqN5dr3Q6jYI8mz4HxNOeOHrm2kNTGElU2uIGL7
3TjjxTjq/EuzsaMDF9bH8IBi1x7rexbqg/lYc/8rqfWjm+3IFLTIxYOHGX/kVVie
B6EEATWCIr0C7nt4IQB2N1JzjTL+3qmVUkylaJxZJsyKlhIiF6LBdl79oBOE16Q1
9aKIX7dOZBLQvmnFB0VP2uXEw69uw1C0EN1cmr36VaYPHTZeKpXfO4GNY1gvkbM=
=a3d6
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161223180619.GS1239%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Unable to set coherent dma mask: disabling DMA

2016-12-23 Thread raahelps
I get the same exact messages on boot I noticed.   and right before that during 
boot I get 

Kernel: Error: Driver 'processor_aggregator' is already registered, aborting...

Also in journalctl I get dom0 Kernel: pnp 00:05: [dma 0 disabled]
 dom0 Kernel: pnp 00:06: [dma 0 disabled]

Does this mean iommu is not working right?  I don't notice any problems with 
qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53d97292-10c0-4a74-b346-32bec303cf7a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread 5ognsv+cgmw660ivgebs via qubes-users
Unfortunately no. Hi suggestion was the same as proposed on the qubes page - 
https://www.qubes-os.org/doc/remove-vm-manually/

It only removes all the icons on the xfce menu with the exception of the one I 
just mentioned "Template: fedora-23" -> Add more shortcuts"






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82b0e6def2ff69e254bfbbc1f82be6bff164%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] installing windows-tools inside React OS

2016-12-23 Thread tnt_bom_bom
i think most of us heard about React OS (which is like saying opensource 
windows) 

the installation of React OS succeeded 
torifying React OS with whonix-gw succeeded
installing windows-tools failed (which is the only thing needed for it to 
complete the image)

here is the log of windows-tools:- (also uploaded inside the text file)

`[02FC:0300][2016-12-23T15:27:00]i001: Burn v3.9.1208.0, Windows v5.2 (Build 
3790: Service Pack 2), path: D:\qubes-tools-WIN7x64-3.2.2.3.exe, cmdline: ''
[02FC:0300][2016-12-23T15:27:00]i000: Setting string variable 'WixBundleLog' to 
value 
'C:\DOCUME~1\DEFAUL~1\LOCALS~1\Temp\Qubes_Windows_Tools_3.2.2.3_20161223152700.log'
[02FC:0300][2016-12-23T15:27:00]i000: Setting string variable 
'WixBundleOriginalSource' to value 'D:\qubes-tools-WIN7x64-3.2.2.3.exe'
[02FC:0300][2016-12-23T15:27:00]i000: Setting string variable 
'WixBundleOriginalSourceFolder' to value 'D:\'
[02FC:0300][2016-12-23T15:27:00]i000: Setting string variable 'WixBundleName' 
to value 'Qubes Windows Tools 3.2.2.3'
[02FC:030C][2016-12-23T15:27:00]i000: Setting version variable 
'WixBundleFileVersion' to value '3.2.2.3'
[02FC:0300][2016-12-23T15:27:00]i100: Detect begin, 2 packages
[02FC:0300][2016-12-23T15:27:00]i101: Detected package: vcredist_x64.exe, 
state: Absent, cached: None
[02FC:0300][2016-12-23T15:27:00]i101: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, state: Absent, cached: None
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: DisableUac, state: Absent
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: Common, state: Absent
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: Complete, state: Absent
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: XenBase, state: Absent
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: XenPvDrivers, state: Absent
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: XenDisk, state: Absent
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: XenNetwork, state: Absent
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: CoreAgent, state: Absent
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: MoveProfiles, state: Absent
[02FC:0300][2016-12-23T15:27:00]i104: Detected package: 
qubes_tools_WIN7x64_3.2.2.3.msi, feature: GuiAgentWindows, state: Absent
[02FC:0300][2016-12-23T15:27:00]i199: Detect complete, result: 0x0
[02FC:030C][2016-12-23T15:27:02]i000: Setting numeric variable 
'EulaAcceptCheckbox' to value 1
[02FC:0300][2016-12-23T15:27:02]i200: Plan begin, 2 packages, action: Install
[02FC:0300][2016-12-23T15:27:02]w321: Skipping dependency registration on 
package with no dependency providers: vcredist_x64.exe
[02FC:0300][2016-12-23T15:27:02]i000: Setting string variable 
'WixBundleLog_vcredist_x64.exe' to value 
'C:\DOCUME~1\DEFAUL~1\LOCALS~1\Temp\Qubes_Windows_Tools_3.2.2.3_20161223152700_0_vcredist_x64.exe.log'
[02FC:0300][2016-12-23T15:27:02]i204: Plan 10 msi features for package: 
qubes_tools_WIN7x64_3.2.2.3.msi
[02FC:0300][2016-12-23T15:27:02]i203: Planned feature: DisableUac, state: 
Absent, default requested: Unknown, ba requested: Unknown, execute action: 
None, rollback action: None
[02FC:0300][2016-12-23T15:27:02]i203: Planned feature: Common, state: Absent, 
default requested: Unknown, ba requested: Unknown, execute action: None, 
rollback action: None
[02FC:0300][2016-12-23T15:27:02]i203: Planned feature: Complete, state: Absent, 
default requested: Unknown, ba requested: Unknown, execute action: None, 
rollback action: None
[02FC:0300][2016-12-23T15:27:02]i203: Planned feature: XenBase, state: Absent, 
default requested: Unknown, ba requested: Unknown, execute action: None, 
rollback action: None
[02FC:0300][2016-12-23T15:27:02]i203: Planned feature: XenPvDrivers, state: 
Absent, default requested: Unknown, ba requested: Unknown, execute action: 
None, rollback action: None
[02FC:0300][2016-12-23T15:27:02]i203: Planned feature: XenDisk, state: Absent, 
default requested: Unknown, ba requested: Unknown, execute action: None, 
rollback action: None
[02FC:0300][2016-12-23T15:27:02]i203: Planned feature: XenNetwork, state: 
Absent, default requested: Unknown, ba requested: Unknown, execute action: 
None, rollback action: None
[02FC:0300][2016-12-23T15:27:02]i203: Planned feature: CoreAgent, state: 
Absent, default requested: Unknown, ba requested: Unknown, execute action: 
None, rollback action: None
[02FC:0300][2016-12-23T15:27:02]i203: Planned feature: MoveProfiles, state: 
Absent, default requested: Unknown, ba requested: Unknown, execute action: 
None, rollback action: None
[02FC:0300][2016-12-23T15:27:02]i203: Planned 

