Re: [qubes-users] emergency help

2017-02-21 Thread haaber
Hello,


problem solved. Live-system, mount SSD, rename corresponding template-vm
(-> genearet file not fund), and qubes boots again :)  Happysmile!  
Bernhard


On 02/21/2017 09:11 PM, haa...@web.de wrote:
> Hello,
> I made a big big error. I wanted to play with i2c: there is one in the
> external vga ... I though it is a nice starting point to avaoid usb in
> certain situations. Anyhow:  Since dom0 has no i2c tools, I installed
> them in an fedora-24-minimal test VM.
> Then, since I had no acces to the vga, I gave the appVM hardware acces
> to vga - result: immediate black screen.
> Reboot: again black screen. Sniff!
>  
> So please help me how (a) to boot with NO qubes started or (b) where
> to find (and modify)
> the accessible hardware  after having botted an external rescue system.
>  
> Thanks, Bernhard
> -- 
> You received this message because you are subscribed to the Google
> Groups "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to qubes-users+unsubscr...@googlegroups.com
> .
> To post to this group, send email to qubes-users@googlegroups.com
> .
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/trinity-8104bd87-08ed-4cd6-8fd1-9cd6cb352b72-1487707873460%403capp-webde-bs46
> .
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3e1d2f7-57c5-66d7-449f-eb96163a96e3%40web.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installation problem

2017-02-21 Thread johan
Installation problem solved. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dcb56345-f7ba-4678-8108-54696edfc798%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: no tpm, what now

2017-02-21 Thread pixel fairy
On Monday, February 20, 2017 at 8:08:47 AM UTC-8, jo...@vfemail.net wrote:
> hi.
> 
> since my laptop seems to have no tpm i can't install aem.
> 
> how con i try to protect my laptop now?

work with what you have and be aware of limitations. 

> there is an option im my efi to require a password on each boot (instead of 
> only requiring it when i access my efi).
> 
> does this offer any real protection?

no. its arguably worse, because it will force you to expose your efi password 
every time you boot. 

> 
> is there something else i can do?

try to make the hardware tamper evident. for example, glittery nail polish over 
screw holes, and take a picture. someone messing with it will have to remove 
it, or otherwise make it obvious. don't use stickers, all it takes is a syringe 
with acetone to temporarily disable those. 

use a usb qube.

depending your threat model, you could put the boot partition on a removable 
drive that you always keep with you. if your travelling, this might extend to a 
plastic bag in the shower. it might be tricky to combine this with having a usb 
qube. in theory, pivot root should allow for it.

thats just off the top of my head, im sure others will have interesting 
suggestions. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ff2d50b-c795-450f-a53a-c4a94839ce9e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Sierra Wireless MC7750 issues

2017-02-21 Thread Alchemist
On Tuesday, February 21, 2017 at 7:14:29 PM UTC-8, Alchemist wrote:
> Hello all, 
> 
> I have a Sierra Wireless MC7750, I'm trying to get it to work with Qubes, and 
> it seems to be failing. 
> 
> Here are the cases when I attach it to Sys-net 
> 
> Steps: 
> Attach it to sys-net 
> Create Mobile broadband connection 
> Select device in wizard (cdc-wdm0) 
> create connection
> Device times out. 
> 
> 
> And when I don't use sys-usb
> Create netVM "Verzion" 
> Attach to Verizon 
> device doesn't appear in Wizard
> have to modprobe it into existence
> Follow wizard
> Device fails to connect. 
> 
> MBIM tools say that the device cannot be communicated with, and yet it 
> appears in the wizard. 
> 
> 
> Ideas? 
> Suggestions? 
> 
> 
> Thank you.

An even more odd update, after a few hours I managed to get the device to pass 
through and even connect for a moment to the VZW network. 

Then for some reason the USB passthrough fails, and I need to reconnect it. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/58f918fd-ae12-4ccc-988b-55f255b653d1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] asus n56vz HCL update

2017-02-21 Thread Oleg Artemiev
On Tue, Feb 21, 2017 at 3:34 AM, Zrubi  wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 02/21/2017 02:59 AM, Oleg Artemiev wrote:
>
>> Attached file has more details. As usually I've replaced some
>> potentially unique numbers w/ XX.
> FYI:
>
>
> The things you are hiding are NOT unique to your device. Instead they
> are the exact device TYPE identifiers. Without those you can't even
> tell what device you are using. Means without those ids the HCL is
> pretty useless.
> Details:
>
> BIOS: what you are masked is the BIOS version.
> Different BIOS versions may affect some very important things like
> vt-d, vt-x, TMP
in my case chipset doesn't support it, not bios, thus no need to publish this.
(this information is available via link on dicscussion that realtes to
my old report, nothing has changed).

> VGA: you masked the PCI ID. It is the only real identification of the
> device:
> http://pci-ids.ucw.cz/
> NET: same as above. Without the proper masked ID you are not even able
> to cheese the right driver.
> SCSI: same again the masked id is the type number of your disk.
Any of these as a single entry are not identifying.

Combination of those could be enough to split target set from
thousands to single hundred .

That is not exact identify for law enforcement, but enough
identification for targeted attack in "spotter" terms  .
At least combining that data razes ease of targeting a single computer
from distribution center.
That is enough reason for me not to post this information even when I
trust Qubes team.

> However this is actually not relevant in Qubes.
Why then this is sent to HCL? Shouldn't we avoid unnecessary
information like HDD details at all (or
just ask for amount of free space (approximate, not exact, as exact
value on system partition may
help identify install) on assigned partitions)?

