[qubes-users] Trouble updating templates
I cant seem to update my templates. In the debian-9 TVM I type: sudo apt-get update Ign:1 http://. Ign:2 http://. Ign:3 http://. Err:4 Err:5 Err:6 Connection Failed E: The repo "http://...; does no longer have a Release File. N: Updating from such a repo cant be done securely, and is therefore disabled by default. N: See apt-secure man page. The Fedora template doesnt seem to connect at all. My sys-firewall is using the debian-9 template. Type: AppVM Rules: Allow all outgoing Devices: none services: n/a The sys-net (debian-9) Type: AppVM Rules: n/a Devices: Network Controller services: clocksync -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6aca20f4-1a95-496a-8959-9fa8cbb1e616%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Building Centos template conflict error?
On Sunday, March 4, 2018 at 12:45:21 AM UTC-5, Tim W wrote: > On Friday, March 2, 2018 at 10:14:51 PM UTC-5, Tim W wrote: > > On Friday, March 2, 2018 at 4:05:30 AM UTC-5, Unman wrote: > > > On Fri, Mar 02, 2018 at 12:41:29AM -0800, Tim W wrote: > > > > On Tuesday, February 27, 2018 at 2:37:46 AM UTC-5, Frédéric Pierret > > > > (fepitre) wrote: > > > > > Le mardi 27 février 2018 00:30:10 UTC+1, Tim W a écrit : > > > > > > Great that was failing basically on all non standard templates i.e. > > > > > > not fedora, debain, or whonix. They would all fail but it seems > > > > > > each had issues ubuntu, centos, arch. Seems they are each getting > > > > > > fixed for 3.2 and getting updated for 4.0 now. I was just testing > > > > > > to ensure things were still working for building as I know many > > > > > > prefer to build their own iso and templates vs binary. I am one. > > > > > > Figured if docs had to be updated I would do that but it seems at > > > > > > most just a tweak or two in docs is all thats needed. > > > > > > > > > > Indeed, it was just an adjustment with respect to the rpm spec of the > > > > > conflicting package. CentOS is shipping a file in their own dconf but > > > > > not Fedora. Recently a file /etc/dconf/profile/user has been used and > > > > > provided by Qubes and that is why there was a recent conflict. The > > > > > template for R4.0 is on the road! I finished last week to do all the > > > > > necessary and Marek is currently implementing it. > > > > > > > > > > > Thanks again for you and Marek getting it working > > > > > > > > > > You're welcome. > > > > > > > > Just tried to build the standard template only under 3.2 and got this > > > > conflict > > > > > > > > Transaction check error: > > > > file /etc/dconf/profile/user from install of > > > > qubes-core-vm-3.2.25-1.el7.centos.x86_64 conflicts with file from > > > > package dconf-0.26.0-2.el7.x86_64 > > > > > > > > It fails on $make template > > > > > > > > > > It's the same conflict - I guess you need to wait for the change to be > > > merged to 3.2 > > > > Yes sorry about that it was very late and I was a bit punchy. > > Since Marek updated the qubes builder to address the security bulletin issue > the tag for centos is no longer valid so it fails the update after choosing > the centos template with a invalid / no valid tag found error but does > proceed to allow choosing of the templates to build. [user@Build-Qubes qubes-builder]$ make get-sources -> Updating sources for builder-centos... --> Fetching from https://github.com/QubesOS/qubes-builder-centos.git master... --> Verifying tags... No valid signed tag found! ---> One of invalid tag: object cfc7d315cfdfe493a86f103a0825ba630339ab8f type commit tag mm_cfc7d315 tagger Marek Marczykowski-Górecki1519612572 +0100 Tag for commit cfc7d315cfdfe493a86f103a0825ba630339ab8f gpg: WARNING: unsafe permissions on homedir `/home/user/qubes-builder/keyrings/git' gpg: Signature made Sun 25 Feb 2018 09:36:12 PM EST using RSA key ID 42CFA724 gpg: Good signature from "Marek Marczykowski-Górecki (Qubes OS signing key) " Makefile:190: recipe for target 'builder-centos.get-sources' failed make: *** [builder-centos.get-sources] Error 1 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f96c34a7-c302-4e9e-be59-7b1ee988437e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Building Centos template conflict error?