Re: [qubes-users] Re: (Problem copying from dom0?)

2016-12-23 Thread Jean-Philippe Ouellet
2016-12-23 10:07 GMT-05:00 Andrew David Wong :
>> J'utilise un pc avec trois disques durs (ssd). L'os (ubuntu ou
>> qubes) est installé sur un ssd et mes fichiers importants sur les
>> deux autres.
>>
>> L'ensemble de mes disques durs n'est accessible que via Dom 0 mais
>> je ne parviens pas à faire un "simple" copier/coller de Dom 0 vers
>> une autre VM.

Si je comprends bien, vous voulez avoir acces aux fichiers sur vos
disques secondaires dans un AppVM.

qvm-block [1] a été créé pour exactement ce.

Il utilise comme:
  $ qvm-block -a /dev/sdb1 some-vm
dans dom0, ou sdb1 est le nom d'un disque que vous voyez dans la
sortie de la commande `lsblk` (aussi dans dom0).

[1]: https://www.qubes-os.org/doc/dom0-tools/qvm-block/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_DzdyZb5-qePdVVr%3DBrhEt_1S8Lj-sjdKJTr_ysVSQiGg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 05:42, 5oexnl+dvb1c8ugzk0yk via qubes-users wrote:
> Thanks.
> 
> Unfortunately that does not remove the "Template: fedora-23" -> Add
> more shortcuts" from the xfce menu. Is simply remains there.
> 

Did Xv3g4n X's suggestion work?

> The below command will remove it from the xfce menu.
> 
> sudo rm ~/.local/share/applications/fedora-23-*

If so, we can add it to the page.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=7+tm
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/187f4487-a009-694c-7d3a-76ec168a024b%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: (Problem copying from dom0?)