> Of course you can still decide to not share those - it is up to you.
Yes, I still do - see  'my reasons' below.

> I just wanted to make it clear to avoid confusion.
Thank you.I'll look for details on identification of devices w/ PCI ID.

As about my reasons:

There's difference between identification of a person from:

*) vendor site (any vendor that has made some software ether running
on my laptop)
*) from some government agency like fbi/nsa/fsb/whatever
*) from abilities that give just internet search for any curious hacker.

It's not a big deal to publish that info, since I trust Qubes team and
think I'm not that interesting person to spend time catching my
personal data - that is
probably useless for most of other people .

Though I do not trust Microsoft, but I use their OS for gaming. I do
not trust Google but I use a few android devices. I do not trust lots
of other non-evil-by-intent organizations.
Why? Lets imagine, that once, I become a person to catch by whatever
reason. Then what?

Then any information that I 've sent to the net is ready to use,
stored for the hunter pleasure and I cannot erase anything that once
has been sent to the net . Period.

I see no reason to allow technical reports w/ my personal hardware
details to any vendor (including Qubes) - all vendors usually operate
on more info than them
really need.  HDD information sent via HCL seem to be useless to
decide "is this laptop good enough to be able to Qubes?" Why not to
remove it?

We have a proverbial in Russia - "word is not a bird - once flew - no
chance to catch". Information you reveal into public should be
organized correctly independently to their
current importance level ,

My idea is that if Qubes team wants to get additional information from
users about spare parts - the HCL should get divided by at least two
parts:

1) laptop model compatibility list (w/ less information about details
(I guess within one model the hardware set is similar)).

2) hardware compatibility list w/ spare part list.

 I.e. if we want to know about some laptop model - one case, if we
want to get a list of compatible boards, network adapters, etc. -
another case.

And very important - the second case is subject for anonymization -
it should be hard to make a direct link between an exact spare part
and a user reported it.
Better even have in HCL a FIXME "Yes I'm okay for public link between
my person and data from this report". If this is not what a user want
- publish report anonymously.
BTW, I'm okay for current link from HCL page to a thread - anyone can
get my email and find out what a crappy hardware I use. ;)

Currently reporter is directly pointed via link to google group
discussion (if he/she agreed on that).

 I'm okay to send more details on my hardware once I'm sure:

*) details are not easily traceable to my one laptop from

*) reporter is not  easily traceable from reported entry by vendor

-- 
Bye.Olli.
gpg --search-keys grey_olli , use key w/ fingerprint below:
Key fingerprint = 9901 6808 768C 8B89 544C  9BE0 49F9 5A46 2B98 147E
Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/

[qubes-users] Deleted Ferdora-23 template, killed sys-net and sys-firewall

2017-02-21 Thread opiyvluc
I switched my appvms to the fedora-25 template but I forgot that sys-net and 
sys-firewall were still on fedora-23, and then I deleted the fedora-23 
template. Sys-net and sys-firewall both say "error no such file or directory 
'/var/lib/qubes/vm-templates/fedora-23/apps.templates'" when I try to start 
them (after reboot)
Before rebooting the network still worked but I couldn't open the settings 
thing to change the template vm for sys-net and sys-firewall

How can I somehow reinstall the fedora-23 template or change the sys-net and 
sys-firewall templates to fedora-25 or debian-8?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a4003195-8d29-4aa6-a44b-34d0ee00e34d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Sierra Wireless MC7750 issues

2017-02-21 Thread Alchemist
Hello all, 

I have a Sierra Wireless MC7750, I'm trying to get it to work with Qubes, and 
it seems to be failing. 

Here are the cases when I attach it to Sys-net 

Steps: 
Attach it to sys-net 
Create Mobile broadband connection 
Select device in wizard (cdc-wdm0) 
create connection
Device times out. 


And when I don't use sys-usb
Create netVM "Verzion" 
Attach to Verizon 
device doesn't appear in Wizard
have to modprobe it into existence
Follow wizard
Device fails to connect. 

MBIM tools say that the device cannot be communicated with, and yet it appears 
in the wizard. 


Ideas? 
Suggestions? 


Thank you. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ac7b467b-b2fa-4c8f-a26f-7a46eaa0fd82%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Clipboard Mamanger that works?

2017-02-21 Thread thomaszelch
So i have fiddled with it for a while and just tried a couple different 
clipboard managers and the 3rd try was a successfull.

http://parcellite.sourceforge.net/ so far works fine with Qubes, in case 
anybody else is looking for a working clipboard manager, it is available 
directly from the Repository.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bba17dcf-a8df-42f4-9440-37340c14aaec%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Error: Failed to synchronize cache for repo 'updates'

2017-02-21 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-02-20 14:32, Unman wrote:
> On Mon, Feb 20, 2017 at 03:25:38PM -0500, taii...@gmx.com wrote:
>> I am using fedora 24 template vm, how can I fix this? The
>> internet is filled with plenty of "resolved" questions about that
>> error but no actual help.
>> 
> 
> Are you updating over Tor? If so this is absolutely standard - you
> just need to be patient - maybe poking your Tor will help.
> 
> If not, then I assume it's transitory network failure and should
> resolve itself in short time.
> 

Unman is correct. I'll just add that one way to "poke Tor," i.e., to
get a "new identity" by building a new circuit, is to open Arm (Tor
Controller) in sys-whonix and press "n".