On Friday, March 2, 2018 at 10:14:51 PM UTC-5, Tim W wrote: > On Friday, March 2, 2018 at 4:05:30 AM UTC-5, Unman wrote: > > On Fri, Mar 02, 2018 at 12:41:29AM -0800, Tim W wrote: > > > On Tuesday, February 27, 2018 at 2:37:46 AM UTC-5, Frédéric Pierret > > > (fepitre) wrote: > > > > Le mardi 27 février 2018 00:30:10 UTC+1, Tim W a écrit : > > > > > Great that was failing basically on all non standard templates i.e. > > > > > not fedora, debain, or whonix. They would all fail but it seems > > > > > each had issues ubuntu, centos, arch. Seems they are each getting > > > > > fixed for 3.2 and getting updated for 4.0 now. I was just testing to > > > > > ensure things were still working for building as I know many prefer > > > > > to build their own iso and templates vs binary. I am one. Figured > > > > > if docs had to be updated I would do that but it seems at most just a > > > > > tweak or two in docs is all thats needed. > > > > > > > > Indeed, it was just an adjustment with respect to the rpm spec of the > > > > conflicting package. CentOS is shipping a file in their own dconf but > > > > not Fedora. Recently a file /etc/dconf/profile/user has been used and > > > > provided by Qubes and that is why there was a recent conflict. The > > > > template for R4.0 is on the road! I finished last week to do all the > > > > necessary and Marek is currently implementing it. > > > > > > > > > Thanks again for you and Marek getting it working > > > > > > > > You're welcome. > > > > > > Just tried to build the standard template only under 3.2 and got this > > > conflict > > > > > > Transaction check error: > > > file /etc/dconf/profile/user from install of > > > qubes-core-vm-3.2.25-1.el7.centos.x86_64 conflicts with file from package > > > dconf-0.26.0-2.el7.x86_64 > > > > > > It fails on $make template > > > > > > > It's the same conflict - I guess you need to wait for the change to be > > merged to 3.2 > > Yes sorry about that it was very late and I was a bit punchy. Since Marek updated the qubes builder to address the security bulletin issue the tag for centos is no longer valid so it fails the update after choosing the centos template with a invalid / no valid tag found error but does proceed to allow choosing of the templates to build. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/76b8b492-9410-4850-96cf-8acf48da95d9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: non qubes
On Saturday, March 3, 2018 at 6:33:27 AM UTC-5, awokd wrote: > On Thu, March 1, 2018 11:13 am, Yuraeitha wrote: > > On Thursday, March 1, 2018 at 9:30:52 AM UTC+1, jer...@disroot.org wrote: > > > >> where do i find support for security, privacy? (some place where i can > >> post with anonimity too, reddit privacy requires java script i think, > >> doesn't it compromise anonimity? also i would like to ask how things > >> are recommended in doing, like a guide, etc... > >> > >> for example i need to know if enabling java script to watch youtube in > >> tor will compromise anonimity or anything like that, or enabling java > >> script in other websites, if it's a risk.. and how i should tell where > >> i can enable java script, etc.. also if it's recommended to buy stuff > >> through tor, and how, etc and what its benefits, etc... > > General usage questions about Tor might be best asked over on the > tor-users mailing list. Enabling Javascript anywhere is a risk because it > opens up attack vectors to your computer, but by itself it will not > automatically compromise anonymity. Someone would have to be using an > exploit delivered over Javascript to do that. This is pretty unlikely in > the case of large sites such as Youtube or Reddit, unless state agencies > are targeting you specifically (which Tor makes more difficult). > > Qubes is designed to contain exploits to a single VM. If you use it with a > disposable VM for browsing, even if you do get compromised in a browsing > session such as by a Javascript virus in Google ads on Youtube, closing > that Tor Browser and opening a new one will result in it using a fresh, > non-compromised disposable VM. > > Buying items through Tor means using your real identity through Tor. Some > people use Tor for everything