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 06:35, N. POULAIN wrote:
> Bonjour,
> 
> Désolé mais je ne comprends que très mal l'anglais, c'est l'un des 
> problèmes que je rencontre ...
> 
> Je n'ai découvert Linux qu'il y a quelques mois et suis donc un
> "noob" comme disent les jeunes geeks ; hélas je ne suis ni jeune ni
> geek.
> 
> J'ai découvert Qubes il y a quelques semaines et ce logiciel me
> semble véritablement formidable, bravo à toute l'équipe pour le
> travail réalisé.
> 
> J'utilise un pc avec trois disques durs (ssd). L'os (ubuntu ou
> qubes) est installé sur un ssd et mes fichiers importants sur les
> deux autres.
> 
> L'ensemble de mes disques durs n'est accessible que via Dom 0 mais
> je ne parviens pas à faire un "simple" copier/coller de Dom 0 vers
> une autre VM.
> 
> J'ai bien vu que votre site préconisait une ligne de commande mais
> je ne sais pas s'il faut l'intégrer dans le terminal de Dom 0 et
> comment l'adapter aux spécificités de mon matériel !
> 
> qvm-copy-to-vm  
> 
> 
> Je suis conscient du ridicule de vous interpeller ainsi, j'accumule
> les handicaps old / frenchy / noob :-(
> 
> Peut être la future version Qubes 4.0 répondra t-elle mieux à mes 
> attentes et incluera, dans l'idéal, une traduction française de
> vos conseils déja assez techniques.
> 
> 
> 
> Très cordialement,
> 
> 
> 
> Nicolas
> 

Bonjour Nicolas,

Merci pour votre message.

D'après ce que j'ai compris, vous avez un problème avec la copie de
dom0. Nous avons ici des documents à ce sujet:

Https://www.qubes-os.org/doc/copy-from-dom0/

Si je n'ai pas bien compris, peut-être un de nos utilisateurs
francophones peut vous aider ou aider à traduire le problème en
anglais. J'ai CCed la liste de diffusion qubes-users. Veuillez garder
la liste CCed dans vos réponses.

Au fait, avez-vous vu les vidéos-guides français de Paf LeGeek? Toi
Peuvent les trouver utiles:

https://www.qubes-os.org/video-tours/

Cordialement,
Andrew

- ---

Hello Nicolas,

Thank you for your message.

- From what I gather, you're having a problem with copying from dom0. We
have documentation on that here:

https://www.qubes-os.org/doc/copy-from-dom0/

If I have not understood correctly, perhaps one of our French-speaking
users can better assist you or help to translate the problem into
English. I have CCed the qubes-users mailing list. Please keep the
list CCed in your replies.

By the way, have you seen the French video guides by Paf LeGeek? You
may find them helpful:

https://www.qubes-os.org/video-tours/

Sincerely,
Andrew

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=2JJL
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c7123a5f-898f-4624-a4be-fa285e34244a%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Unable to install SEH UTN Manager in Win7 hvm

2016-12-23 Thread Jarle Thorsen
onsdag 23. november 2016 08.53.31 UTC+1 skrev Jarle Thorsen følgende:
> I am unable to install SEH UTN Manager 
> (https://www.seh-technology.com/fileadmin/user/downloads/deviceserver/tools/sehutnmanager-win-3.0.21.zip)
>  in my win7 hvm.
> 
> I have tried both with/without QWT installed.
> 
> The problem seems to be related to signing of the driver, see attached 
> screenshots.
> 
> I never had any problems getting this working outside of QubesOS, so I'm 
> guessing this is a QubesOS/XEN limitation?
> 
> Feel free to download and install SEH UTN Manager from the link provided.
> 
> Hope somebody is able to explain why this is failing in QubesOS, and if there 
> is a way forward?

With help from the support-team at SEH Computertechnik (the company behind the 
product) we have now figured out that this problem is limited to the latest 
version of SEH UTN Manager only. Probably related to SHA2 signing of drivers. I 
have now installed UTN Manager 3.0.18 and it works without a hitch! 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/abe0bfed-0b43-4d51-8c86-d6d2c1483a47%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 04:21, 5ods21+bhli4tkpnltow via qubes-users wrote:
> Forgot to mention that the dom0 still references updates from
> "Fedora 23 - x86_64" whilst running "qubes-dom0-update" and not
> from fedora 24.
> 
> Is there a way that this can be changed?
> 

In Qubes 3.2, dom0 is based on Fedora 23, not Fedora 24:

https://www.qubes-os.org/doc/supported-versions/#dom0

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=6btj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed117fb5-ddb3-2474-16ab-bbe277e0ebf9%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 04:03, 5ods21+bhli4tkpnltow via qubes-users wrote:
> Thank you. Practically all entries were removed from the xfce menu,
> with the exception of one "Template: fedora-23" -> Add more
> shortcuts" How can I remove any trace of the fedora-23 template by
> hand? Does anyone knows?
> 
> 
> Thank you
> 

https://www.qubes-os.org/doc/remove-vm-manually/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=ovx3
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e24b7ba-3fef-7a59-36ff-1a77415e0c49%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to search, reinstall or remove qubes-templates installed via rpm?