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYrL/aAAoJENtN07w5UDAwsfMP/2YLNswezxzIdEBUHRsg9VI+
Jo/jRqV0malZcF5fh7L8igAbebEwPYPPm4gyyWCHKEp71fh0r/OHZ557n4pVOKau
54DMMy7FoSPGbnOemUKUEbzbReQNOVlDhWsQ2alttpq8CW4rr5PNDdRhqiA9prj8
EpFEMPOv9uA6FWPcyIKngKMexujd6NuSSpCxZNuuisxNSlMiGkIMsP3ebjsHJjQh
Gjtv1oZmkENpi+CbiR91S6+K9hHUfLHlRNmrj3TAZIYgYC5hfM4p+THy4qwO8XkB
VQ4/8y7m15xcS1hYY5PKq0eaNh/TQMLDxeET/md2jZ1KH7g6AL9vSn9n2DacOYoz
9MCXUrxroUry/F/gHhRdeN5yhr1/NbkxeXTxRGE2XK1VDjpynr8a5CGXJzHAbzPw
xtjqDGMt3z4K3U8yDg4l4HKbVfwSrm3rE/iTl64dKj2vqHixWwWWyPCZR8ZFJNqL
WqOa/yGZt+ydNW2r6sNqsUwiQUUWqOLaAjlZ8UyD8Y6+4w0YQFByFAYAHsml2I0k
786Aas7kRm6YNAiFTFlDuNq4IWHc7gmy23n3qqMNfL23zJZokSFNMPPLYsfEjp+0
1PCy8mfF5arVUMc/vaHxHZz/ui12/K8z4bvFhpHFtnWxdHWSzkTJN/GN5OMBrdwb
SB3rVuQgkAUnpMFOcsFh
=tOGh
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6c6de4b4-440c-0f72-ce63-4346d604f8f4%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Display section of XFCE panel from another VM in Dom0?

2017-02-21 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-02-20 10:02, hawk...@bitmessage.ch wrote:
> On Mon, 20 Feb 2017 02:05:41 -0800
> Andrew David Wong  wrote:
> 
> On 2017-02-17 13:06, hawk...@bitmessage.ch wrote:
 As a generalization of my previous question:

 I've seen screenshots (Joanna's:
 https://cloud.githubusercontent.com/assets/10212863/16384754/7e131672-3c8a-11e6-8fc7-62bf9a1d90bf.png)
 where a section of the panel seems to be showing the XFCE menubar
 from another VM, such as sys-firewall. Perhaps I'm interpreting the
 colors wrong, but I can't seem to figure out how to accomplish
 this. Does anyone have any tips?
   
> 
> I actually don't see what you describe in that screenshot. Can you
> explain in more detail what you mean?
> 
> P.S. - Please don't top-post.
> 
>> It looks to me like the little green monitor bars and green text in
>> the upper right might be displaying sys-firewall data. I could be
>> wrong, but am curious either way.
> 

I think those are hardware sensor readings (e.g., temperature and/or
disk activity indicators).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=y/CE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a100977-d3e1-64b4-529f-ef1142b9e19f%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] strange error when installing pycairo on fedora minimal

2017-02-21 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-02-20 11:20, john.david.r.smith wrote:
> hi.
> i want to install terminator in my vm.
> since the terminator package does not install everything correctly
> (pycairo is not installed), i need to install pycairo manually.
> 
> but this does not work, since dnf somehow ties to install a different
> package...
> 
> $ sudo dnf install pycairo
> Package qubes-template-minimal-stub-1.1-1.fc23.noarch is already
> installeDependencies resolved.
> Nothing to do.
> Sending application list and icons to dom0
> Complete!
> 
> i tried this on two new clones of fedora 24 min, only installed sudo and
> updated all packages.
> this seems very strange, since the package seems to be for f23.
> 
> strangely enough i can install pycairo-devel or anything else i tied
> after this.
> 
> executing `dnf list installed qubes-*` gives me (on fedora minimal):
> 
> Installed Packages
> qubes-core-vm.x86_643.2.15-1.fc24 @qubes-vm-r3.2-current
> qubes-core-vm-systemd.x86_643.2.15-1.fc24 @qubes-vm-r3.2-current
> qubes-db.x86_64 3.2.3-1.fc24 
> @qubes-builder-vm-r3.2-current-testing
> qubes-db-libs.x86_643.2.3-1.fc24 
> @qubes-builder-vm-r3.2-current-testing
> qubes-db-vm.x86_64  3.2.3-1.fc24 
> @qubes-builder-vm-r3.2-current-testing
> qubes-gui-vm.x86_64 3.2.9-1.fc24  @qubes-vm-r3.2-current
> qubes-libvchan-xen.x86_64   3.2.0-1.fc24 
> @qubes-builder-vm-r3.2-current-testing
> qubes-template-minimal-stub.noarch  1.1-1.fc23@@commandline
> qubes-utils.x86_64  3.2.3-1.fc24 
> @qubes-builder-vm-r3.2-current-testing
> qubes-utils-libs.x86_64 3.2.3-1.fc24 
> @qubes-builder-vm-r3.2-current-testing
> 
> qubes-template-minimal-stub is the only package for fedora 23
> 
> so my question is:
> does someone else have this bug?
> is there a problem with qubes-template-minimal-stub being a fc23
> version? (maybe the version was simply not updated)
> how can i install pycairo?
> 
> - John
> 

This is a known issue:

https://github.com/QubesOS/qubes-issues/issues/2606

As described in the comments, the workaround is to specify a version
number, e.g.:

sudo dnf install pycairo-1.10*

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=/9p8
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4801f7c8-d6d8-808e-b98f-d79d75bf57b5%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - HP EliteBook 2570p

2017-02-21 Thread Stephan Marwedelq
I use Qubes successfully for my daily work and it works perfectly for me 
on this machine. Thanks to the Qubes Team for making it possible, 
especially providing i3 support in dom0. I cannot tweak the i3 
configuration though. Qubes simply ignore the changes I made to the i3 
key bindings, but I can live with the standard configuration.