including banking. Some use Tor for all > browsing except anything involving their real identity. Others just use > Tor occasionally for some sites. Try searching tor-users mailing list for > questions similar to yours; you'll need to develop your own answer. That is how 99.9% of those caught using tor are found. Its from bad opsec not actually breaking of tor itself.Tech even the way silk road was brought down was via a spoof more than 100% of breaking tor. but like anything layers. Whats great about qubes is it helps in numerous ways from being resistant to the spread of malware its easy integration oh whonix. It ability to string numerous network tunneling chains together to creating multiple layers if done correctly have the effect of indecent cells working to a common goal with only the end user knowing all parts. Qubes is but one part but its configuration allows for numerous ways and layer for security and or if done with proper opsec anonymity -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5b7e0c16-0c5a-4c6e-a357-54d9a44800bf%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Mac Spoofing preinstalled? - Qubes 4 rc4
On Saturday, March 3, 2018 at 8:21:28 AM UTC+1, Tristan Fleming wrote: > Has mac spoofing been preinstalled in Q4 rc4? I cant find any documentation > on it, but the cmd: ip link show wls1 > > changes every 10 minutes or so. I actually want to stop it and I cant seem to > make it static. Lil help!! > > Ive tried everything I can think of. Im not entirely understanding the > network topology. > > I have figured out that Macchanger is installed on the Debian Template. Im > otherwise at a loss. In addition to what Chris said which I agree with, be careful if you're relying on this type of privacy. If it fails, even for a brief moment, then your real identity has been exposed. And this is very likely to happen. If your goal is just general increase of privacy, and not absolute privacy with risks carrying in it (i.e. avoiding dictators, or police state, and who knows what other baddies), then you should probably think of something else, than take huge risks or risking your life. If you don't have any big risks on the line though, then yes, maybe it can be worth it even if it sometimes fail. I'm not an expert though, but all you need to know is that it can fail, and the above is the implications if it does indeed fail. Even if the risk is, say, less than 1% every time its used, or even less than 0,01%, over time as time goes on, that risk will increase slowly, until it will eventually happen to you, the risks will keep going up. You won't even have to be extraordinary unlucky or lucky, it can happen at any time as it moves from almost 0% risk to almost certain 100% risk. As will anything which has a low risk, if used many times, that risk will grow, until you almost certainly will hit you. So too is the same logic for why immortality is impossible, because even if you don't age anymore and is eternally young and healthy, the odds that something unnatural will kill you, like say getting run over by a car, increases as time goes on. Of course it probably won't be a car, it could be anything that eternal youth is not protecting you from, like getting shot or falling down from a high place, who knows, you get the picture. That's why, as I understand it, macspoofing is discouraged. Of course it could be useful, if you don't mind it failing once in a while, and only want mostly better privacy, and not fully protected privacy, i.e. if you only want to detour dodgy marketing and companies making profits of knowing everything about you, then this might be a valid strategy to reduce it. So until that feature becomes 100% reliable, all the time, then it will always carry risk. The question is better asked, is it a risk you can survive getting run over by? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bd1336a7-4fa1-4fe2-b494-34f48b88d84c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: AW: Re: [qubes-users] For community by community - A way to preserve/focus everyones work going into Qubes, bottom-up