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-23 02:49, Marek Marczykowski-Górecki wrote:
> On Thu, Dec 22, 2016 at 11:56:13PM -0800, Andrew David Wong wrote:
>> On 2016-12-22 07:33, J. Eppler wrote:
>>>
> 1. How can I search for qubes-templates in dom0 rpm repository? The 
> qubes-dom0-update tool excludes all templates from a search.
>

 $ sudo qubes-dom0-update --action=search qubes-template

 This will pass through the terminal output from the UpdateVM, so even
 though templates are excluded in the dom0 dnf command, you'll still get
 the search results (in red text by default).

 Remember that you won't see community templates unless you enable their 
 repo:

 $ sudo qubes-dom0-update --enablerepo=qubes-templates-community 
 --action=search qubes-template
>>>
>>> Reading red text is not a really good solution from an usability 
>>> perspective. What are the reasons to exclude templates from a search in the 
>>> first place?
>>>
> 
>> Actually, after further testing, I've found that this doesn't work. Even 
>> with `--enablerepo=qubes-templates-community`, I'm only getting the Fedora 
>> and Arch templates in search results (not Whonix or Debian). Without 
>> `--enablerepo=qubes-templates-community`, I only get the Fedora templates in 
>> the search results. So, this method doesn't work. Moreover, the results are 
>> inconsistent, since Debian is in the official templates-itl repo, whereas 
>> Arch is in the templates-community repo.
> 
>> Marek, any idea what's going on here?
> 
> Already installed templates are excluded from every qubes-dom0-update
> operation. Mostly to not accidentally upgrade such package - which would
> override all the changes made inside (including installed packages,
> applied updates etc). Currently the only exception is "reinstall"
> action, with one specific template given as an argument. There is a plan
> to extend this to some other actions:
> https://github.com/QubesOS/qubes-issues/issues/2527
> 
> But in general, we need some better mechanism to distribute templates,
> this is one of the reasons...
> 

Oh, I see. Tracking:

https://github.com/QubesOS/qubes-issues/issues/2534

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=iBqt
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/888072ec-cc35-2d87-90d3-5fad07e7d512%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread 5ods21+bhli4tkpnltow via qubes-users
Forgot to mention that the dom0 still references updates from "Fedora 23 - 
x86_64" whilst running "qubes-dom0-update" and not from fedora 24.

Is there a way that this can be changed?






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2294c6361dd9528807e3a2165e66a9e5ea34%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-23 Thread 5ods21+bhli4tkpnltow via qubes-users
Thank you.
Practically all entries were removed from the xfce menu, with the exception of 
one "Template: fedora-23" -> Add more shortcuts"
How can I remove any trace of the fedora-23 template by hand? Does anyone 
knows?  


Thank you






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7549509ec28951dd80303a38036304995d27%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: HCL - LENOVO X1 Carbon 20BSCTO1WW

2016-12-23 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Dec 23, 2016 at 02:05:34AM -0800, Rob wrote:
> Hi George,
> 
> What do you mean by
> > 
> > Boot installation media and hit tab, adding (after "quiet")
> > ks=hd:sdb1:/ks.cfg
> 
> > Installation should run with no further interaction.
> 
> I am trying to get around the LUKS encryption section in the text based 
> installation of Qubes 3.2.
> When you say "tab" I am guessing you are exiting to a shell

It's about isolinux command prompt - in legacy (non-UEFI) mode.

> , so for v3.2 it is "Ctrl-Tab-F2"
> When you say "after quiet", I am guessing you are editing the following line 
> in the xen.cfg file...
> kernel=vmlinuz inst.stage2=hd:LABEL=Qubes-R3.2-x86_64 
> i915.preliminary_hw_support=1 quiet rhgb
> 
> to become:
> kernel=vmlinuz inst.stage2=hd:LABEL=Qubes-R3.2-x86_64 
> i915.preliminary_hw_support=1 quiet ks=hd:sdb1:/ks.cfg rhgb
> 
> however the whole filesystem is read-only and I cannot save the edit.