The only trouble I sometimes have is to correctly suspend and resume the 
machine. This only works when I do not have a HVM Qube running. As soon 
as I start my Windows 7 HVM Qube and try to suspend the machine, it 
completely stalls and can only be recovered by a hardware reset. 
According to the documentation, it should work, but I didn't yet manage 
to get around this issue. Maybe it is a configuration issue on this 
machine?


One question concerning hardware support: I must use a smartcard for 
authentication at work. However, currently Qubes does not support the 
builtin smartcard reader. Furthermore, it cannot be passed to another 
Qubes. Using a USB reader instead doesn't work either as a USB device 
cannot be passed to the Windows 7 HVM. So I need to use a different 
machine to authentication. Will there be any solution in the future?


In summary, Qubes is a reliable and secure solution for the mobile 
desktop and covering 99% of my daily tasks.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o8hunh%24b4l%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Hewlett_Packard-HP_EliteBook_2570p-20170221-183619.yml
Description: application/yaml


[qubes-users] Re: tox & webcam

2017-02-21 Thread raahelps
On Monday, February 20, 2017 at 4:12:15 PM UTC-5, haaber wrote:
> Hello,
> 
> did anyone try out uTox (for example)? I had this in my pre-qubes  life.
> I wonder whether a specific cloned & enriched fedora-24-minimal VM would
> be a better solution, so I tried. Of course there is no binaries
> available for fedora :)
> 
> So question one would be how to obtain a required package list that
> allows to compile some software (in this example utox)  in a cloned 
> f-24 vm.
> 
> Question two ist how to attach the internal webcam: It is visible in a
> minimal-f-24 usb VM (using lsusb), I installed the missing
> qubes-usb-proxy : helas, the qvm-usb command is still not available.
> What do I miss?
> 
> Thank you, Bernhard

why not use debian for it instead, i believe its already packaged for it.

Im not sure whether webcam work in a vm using a  minimal template.  Maybe 
someone else will know. but i believe you install usb proxy package in the 
appvm too.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1d8afb26-c69b-4c35-b24e-a675c800e116%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-devel] Re: [qubes-users] Back up running VMs on btrfs

2017-02-21 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Feb 21, 2017 at 06:21:40PM +, Rusty Bird wrote:
> Chris Laprise:
> > On 02/21/2017 07:43 AM, Rusty Bird wrote:
> > > Hi Chris!
> > > 
> > > > On 02/20/2017 08:28 AM, Rusty Bird wrote:
> > > > > A small qvm-backup wrapper script that handles running VMs by 
> > > > > chrooting
> > > > > into a temporary dom0 filesystem snapshot. The backed up data is the
> > > > > same as if those VMs had just been killed, which seems to work fine 
> > > > > for
> > > > > the usual journaling/copy-on-write VM filesystems.
> > > > > 
> > > > > https://github.com/rustybird/qubes-stuff/blob/master/dom0/bin/qvm-backup-snap
> > > > IIRC, the best practice for backing up is to use a snapshot as the 
> > > > source.
> > > > 
> > > > I was thinking that a simple ability to point qvm-backup to a snapshot 
> > > > path
> > > > would be optimum for backup flexibility.
> > > I misremembered that as involving a fair amount of refactoring.
> > > Looking into it again right now...
> > 
> > There is the issue of handling multiple pools or mountpoints (if they are
> > configured), but as a personal modification to allow backing-up while
> > running VMs I'm guessing it should be pretty easy. As long as everything is
> > on one fs.
> 
> https://github.com/rustybird/qubes-core-admin/compare/snapdir implements
> a new qvm-backup option:
> 
>   --snapdir=SNAPDIR Specify a filesystem snapshot directory to back up
> from. VMs are allowed to run while being backed up and
> the destination VM is not automatically excluded.
> 
> But I don't know if it makes a lot of sense to submit this patch as a
> pull request. It would have to be reworked for core3-devel anyway.

In core3, every VM disk volume support "snapshot" operation (this is one
reason why LVM is default there). So every VM can be included in backup,
even if running (in fact the only missing piece is removing checking for
running VMs).
In fact, a running VM is using _snapshots_ of own volumes, not those
volumes directly (those snapshots are committed back to original volume
on VM shutdown - if applicable). This for example makes even easier to
implement template rollback feature.
The downside in the context of backup is that, the backup include VM state
from the time before the VM have been started, which may be long time
ago for long running VMs... On the other hand, volume filesystem wasn't
mounted then, so supposedly is in a clean state.

This may require some more thinking, but currently I'm working on a
totally different part of core3 and will come to backups in a week or
two.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYrLArAAoJENuP0xzK19cseZQH/R4bDlrKzUb5p2qpVMYW2H7V
aND/ENLEhil0ObPjFpoe76cSPQdDwUJNITX6DZt48UA1Evj2yQl599pPx53ZjEP0
qozV268JNDicAOSA+8qT7axQRLvz3zAhm040eg0dJ4Xa7qpmyAQlyAl5QoWsEVse
joCl47IUTZnxXXl1BJwJZqSYCDQ111pDkazJVvbDCdmuce8tS02Bia1w4Wtk7p2B
FekunvvaXHZeA4p1XLCH+KoXUdqLD8OY6EDJNeOl6UpP7u7sY3swfCypuknTd8R6
V3eNF10akT0gX1pWK3jde9V/uRqWAMwf/jLEqQmOoGEorl7ZUyugFBoBlPBymNw=
=HIZN
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170221212458.GM1146%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - HP EliteBook 2570p

2017-02-21 Thread Stephan Marwedel
I use Qubes successfully for my daily work and it works perfectly for me 
on this machine. Thanks to the Qubes Team for making it possible, 
especially providing i3 support in dom0. Although I cannot tweak the i3 
configuration, as Qubes simply ignores the changes I made to the i3 key 
bindings. But I can live with the standard configuration for the time being.