On Sunday, March 4, 2018 at 2:01:40 AM UTC+1, Yuraeitha wrote: > @[799] > Maybe we can do both and increase the overall value altogether? I'll > understand if you don't think that is a good idea, but lets for a moment try > see if a merged forum/github-wiki concept can work. We could make a sub-forum > or even a whole forum section for GitHub account activity. Make a sticky post > which is kept updated, with overview and introducing every GitHub content > developers who are making unofficial work to Qubes. Then below that, everyone > can post a detailed post for their GitHub page, listing and giving brief or > detailed explanations of what it brings of value. Essentially it's possible > to promote ones work here, so that others can find it. > > So overall, for example one forum section for guides on how to use and get > into Qubes (i.e. new people to Qubes, and how to get started). Another > section for work on scripts and guides with sub-forums, moving the > scripts/guides over as they develop. And a final forum section to polish the > scripts/guides to finish them. Then we can have a forum section for GitHub > pages as described above, this way, people can choose the degree they want > others to meddle in their work. For example GitHub while cooperative, doesn't > tend to have others come in unless there is an open invitation there, or if > the other party is rude. But on the forum here, it's an open invitation to > come and work together on a project. This way one can preserve a form of > individuality too, and invite others in naturally through the forum as a > framework, if that is what is desired. The forum will then focus on both > approaches, whether it's promoting/sharing work done on, or inviting on > projects for work to-do. > > As such people can choose the style they like. Also in addition to that, not > everyone enjoys working in groups, but some enjoys working alone (and that > should be respected, imo). For example it may fuel energy and be relaxing to > work alone (it can even be a way of relaxing after a long day at > work/similar), while in contrast it would be exhausting to work with others. > Essentially the embodiment of being introvert and extrovert, both I think is > completely normal and none is better than the other. People who gain energy > working with others prefer a different work-style. Nothing wrong with it > either, it's just how people gain energy, there is nothing bad about either > of the two. > > I think if we mix the approaches together, we can add value to both > suggestions. It's also easier to have discussions for both groups, for > example a forum for the copyright/law discussions on using other people work, > so that we can be better informed on such matters. We can also highlight some > kinds of works in various of different forums, wherever there is people > willing to discuss or read, and all this can be closely tied to GitHub and > GitHub Wiki's. What do you think of a merged approach? > > > > > > > @Andrew > On Saturday, March 3, 2018 at 6:25:08 AM UTC+1, Andrew David Wong wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > On 2018-03-02 23:16, Andrew David Wong wrote: > > > On 2018-03-02 15:05, Yuraeitha wrote: > > >> Some of the issues/questions addressed seems like they could be > > >> solved quite effectively and efficiently on a highly > > >> customize-able forum? > > > > > >> [...] > > > > > >> Thoughts about using a forum? > > > > > > FYI, in case you haven't seen this thread: > > > > > > https://groups.google.com/d/topic/qubes-users/2rqas38ncFA/discussion > > > > > > > While at it, here are some other old threads where similar ideas have > > been suggested: > > > > https://groups.google.com/d/topic/qubes-users/D0YuoXMe_vE/discussion > > > > https://groups.google.com/d/topic/qubes-users/es4q40dt1EE/discussion > > > > Approximately every 6-12 months since the beginning of the project, a > > new person (including me, at one point, IIRC) suggests that there > > should be a Qubes wiki or forum, so you'll find many more threads like > > these if you search through the archives. :) > > > > - -- > > Andrew David Wong (Axon) > > Community Manager, Qubes OS > > https://www.qubes-os.org > > > > -BEGIN PGP SIGNATURE- > > > > iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlqaMZcACgkQ203TvDlQ > > MDDD4xAAwbajnwJ/PZxzrVnmzKECGkYVQQDs90LieN1s/ewuqilNx9Cdxk8Fy9La > > jokevIemgSB/QjqRD1zl2L0ksn/XhsOgQyWyK+RCSNWdKsvDhJtsVvh0B5SA5t4N > > FrMzig0uUHLodl9ZOT9ltvy/nOnMBj8YcfQ2i+3yEaOFSN6hc7DkyXnPRhLbEdrK > > pwJJxbdAkvocSu6tEL1xE86cZ1CZrBIHvrVt1oCy1QPCr5EBNUukg4JMGOygZNi2 > > 62TF+/vv1Fe9IeJ7tu+WaZLIJQ1guLesYMISMHAvsUaAwB+vbMFUFuRhHqhiB7Ir > > qEyrf5S24aulX/F9w8043088Wd+RA/lWG2lyXZk3w9H+Gqn2UOKnKnJRCFxBmkbE > > O+TS3/U4pB5t/4K9oezKc9dSODEt4RZO4LSN9U0i5Ksp4q1WDJyJC7eyRnQTpDc6 > > sQHHCi3d0kFTxDozcjCJPFTLhE3OYqBfCClMmCXlLhL1j2/N0XS9nOYWRL2foA1R > >