Actually, you can. You need to mount vfat partition (not iso9660 one) of
the installation disk (AFAIR it's the second partition). Note that
changing anything on installation disk will fail media verification, so
you may want to first start the installer just to verify it, then apply
above change and while starting for actual installation, go with just
"install" option, not "verify and install". Keep it in mind when editing
xen.cfg - those are separate sections there.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYXREhAAoJENuP0xzK19csApUH/34C27u8C5eRCt/BStM9EzRJ
dUvuZ8QomkLXvECdFhMBJq8s7JyprqWFzl6IQ0Lox7Ov+fbBkt5fzTKzFNws9NDe
jLpDD5miK02nfvI17FHpmiIfLlV+esRWdpf5aK5MX9Eb3Irmyrh+CnmIZStY7o/D
bq/WpY9LwMlpCMRtX9k1Y92YyrKH+3QCwk2qI74OLvA9Vaj1ao4pVQgxBfZSamKG
8vulLT8BkRtjWRY7I/q9LY6J875JcMqSuodA/3QVJqs+00tnlTBPFYqcrpQi3dtH
BqZPKtfGr1RF/WwoVR6W4Ad5AKsv1cNEcmbfv7Pm3E81xH+A7J9d+eVPEtT0ycw=
=cfhO
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161223115721.GQ1239%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to search, reinstall or remove qubes-templates installed via rpm?

2016-12-23 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Dec 22, 2016 at 11:56:13PM -0800, Andrew David Wong wrote:
> On 2016-12-22 07:33, J. Eppler wrote:
> > 
> >>> 1. How can I search for qubes-templates in dom0 rpm repository? The 
> >>> qubes-dom0-update tool excludes all templates from a search.
> >>>
> >>
> >> $ sudo qubes-dom0-update --action=search qubes-template
> >>
> >> This will pass through the terminal output from the UpdateVM, so even
> >> though templates are excluded in the dom0 dnf command, you'll still get
> >> the search results (in red text by default).
> >>
> >> Remember that you won't see community templates unless you enable their 
> >> repo:
> >>
> >> $ sudo qubes-dom0-update --enablerepo=qubes-templates-community 
> >> --action=search qubes-template
> > 
> > Reading red text is not a really good solution from an usability 
> > perspective. What are the reasons to exclude templates from a search in the 
> > first place?
> > 
> 
> Actually, after further testing, I've found that this doesn't work. Even with 
> `--enablerepo=qubes-templates-community`, I'm only getting the Fedora and 
> Arch templates in search results (not Whonix or Debian). Without 
> `--enablerepo=qubes-templates-community`, I only get the Fedora templates in 
> the search results. So, this method doesn't work. Moreover, the results are 
> inconsistent, since Debian is in the official templates-itl repo, whereas 
> Arch is in the templates-community repo.
> 
> Marek, any idea what's going on here?

Already installed templates are excluded from every qubes-dom0-update
operation. Mostly to not accidentally upgrade such package - which would
override all the changes made inside (including installed packages,
applied updates etc). Currently the only exception is "reinstall"
action, with one specific template given as an argument. There is a plan
to extend this to some other actions:
https://github.com/QubesOS/qubes-issues/issues/2527

But in general, we need some better mechanism to distribute templates,
this is one of the reasons...

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYXQE0AAoJENuP0xzK19csP14H/Ay+So3dsp0g1+xD2ILlQF6V
IXBHKNM7ZHj15p7DRxvCLi9VUMgmgYq8OtRaJwk+cOWqymC3J+ukHpHLWkcRQtDp
/Tp0H++/sSqniD1QjuqCBJi7IhRB30aF34mwiq8UGcFcQT1fK4nBMZG+fq9kHgHJ
vn1y/o7LmP8//GdDMRLobSFhWRq5yOCKAaWbFMBiQRLIoD2Mzp5lmghjYjQ1VERt
eDr2jq51tdll3No2hQFb/FBZe3x8fZGuPl37D41zEJd82yEn/UeTt6zV24Bfkohp
RqEBZZi7Fs6XICBOT98kTjrlOkjqsCDTER4Klf1O9YkZI384h2/Y2Rn0CgbVdzw=
=CY9p
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161223104924.GO1239%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - LENOVO X1 Carbon 20BSCTO1WW

2016-12-23 Thread Rob
Hi George,

What do you mean by
> 
> Boot installation media and hit tab, adding (after "quiet")
> ks=hd:sdb1:/ks.cfg

> Installation should run with no further interaction.