The only trouble I sometimes have is to correctly suspend and resume the 
machine. This only works when I do not have an HVM Qube running. As soon 
as I start my Windows 7 HVM Qube and try to suspend the machine, it 
completely stalls and can only be recovered by a hardware reset. 
According to the documentation, it should work, but I didn't yet manage 
to get around this issue. Maybe it is a configuration issue with this 
particular machine?


One question concerning hardware support: I must use a smartcard for 
authentication at work. However, currently Qubes does not support the 
built-in smartcard reader. Thus, it cannot be passed to a Qube. Using a 
USB reader instead doesn't work either as a USB device cannot be passed 
to the Windows 7 HVM. So I need to use a different machine for 
authentication. Will there be any solution in the future?


In summary, Qubes is a reliable and secure solution for the mobile 
desktop covering 99% of my daily tasks.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f8790d87-5f93-8390-1553-80320200d4a5%40tu-ilmenau.de.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Hewlett_Packard-HP_EliteBook_2570p-20170221-185259.yml
Description: application/yaml


[qubes-users] emergency help

2017-02-21 Thread haaber
Hello,

I made a big big error. I wanted to play with i2c: there is one in the external vga ... I though it is a nice starting point to avaoid usb in certain situations. Anyhow:  Since dom0 has no i2c tools, I installed them in an fedora-24-minimal test VM.

Then, since I had no acces to the vga, I gave the appVM hardware acces to vga - result: immediate black screen.

Reboot: again black screen. Sniff!

 

So please help me how (a) to boot with NO qubes started or (b) where to find (and modify)

the accessible hardware  after having botted an external rescue system.

 

Thanks, Bernhard



-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/trinity-8104bd87-08ed-4cd6-8fd1-9cd6cb352b72-1487707873460%403capp-webde-bs46.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: HCL - Dell XPS 15 9560

2017-02-21 Thread Alchemist
On Tuesday, February 21, 2017 at 3:20:15 AM UTC-8, Stefan wrote:
> On 02/20/2017 06:18 PM, Alchemist wrote:
> 
> > Were you able to disable the Nvidia in BIOS? 
> 
> I didn't try to. Is there a BIOS option? If so, I missed it.
> 
> 
> Stefan.

There used to be (in previous models), sadly if you couldn't find it I suspect 
Dell may have removed it. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cae8b8a8-02d5-47a9-9a56-5488ac3d96f3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Veracrypt Install Issues

2017-02-21 Thread Grzesiek Chodzicki
W dniu wtorek, 21 lutego 2017 17:26:58 UTC+1 użytkownik qub...@tutanota.com 
napisał:
> I'm having problems getting Veracrypt to run properly.
> I've installed it on a cloned debian-8 template with an associated linked 
> AppVM.
> However it doesn't show up in either template or appvm Dom0 settings 
> applications.
> The veracrypt app does however show up in both the template & appvm under 
> computer/usr/share/applications.
> Anyone any ideas how to get it working properly in Dom0/ settings/application
> 
> 
> --
> 
> 
> Securely sent with Tutanota. Claim your encrypted mailbox today!
> 
> 
> https://tutanota.com

run qvm-sync-appmenus in dom0

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2aa61ada-4ab8-4b46-b8b3-d27c722a2240%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL Lenovo W540

2017-02-21 Thread insha
Hi can you email me please?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/097558da-06ea-4cd6-89cd-39dbb160920c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Back up running VMs on btrfs

2017-02-21 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Chris Laprise:
> On 02/21/2017 07:43 AM, Rusty Bird wrote:
> > Hi Chris!
> > 
> > > On 02/20/2017 08:28 AM, Rusty Bird wrote:
> > > > A small qvm-backup wrapper script that handles running VMs by chrooting
> > > > into a temporary dom0 filesystem snapshot. The backed up data is the
> > > > same as if those VMs had just been killed, which seems to work fine for
> > > > the usual journaling/copy-on-write VM filesystems.
> > > > 
> > > > https://github.com/rustybird/qubes-stuff/blob/master/dom0/bin/qvm-backup-snap
> > > IIRC, the best practice for backing up is to use a snapshot as the source.
> > > 
> > > I was thinking that a simple ability to point qvm-backup to a snapshot 
> > > path
> > > would be optimum for backup flexibility.
> > I misremembered that as involving a fair amount of refactoring.
> > Looking into it again right now...
> 
> There is the issue of handling multiple pools or mountpoints (if they are
> configured), but as a personal modification to allow backing-up while
> running VMs I'm guessing it should be pretty easy. As long as everything is
> on one fs.

https://github.com/rustybird/qubes-core-admin/compare/snapdir implements
a new qvm-backup option:

  --snapdir=SNAPDIR Specify a filesystem snapshot directory to back up
from. VMs are allowed to run while being backed up and
the destination VM is not automatically excluded.