Re: AW: Re: [qubes-users] For community by community - A way to preserve/focus everyones work going into Qubes, bottom-up
@[799] Maybe we can do both and increase the overall value altogether? I'll understand if you don't think that is a good idea, but lets for a moment try see if a merged forum/github-wiki concept can work. We could make a sub-forum or even a whole forum section for GitHub account activity. Make a sticky post which is kept updated, with overview and introducing every GitHub content developers who are making unofficial work to Qubes. Then below that, everyone can post a detailed post for their GitHub page, listing and giving brief or detailed explanations of what it brings of value. Essentially it's possible to promote ones work here, so that others can find it. So overall, for example one forum section for guides on how to use and get into Qubes (i.e. new people to Qubes, and how to get started). Another section for work on scripts and guides with sub-forums, moving the scripts/guides over as they develop. And a final forum section to polish the scripts/guides to finish them. Then we can have a forum section for GitHub pages as described above, this way, people can choose the degree they want others to meddle in their work. For example GitHub while cooperative, doesn't tend to have others come in unless there is an open invitation there, or if the other party is rude. But on the forum here, it's an open invitation to come and work together on a project. This way one can preserve a form of individuality too, and invite others in naturally through the forum as a framework, if that is what is desired. The forum will then focus on both approaches, whether it's promoting/sharing work done on, or inviting on projects for work to-do. As such people can choose the style they like. Also in addition to that, not everyone enjoys working in groups, but some enjoys working alone (and that should be respected, imo). For example it may fuel energy and be relaxing to work alone (it can even be a way of relaxing after a long day at work/similar), while in contrast it would be exhausting to work with others. Essentially the embodiment of being introvert and extrovert, both I think is completely normal and none is better than the other. People who gain energy working with others prefer a different work-style. Nothing wrong with it either, it's just how people gain energy, there is nothing bad about either of the two. I think if we mix the approaches together, we can add value to both suggestions. It's also easier to have discussions for both groups, for example a forum for the copyright/law discussions on using other people work, so that we can be better informed on such matters. We can also highlight some kinds of works in various of different forums, wherever there is people willing to discuss or read, and all this can be closely tied to GitHub and GitHub Wiki's. What do you think of a merged approach? @Andrew On Saturday, March 3, 2018 at 6:25:08 AM UTC+1, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2018-03-02 23:16, Andrew David Wong wrote: > > On 2018-03-02 15:05, Yuraeitha wrote: > >> Some of the issues/questions addressed seems like they could be > >> solved quite effectively and efficiently on a highly > >> customize-able forum? > > > >> [...] > > > >> Thoughts about using a forum? > > > > FYI, in case you haven't seen this thread: > > > > https://groups.google.com/d/topic/qubes-users/2rqas38ncFA/discussion > > > > While at it, here are some other old threads where similar ideas have > been suggested: > > https://groups.google.com/d/topic/qubes-users/D0YuoXMe_vE/discussion > > https://groups.google.com/d/topic/qubes-users/es4q40dt1EE/discussion > > Approximately every 6-12 months since the beginning of the project, a > new person (including me, at one point, IIRC) suggests that there > should be a Qubes wiki or forum, so you'll find many more threads like > these if you search through the archives. :) > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > > -BEGIN PGP SIGNATURE- > > iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlqaMZcACgkQ203TvDlQ > MDDD4xAAwbajnwJ/PZxzrVnmzKECGkYVQQDs90LieN1s/ewuqilNx9Cdxk8Fy9La > jokevIemgSB/QjqRD1zl2L0ksn/XhsOgQyWyK+RCSNWdKsvDhJtsVvh0B5SA5t4N > FrMzig0uUHLodl9ZOT9ltvy/nOnMBj8YcfQ2i+3yEaOFSN6hc7DkyXnPRhLbEdrK > pwJJxbdAkvocSu6tEL1xE86cZ1CZrBIHvrVt1oCy1QPCr5EBNUukg4JMGOygZNi2 > 62TF+/vv1Fe9IeJ7tu+WaZLIJQ1guLesYMISMHAvsUaAwB+vbMFUFuRhHqhiB7Ir > qEyrf5S24aulX/F9w8043088Wd+RA/lWG2lyXZk3w9H+Gqn2UOKnKnJRCFxBmkbE > O+TS3/U4pB5t/4K9oezKc9dSODEt4RZO4LSN9U0i5Ksp4q1WDJyJC7eyRnQTpDc6 > sQHHCi3d0kFTxDozcjCJPFTLhE3OYqBfCClMmCXlLhL1j2/N0XS9nOYWRL2foA1R > FLaE4lOBuoNcAQO/XTXMEd3F2XUlCKOiLCLdNCVIYyhZJSFwHqpwt8pRLRk6n2hs > EdiyVGQh4uyOt1rWEniPEyyb2Bx/MLSYT4iafU/3ltY7uKbzDpmaUSP+oVZd6+gj > 6eEpVFlDzp4kfTCFRj3a/Gx8Ail4P9/KmHp+tBVfxrWQrFi+bWs= > =I6G3 > -END PGP SIGNATURE- Those are interesting older threads indeed, it gives some good new insight. I
AW: Re: AW: Re: [qubes-users] For community by community - A way to preserve/focus everyones work going into Qubes, bottom-up
Hello yuraeitha, Original-Nachricht An 2. März 2018, 22:05, Yuraeitha schrieb: > Thoughts about using a forum? Possibly with > a frontpage blog? If we indeed go with > something like this, forum or some other > platform, as you also questioned Ivan I don't know what the right platform looks like to share scripts and howtos which didn't make it to Qubes docs yet. But what I know is that I would like to have something available as soon as possible. I would call my self still a Qubes newbie which is a great opportunity to write documentation because I try to implement my existing workflows on Qubes and as soon as I find out that it will not work I am trying to work around it: either by changing my workflow or by enhancing Qubes so that it fits better. This "knowledge" is interesting to be shared for other newbie users or people who are interested in Qubes, mainly because... 1) people might be interested in Qubes, but are looking for information if their current workflow could be done on Qubes 2) if they need to change their workflow, they might be interested what would be a good approach 3) an active community is a very good advertisement. Thereof I think having a place at GitHub, where we can consolidate information is a good thing. Two reasons: 1) we know how to use GitHub 2) transfer of "qualified documentation" to the Qubes docs will be easy. Neverless it could make sense to present some of the more interesting subjects which have reached a certain quality level on the Qubes Blog or another blog. Please keep in mind that Qubes is and should be very interesting for user which are not that experienced with Mailinglists and GitHub, they also have the right to be reasonable secure and thereof the access to the documentation should be easy in the end. > who is interested in being a moderator? I'm > okay with helping out with it, but I probably > will need help to cover everything, especially > when I have exams and so on. I could also help out, but I don't think that there is much need to do so. If we are using Github as repository (soemthing maybe named "qubes-community-playground") we can start to use it. Honestly I expect to see much more people take a very short look there to scan if there is something that is useful for them, instead of actually contributing documentation themselves. But this is totally fine. I am currently writing a how-to to access Microsoft Exchange under Qubes which could be interesting to others, of they want to decide if they try it all. While I could add it to my own GitHub repository it would make more sense to share it and to improve it step by step. Maybe also a page like: "I wish Qubes would allow me to ..." where users leave their wishes and maybe others have a quick idea how to solve this. This could become something like a backlog to improve Qubes even further. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3mL8yqgzX82vXT0M2YQTfqtokZoNBaVgopo61t_IrBWJOu23qV2xMPREH9VLQdthorQIdTRoh_e_XqIJIGbZBHbKknThRCzmF0RhJXJZH2g%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] kernel panic after upgrade