I am trying to get around the LUKS encryption section in the text based 
installation of Qubes 3.2.
When you say "tab" I am guessing you are exiting to a shell, so for v3.2 it is 
"Ctrl-Tab-F2"
When you say "after quiet", I am guessing you are editing the following line in 
the xen.cfg file...
kernel=vmlinuz inst.stage2=hd:LABEL=Qubes-R3.2-x86_64 
i915.preliminary_hw_support=1 quiet rhgb

to become:
kernel=vmlinuz inst.stage2=hd:LABEL=Qubes-R3.2-x86_64 
i915.preliminary_hw_support=1 quiet ks=hd:sdb1:/ks.cfg rhgb

however the whole filesystem is read-only and I cannot save the edit.

Please could someone assist?

Thanks,

Rob.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e20d7c62-8089-4474-af24-657f2894159e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Glitch: sys-net and sys-firewall start without "Start VM automatically on boot" setting enabled

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-22 21:12, wes.ak...@gmail.com wrote:
> @marc
> 
> You are right, unchecking the box "should" make them not startup.

Tracking this UX issue:

https://github.com/QubesOS/qubes-issues/issues/2533

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYXOYHAAoJENtN07w5UDAwFwkQAMEGiOD6iNjGm7IVoH6JSrm8
JqXxnBotCrRTrbzI5eNJKJDJKC8uxLLY/UAewDU9zaRd1+Tj/ZoV2Khb0IABTeS6
9Z+mBFTeFmZQHSGBmU16YzXgO2MllVJQs6XeOOi183QAV/Llu6sOhVT1odCuBZ8Y
BwQJZdrc+3aV0FPcVQHf0CAxRNLotAFq9KaIOxyBijv7JlMt/8+IkvDXq76lpHDq
ZMeL6UvH8dTQaVNKe6aZ+NPMpZAd6qn4WBE3PVdlHBALyAhokGZgmqaas9a6E8pZ
AmuZuylpJiAjOf1mPCU1QpfByJp+ObFvh3WzpaVXySGP50F+O5BTZqI3oq+sGvLi
60LMrF68TnLRJyKOuhzOD+ZRitKx/50KlA/KkPPyrcyU8UHSzwpdZWSvm6Vwgc3p
YAX4K2LSm0wEIpvVE9+3XjQhBB/qenQiRQ3+5FvmjoPpuy2gF6GuDvzeEXO886S4
VWc17QxU5WQlZOoZiiIWAhREgf+/M8VahIbQ/BaKP6VZ4disGzudpeCchRYG88s7
MJDqzB0yPQTRHhV0cTrqq/fqFIHYsePch4SyQTIFFInFXg8iBi3t+kWrh2zNSiyb
2BEo++102bV59lNoRPytFv0yKtV4LWhfajDuD7gGXj58OknMxW0NeqbRG4Pf2XbI
RrCjUHBt2jxIm/37pCon
=H7YM
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ca86d51-b172-79af-5b99-e25cc23471ef%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] "Cannot find unused qid!" when restoring backup

2016-12-23 Thread Jeremy Rand
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Andrew David Wong:
> On 2016-12-13 12:56, Jeremy Rand wrote:
>> Andrew David Wong:
>>> On 2016-12-12 21:30, Jeremy Rand wrote:
 I just tried to restore 5 VM's from a backup.  The backup was
  made on Qubes 3.0; I'm restoring to Qubes 3.2.  All 5 VM's 
 fail to restore with this error (although of course the name
 of the VM in the error message varies depending on what VM
 I'm trying to restore):
> 
 -> Restoring QubesAppVm iso-linux... ERROR: Cannot find
 unused qid! *** Skipping VM: iso-linux
> 
 The error was copied by hand since copying from dom0 to an 
 AppVM is difficult, so there might be a typo.  Based on the 
 error message, I infer that maybe this has something to do
 with my Qubes 3.2 system having too many VM's on it already?
 Is that an accurate guess, or is there a different reason for
 this error? Is there any workaround?
> 
 Cheers, -Jeremy
> 
> 
>>> The only other case in which I've seen this happen is when a
>>> user surpassed the maximum number of Qubes VMs (254):
> 
>>> https://groups.google.com/d/topic/qubes-users/Zw5XjZndrDo/discussion
>
>>>  Did you do the same?
> 
>> Looks like it.  I just checked and the highest final IP address 
>> octet is 253; add 1 for dom0 and it looks like I'm at the limit.
> 
>> I realize I'm probably much more gluttonous with VM's than most 
>> users, but is there by any chance any progress on increasing
>> that limit?
> 
>> Cheers, -Jeremy
> 
> 
> We can see if anyone's interested in providing a patch:
> 
> https://github.com/QubesOS/qubes-issues/issues/2519
> 
> Please understand that since this falls far outside of normal
> usage patterns and affects only a small minority of users, it's
> going to be a relatively low-priority issue. Therefore, it's
> unlikely that this will be changed soon, unless it either turns out
> to be trivial to change, or we receive a patch from the community.