But I don't know if it makes a lot of sense to submit this patch as a
pull request. It would have to be reworked for core3-devel anyway.

CCing qubes-devel

Rusty
-BEGIN PGP SIGNATURE-
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=yKMm
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170221182140.GA1579%40mutt.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Back up running VMs on btrfs

2017-02-21 Thread Chris Laprise

On 02/21/2017 07:43 AM, Rusty Bird wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Chris!


On 02/20/2017 08:28 AM, Rusty Bird wrote:

A small qvm-backup wrapper script that handles running VMs by chrooting
into a temporary dom0 filesystem snapshot. The backed up data is the
same as if those VMs had just been killed, which seems to work fine for
the usual journaling/copy-on-write VM filesystems.

https://github.com/rustybird/qubes-stuff/blob/master/dom0/bin/qvm-backup-snap

IIRC, the best practice for backing up is to use a snapshot as the source.

I was thinking that a simple ability to point qvm-backup to a snapshot path
would be optimum for backup flexibility.

I misremembered that as involving a fair amount of refactoring.
Looking into it again right now...

Rusty


There is the issue of handling multiple pools or mountpoints (if they 
are configured), but as a personal modification to allow backing-up 
while running VMs I'm guessing it should be pretty easy. As long as 
everything is on one fs.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/36ee72eb-5fd1-6d3e-d64d-574e23b98627%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Veracrypt Install Issues

2017-02-21 Thread qubesos
I'm having problems getting Veracrypt to run properly.
I've installed it on a cloned debian-8 template with an associated linked AppVM.
However it doesn't show up in either template or appvm Dom0 settings 
applications.
The veracrypt app does however show up in both the template & appvm under 
computer/usr/share/applications.
Anyone any ideas how to get it working properly in Dom0/ settings/application

--
Securely sent with Tutanota. Claim your encrypted mailbox today!
https://tutanota.com

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/KdWUnus--3-0%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] No network connection

2017-02-21 Thread hast0011
Am Freitag, 12. September 2014 22:30:32 UTC+2 schrieb Marek 
Marczykowski-Górecki:
> On 12.09.2014 22:12, q...@caltech.edu wrote:
> > On Friday, September 12, 2014 10:56:52 AM UTC, Jos den Bekker wrote:
> >> On 11 september 2014 17:06:21 UTC+2 Marek Marczykowski-Górecki wrote:
> >>
> >> Uhm... replace BDF-OF-THE-DEVICE with actuall BDF (for example 
> >> :00:19.0).
> >>
> >>
> >>
> >>
> >> Finally worked. Don't know what went wrong yesterday, maybe I should have 
> >> shut down netvm before making the change. Now I was connected and could 
> >> finally install updates. But the change in the permissive file is gone at 
> >> every boot. Is there a way to make the change in the file permanent?
> >>
> >> Thanks!
> > 
> > ...you may edit in dom-0 as su
> > 
> > /etc/systemd/system/multi-user.target.wants/qubes-netvm.service
> > 
> > ...and add in line 11 of the [Service] section
> > 
> > ExecStart=/bin/sh -c 'echo :04:00.0 > 
> > /sys/bus/pci/drivers/pciback/permissive'
> > ...followed by the NetVm Start command line
> > 
> > ...reStart firewallvm/netvm ...done
> 
> Better to add new ExecStartPre (with above command). But note that this file
> will be overwritten during system update. To prevent this, you can create
> simple new service. Create /etc/systemd/system/qubes-pre-netvm.service with:
> -
> [Unit]
> Description=Netvm fixup
> Before=qubes-netvm.service
> 
> [Service]
> ExecStart=/bin/sh -c 'echo :04:00.0 > 
> /sys/bus/pci/drivers/pciback/permissive'
> Type=oneshot
> RemainAfterExit=yes
> 
> [Install]
> WantedBy=multi-user.target
> -
> Then enable it with "systemctl enable qubes-pre-netvm.service".
> 
> -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?


Thank you,

today this post helped me a lot... This worked for me too. Thank you also for 
the "_" correction:-)

Steffen

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f9e6fce0-9a54-4b09-95f7-d00f986241c1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] two-factor authentication thoughts

2017-02-21 Thread haaber
Hi everyone,

seeing all these yubikey mails, I was thinking about the hardware of 2
factor auth. I admit a small usb-key is handy, but so widespread as it
is, it will also be in the focus of government spy agencies. Even with
open source software : who knows what happens in the hardware? On the
other hand, I admit, using a password AND a possibly unsafe key is
better than using a password alone .. unless: (1) the password is weaker
than otherwise since the user trusts in the ybikey or (2) the usb were a
problem!

So I mediated a bit, how to do better: somehow, sending ~64 bits should
be possible by other, safer means than usb. Observe that with so little
data, speed is not a real problem, all imaginable communications  are
fast enough for that.  Of course a serial port would be most natural
choice, but they are inexistent on modern notebooks (sometimes you may
solder them on a main board, but that is not practical at all :). So I
took a look what else to "abuse" for communication.

idea 1: The monitor VGA could be great (unless you have an apple :) and
indeed there are serial protocols available, initially meant to
communicate screen resolution, etc. That could be a funny thing to look
at. Remains the question is how to use such a device without wrongly
suggesting to the operating system the existence of a real monitor ...

idea 2:  why not over the air? Imagine a device that gets power (and
only power) from usb, and receives data over the headphone / microphone
jack (kind of an old-style modem). Should be very secure; you may even
listen to it, it may be a "madelaine"  :)

Any other thoughts?   Bernhard

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/afe746ca-0ac3-d53e-7deb-ad121494e54a%40web.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Back up running VMs on btrfs

2017-02-21 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Chris!