Yes, totally understood -- seeing as I didn't pay anything for Qubes,
I certainly don't expect you to go out of your way to fix a minor
issue that so far has only affected 2 people.

Cheers,
- -Jeremy
-BEGIN PGP SIGNATURE-
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=ZrQN
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d0d2e441-3303-c9e1-2215-d5657daf8e1d%40airmail.cc.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Strategy: Qubes needs flexible automation more than other OSes due to its security-by-separation architecture: Should we initiate a cross-platform project?

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-22 20:00, Leeteqxv wrote:
> *Below is a Spinoff* from "[qubes-users] When Wi-Fi disconnects, it
> fails to reconnect: How to reset the Network interface (conveniently)
> without restarting everything?"
> 
> (Ref. "I wish there was a magical menu entry that could do this:"
> - "Enforce restarting sys-net/sys-Firewall and temporarily take down any
> open VM that are blocking the restart, and then subsequently start them
> all again afterwards WITH all the software that was running inside each
> one too...")
> 
> (To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/9cd39d03-b9db-1a2a-a2ac-938031621b99%40leeteq.com
> .)
> 
> 
> 
> 
> (If that is too much to ask for a script, then imagine the daunting task
> every time one has to do that manually.)
> 
> *Qubes has a deeper motivation for this kind of automation than other
> OSes due to the consequences of security dilemmas stemming from the
> separation of tasks/VMs etc.**
> *
> 
> *Maybe Qubes does not have a choice, but to actually tackle this
> challenge at it roots.*
> 
> *If I am right about that, then we can look at this from a strategic
> point of view, as an oppurtunity to take the lead:**
> *
> 
> The above linked other issue is a good example on exactly what we want a
> computer to automate in general.
> 
> The world does not need the (overhyped) "Artificial Intelligence"
> developments so much as really flexible automation like this example. We
> are far away from creating anything intelligence-like, but these
> automation bits are well within our reach even without any "A.I."
> 
> Because we are all in the same boat regarding all the dilemmas, caveats
> and workarounds in the struggle to stay as secure as possibl as
> convenient as possible, Qubes has a unique challenge that is much larger
> and much more deep felt than any other OS users has: for a workable
> interface to this kind of automation.
> 
> *Maybe an opportunity or potential benefit lies within this challenge:*
> 
> Could we invite A.I. developers into a cross-platform Linux project that
> aims at providing tools to let users manage, configure, schedule, etc.
> automation like this through the GUI, so we make sure we are at the helm
> of such developments and thus have even greater influence to affect its
> direction to cover our (extra) needs?
> 
> - LeeteqXV
> 

(Copying my reply from the other thread.)

You can simply change sys-firewall's NetVM to "none," restart sys-net,
then switch it back again. Sample script:

```
#!/bin/bash
echo "Restarting sys-net..."
qvm-prefs -s sys-firewall netvm none
sleep 3
qvm-shutdown sys-net
sleep 3
qvm-start sys-net
sleep 3
qvm-prefs -s sys-firewall netvm sys-net
sleep 1
echo "Done."
```

We don't need AI-level automation to solve this one. :)

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYXOO4AAoJENtN07w5UDAwY5wP/A+fF3sKSRZKULniV+JZ2NJu
UlmIjuSVJAm2Xz/Qad6aulbLJHCqq3krdDAzfB7l8GrvYQIWrvxmz2bVOHQR7Oyl
uwTWDRe58WJrb6fT0dacM+JIFypJJp1sD6yp+dQxOfVIPUREc6Y0YeMcz+ukJ9CG
Hp89XeAab5uwjXmQpLlcvPkXhSKtDDlG5J2BPEYsK7oQNUYG0/ckVX4k3DLJfVRS
7aT1cpIcchbM+UIszLhEILVd6REyS5lfNvzepqBIP6fr1gCY3v7GiOQspLdwDO7J
m8bv3RQIoX5V3QAF8o1388TnZmu0AgUoyQhphBSSAJ2C3WY8MQumTl+Zi+98a33a
LY2CDeyWMpYU4IDm4eGgtaik+hRuhMODKjtdXmcpGkMG1FxQA71/+enqxHXVg5u6
caPpXxGiQ76el7lc3R8TsmPN9yRNbQTyc+A2E6NgK3E7L6OUDhqV+D3bk78ci69T
UP51QEFpgud4HuEIPJwkNt5NRfR05RbAprwjC/fu5GwctvKSuoTcmjON+jDgJ5Fl
CBwhOwV8wLD5L6Qq0J1AO77F7BWiSFxt72Bmm7fYqE1X6PCpgiZbIgeX0cH2wACJ
uVM8RUL/lIGm9xtNN7KuSANHm4hBKiY6aDRofkSdK0Dz8A8zAXotzRHdaPKkhWjz
YYegni9DZLi9TLpMaDP/
=4xbS
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/beb945b3-bfc4-3716-3252-c7d35c5faba0%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Split GPG: thunderbird+enigmail stopped cache password

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-22 19:51, 'Gaea' via qubes-users wrote:
> Thanks Monsieur Ouellet.
> 
> I thought that there was a smaller version of Qubes that may be easier
> for me. I am totally new to all this. Been with WINDOWS, but want
> something more resistant to hacking & invasion of my privacy.
> 
> I managed to install Qubes 3.2. Now my google voice mail that records
> MP3 like voicemail.mp3 wont play. In windows all I have to do is click
> on (Play)
> 

It sounds like you just need a media player. I recommend VLC, which you
can download after enabling the RPMFusion repo. Instructions are here:

https://www.qubes-os.org/doc/software-update-vm/#rpmfusion-for-a-fedora-templatevm

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=VoUC
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3bd9b9b-5c56-6751-9c6e-eeb49c154635%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] When Wi-Fi disconnects, it fails to reconnect: How to reset the Network interface (conveniently) without restarting everything?

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-22 19:47, Leeteqxv wrote:
> On a test laptop I have a problem with the network hardware. It is 
> an old one, and I know that this is a case of almost-broken 
> hardware, so not really a Qubes problem.
> 
> If I restart the Sys-net, then it works again, so no need for a 
> full restart of the laptop. However, I wonder if there is a way to 
> get around the real annoyance in this case:
> 
> a) I cannot restart Sys-net as long as sys-Firewall is running, 
> and..: b) I cannot restart/stop sys-Firewall as long as there are 
> ANY AppVMs using it, so: c)  do I REALLY have to shut down all 
> programs and all VMs just to do this?
> 
> If I have to, can I at least be automated somehow?
> 
> *I wish there was a magical menu entry that could do this:* - 
> "Enforce restarting sys-net/sys-Firewall and temporarily take down 
> any open VM that are blocking the restart, and then subsequently 
> start them all again afterwards WITH all the software that was 
> running inside each one too..."
> 
> (Or is there another, less dramatic way to re-initiate the Wi-Fi 
> system?)
> 
> - LeeteqXV
> 

You can simply change sys-firewall's NetVM to "none," restart sys-net,
then switch it back again. Sample script:

```
#!/bin/bash
echo "Restarting sys-net..."
qvm-prefs -s sys-firewall netvm none
sleep 3
qvm-shutdown sys-net
sleep 3
qvm-start sys-net
sleep 3
qvm-prefs -s sys-firewall netvm sys-net
sleep 1
echo "Done."
```

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=6q6C
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ba54206-df67-a286-a581-3f939bac0d67%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Firewall Rules for Printer Access?

2016-12-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-22 15:48, superlative wrote:
> On Sunday, December 18, 2016 at 9:18:53 PM UTC-8, Andrew David Wong
> wrote:
>> If it's a network printer, then you probably want to allow access
>> to whichever IP address it has on your local network, e.g.,
>> 192.168.1.102.
>> 
> It is a USB printer, not a network printer. So I assume I don't
> need to mess with the firewall, and it should show up in the
> attach/detatch context menu on Qubes VM Manager. But it doesn't!
> What do I do if it doesn't show up there?
> 

No, a device will show up in that menu only if it's a *block* device
(e.g., flash drive, external hard drive). Since a USB printer is not a
block device, you should either print directly from the USB qube or
attempt USB passthrough, as raahelps said.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=tAd2
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5f5dc836-662b-fde3-e035-0534fb900df7%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.