> On 02/20/2017 08:28 AM, Rusty Bird wrote:
> > A small qvm-backup wrapper script that handles running VMs by chrooting
> > into a temporary dom0 filesystem snapshot. The backed up data is the
> > same as if those VMs had just been killed, which seems to work fine for
> > the usual journaling/copy-on-write VM filesystems.
> > 
> > https://github.com/rustybird/qubes-stuff/blob/master/dom0/bin/qvm-backup-snap
> 
> IIRC, the best practice for backing up is to use a snapshot as the source.
> 
> I was thinking that a simple ability to point qvm-backup to a snapshot path
> would be optimum for backup flexibility.

I misremembered that as involving a fair amount of refactoring.
Looking into it again right now...

Rusty
-BEGIN PGP SIGNATURE-
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=Rq1r
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170221124332.GA1058%40mutt.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: HCL - Dell XPS 15 9560

2017-02-21 Thread Stefan Schlott
On 02/20/2017 06:18 PM, Alchemist wrote:

> Were you able to disable the Nvidia in BIOS? 

I didn't try to. Is there a BIOS option? If so, I missed it.


Stefan.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9d33c6e-f3a7-a2b9-417a-f7bae340d1e2%40ploing.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Copy files from AppVM to Template VM ?

2017-02-21 Thread MarcusDilger
Am Dienstag, 21. Februar 2017 10:52:43 UTC+1 schrieb u+q...@bestemt.no:
> You have to use the proper name of the TemplateVM (as there are multiple
> TemplateVMs), e.g. fedora-23 or debian-8. You can find the name in the
> Qubes VM Manager.
> 
> Regards
> Ubestemt
> 
> marcusdil...@mdnetz.com  [2017-02-21 10:49 +0100]:
> > Am Dienstag, 21. Februar 2017 10:39:07 UTC+1 schrieb Francesco:
> > > On Tue, Feb 21, 2017 at 5:29 AM,   wrote:
> > > Hello,
> > > 
> > > i'm new to Qubes. So may be a newbie question :-) But i could not found 
> > > any solution in the Documentation or here in the group.
> > > 
> > > 
> > > 
> > > How I could copy a file from AppVM to the Template VM ?
> > > 
> > > 
> > > 
> > > If is select CopyToOtherAppVM only domains working.
> > > 
> > > 
> > > 
> > > what happens when you select CopyToOtherAppVM?  In my case it always 
> > > worked as well copying to templates. The only one that does not work is 
> > > copying to dom0.  But this is for security reasons 
> > > 
> > > 
> > > Thanks,
> > > 
> > > regards
> > > 
> > > Marcus
> > > 
> > > 
> > > 
> > > --
> > > 
> > > You received this message because you are subscribed to the Google Groups 
> > > "qubes-users" group.
> > > 
> > > To unsubscribe from this group and stop receiving emails from it, send an 
> > > email to qubes-users...@googlegroups.com.
> > > 
> > > To post to this group, send email to qubes...@googlegroups.com.
> > > 
> > > To view this discussion on the web visit 
> > > https://groups.google.com/d/msgid/qubes-users/c2caab3c-af89-4cdf-bba6-c0cd8c8bf181%40googlegroups.com.
> > > 
> > > For more options, visit https://groups.google.com/d/optout.
> > 
> > Hello Franz,
> > I need to enter the destination Domain. I just try 'template' but it not 
> > working. Things like 'work', 'private'.. are working. May be I use the 
> > wrong term for template vm.
> > 
> > Thanks,
> > regards
> > Marcus
> > 
> > -- 
> > You received this message because you are subscribed to the Google Groups 
> > "qubes-users" group.
> > To unsubscribe from this group and stop receiving emails from it, send an 
> > email to qubes-users+unsubscr...@googlegroups.com.
> > To post to this group, send email to qubes-users@googlegroups.com.
> > To view this discussion on the web visit 
> > https://groups.google.com/d/msgid/qubes-users/64b4dd94-db06-4896-874d-ad95d1d1fe65%40googlegroups.com.
> > For more options, visit https://groups.google.com/d/optout.

Ah, that's it. Many thanks for that tip.

I could have figured that out myself :-)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c65f443c-cc70-41f9-a84f-b81f77ab97a9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Resize dom0

2017-02-21 Thread Zbigniew Łukasiak
My current plan is to install a new QubesOS system into the big free
partition - and then move stuff there. I don't have anything valuable
in dom0 - so it is about moving the VMs. Is there a clean way to do
that? Would it work if I just copy /var/lib/qubes into the new system?


Cheers,
Zbigniew

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGL_UUtud%3DfWfcS%3DKmuG9f7joF0DoexW7sia%3DLOpzmBO6p8crA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Archlinux template system update

2017-02-21 Thread truleeeeeed
> latest 'qubes-vm-gui' binary

How to replace qubes-vm-gui with old version?

https://github.com/QubesOS/qubes-gui-agent-linux

pulse   Added pulseaudio 10.0 headers

xf86-video-dummyxf86-video-dummy: adjust for xorg-server-1.19.0




-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b0dc860-b678-448b-ba18-69fe00a5b16e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Copy files from AppVM to Template VM ?

2017-02-21 Thread u+qbsu
You have to use the proper name of the TemplateVM (as there are multiple
TemplateVMs), e.g. fedora-23 or debian-8. You can find the name in the
Qubes VM Manager.

Regards
Ubestemt

marcusdil...@mdnetz.com  [2017-02-21 10:49 +0100]:
> Am Dienstag, 21. Februar 2017 10:39:07 UTC+1 schrieb Francesco:
> > On Tue, Feb 21, 2017 at 5:29 AM,   wrote:
> > Hello,
> > 
> > i'm new to Qubes. So may be a newbie question :-) But i could not found any 
> > solution in the Documentation or here in the group.
> > 
> > 
> > 
> > How I could copy a file from AppVM to the Template VM ?
> > 
> > 
> > 
> > If is select CopyToOtherAppVM only domains working.
> > 
> > 
> > 
> > what happens when you select CopyToOtherAppVM?  In my case it always worked 
> > as well copying to templates. The only one that does not work is copying to 
> > dom0.  But this is for security reasons 
> > 
> > 
> > Thanks,
> > 
> > regards
> > 
> > Marcus
> > 
> > 
> > 
> > --
> > 
> > You received this message because you are subscribed to the Google Groups 
> > "qubes-users" group.
> > 
> > To unsubscribe from this group and stop receiving emails from it, send an 
> > email to qubes-users...@googlegroups.com.
> > 
> > To post to this group, send email to qubes...@googlegroups.com.
> > 
> > To view this discussion on the web visit 
> > https://groups.google.com/d/msgid/qubes-users/c2caab3c-af89-4cdf-bba6-c0cd8c8bf181%40googlegroups.com.
> > 
> > For more options, visit https://groups.google.com/d/optout.
> 
> Hello Franz,
> I need to enter the destination Domain. I just try 'template' but it not 
> working. Things like 'work', 'private'.. are working. May be I use the wrong 
> term for template vm.
> 
> Thanks,
> regards
> Marcus
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/64b4dd94-db06-4896-874d-ad95d1d1fe65%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170221095228.f2pfsf3n77ofrotw%40bestemt.no.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Copy files from AppVM to Template VM ?

2017-02-21 Thread MarcusDilger
Am Dienstag, 21. Februar 2017 10:39:07 UTC+1 schrieb Francesco:
> On Tue, Feb 21, 2017 at 5:29 AM,   wrote:
> Hello,
> 
> i'm new to Qubes. So may be a newbie question :-) But i could not found any 
> solution in the Documentation or here in the group.
> 
> 
> 
> How I could copy a file from AppVM to the Template VM ?
> 
> 
> 
> If is select CopyToOtherAppVM only domains working.
> 
> 
> 
> what happens when you select CopyToOtherAppVM?  In my case it always worked 
> as well copying to templates. The only one that does not work is copying to 
> dom0.  But this is for security reasons 
> 
> 
> Thanks,
> 
> regards
> 
> Marcus
> 
> 
> 
> --
> 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> 
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users...@googlegroups.com.
> 
> To post to this group, send email to qubes...@googlegroups.com.
> 
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/c2caab3c-af89-4cdf-bba6-c0cd8c8bf181%40googlegroups.com.
> 
> For more options, visit https://groups.google.com/d/optout.

Hello Franz,
I need to enter the destination Domain. I just try 'template' but it not 
working. Things like 'work', 'private'.. are working. May be I use the wrong 
term for template vm.

Thanks,
regards
Marcus

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/64b4dd94-db06-4896-874d-ad95d1d1fe65%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Copy files from AppVM to Template VM ?

2017-02-21 Thread Franz
On Tue, Feb 21, 2017 at 5:29 AM,  wrote:

> Hello,
> i'm new to Qubes. So may be a newbie question :-) But i could not found
> any solution in the Documentation or here in the group.
>
> How I could copy a file from AppVM to the Template VM ?
>
> If is select CopyToOtherAppVM only domains working.
>

what happens when you select CopyToOtherAppVM?  In my case it always worked
as well copying to templates. The only one that does not work is copying to
dom0.  But this is for security reasons

>
> Thanks,
> regards
> Marcus
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/c2caab3c-af89-4cdf-bba6-c0cd8c8bf181%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCSZL_6ja26CzR%2BDyGfQMBMg_M7i51t1f9LhrvaYZCJcw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] asus n56vz HCL update

2017-02-21 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 02/21/2017 02:59 AM, Oleg Artemiev wrote:

> Attached file has more details. As usually I've replaced some 
> potentially unique numbers w/ XX.
> 

FYI:


The things you are hiding are NOT unique to your device. Instead they
are the exact device TYPE identifiers. Without those you can't even
tell what device you are using. Means without those ids the HCL is
pretty useless.


Details:

BIOS: what you are masked is the BIOS version.
Different BIOS versions may affect some very important things like
vt-d, vt-x, TMP

VGA: you masked the PCI ID. It is the only real identification of the
device:
http://pci-ids.ucw.cz/

NET: same as above. Without the proper masked ID you are not even able
to cheese the right driver.

SCSI: same again the masked id is the type number of your disk.
However this is actually not relevant in Qubes.


Of course you can still decide to not share those - it is up to you.
I just wanted to make it clear to avoid confusion.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=RnoV
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b57c46d-9aab-b0e2-4c40-dab332ff4c57%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Copy files from AppVM to Template VM ?

2017-02-21 Thread MarcusDilger
Hello,
i'm new to Qubes. So may be a newbie question :-) But i could not found any 
solution in the Documentation or here in the group. 

How I could copy a file from AppVM to the Template VM ?

If is select CopyToOtherAppVM only domains working.

Thanks,
regards
Marcus

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c2caab3c-af89-4cdf-bba6-c0cd8c8bf181%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.