mai...@maiski.net: > Hello, > > Unfortunately after the last update of Qubes 4.0 I have a kernel panic: > "unable to mount root fa on unknown block" and would appreciate if > somebody here could give me a tip. > > I installed Qubes 4.0-RC1 and since then been only updating. That could be the problem. A reinstall was required between 4.0-RC1 and 4.0-RC2. See here: https://www.qubes-os.org/news/2017/10/23/qubes-40-rc2/ > After the next-to-last update I was not able to boot xen 4.8.3 and linux > 4.14.13-3. > With the following configuration: xen 4.8 and linux 4.9.56-21 there is > no problem. > My machine is Lenovo T470S. > > Does anyone have an idea? > > m -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bf5d1c10-e2ab-0e06-1f8b-7cd2645cc94f%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Adding AppMenus in Qubes 4
On Saturday, March 3, 2018 at 12:02:15 PM UTC-5, awokd wrote: > On Sat, March 3, 2018 4:23 pm, Glen H wrote: > > > > > I created a pull request to update the docs: > > > > > > https://github.com/QubesOS/qubes-doc/pull/612 > > Haha I did too: https://github.com/QubesOS/qubes-doc/pull/611 > > Wanted to see how it worked out for you before publicizing. > > Thank you too, will check yours out as well. I like your better. I added a comment to yours. Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2d69805b-fc39-4329-971d-356b47ffe6a9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes R3.2 Failed to Load Kernel Modules
On Sat, March 3, 2018 3:54 pm, alternateg...@gmail.com wrote: > Yeah. I appreciate your feedback. It took me a lot to finally post. I > saw everything. I tried everything. Disabled hyperthreading etc. Every > time I got to the configuration part it would crash at Setting up > Network. I searched every Linux forum. I tried repairing my install six > or seven times (this was in fact the second machine I attempted Qubes > on). journalctl -xe, didn't seem to list a lot. > Systemd-modules-load.service (that one wouldn't work at all), I didn't > find much else to try and troubleshoot. I tried to boot in UEFI mode - > that didn't work either. I ordered a third machine, a Lenovo to try. My > advice to Qubes as a tech savvy user is to meet their users half-way. > This is apparently only an OS for rocket scientists or extreme Linux > hackers. The HCL doesn't make it very simple to even know what to buy. I believe that systemd-modules-load.service failure is a false alarm; I get it too and it doesn't seem to hurt anything. I had another laptop that would crash on setting up sys-net (Network). My workaround was to temporarily pull the wifi card for the install. Qubes could then set up sys-net with just the onboard ethernet and complete the install. Then I added the wifi card back and could troubleshoot getting it added to a VM. Once I had that resolved, I added it back to sys-net. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f33111e3fc54319a300c78ea3dbd610a.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Adding AppMenus in Qubes 4
On Saturday, March 3, 2018 at 7:43:02 AM UTC-5, awokd wrote: > On Sat, March 3, 2018 5:55 am, Glen H wrote: > > Hi, > > > > > > I'm trying to follow the instructions here for adding app menus: > > > > > > https://www.qubes-os.org/doc/managing-appvm-shortcuts/ > > > > > > But I can't get it to work. I noticed that only templateVMs have an > > "apps.templates" directory so I added a new vuescan.desktop file to my > > template's dir from Dom0 > > (~/.local/share/qubes-appmenus/fedora-26/apps.templates/vuescan.desktop) > > Can you try creating the shortcut in > ~/.local/share/qubes-appmenus/vmname/apps instead? See > https://www.qubes-os.org/doc/dispvm-customization/#adding-arbitrary-programs-to-disposable-vm-application-menu > . This doesn't work for me. I did: ``` cp vuescan.desktop ~/.local/share/qubes-appmenus/vmname/apps/vmname-vuescan.desktop qvm-sync-appmenus fedora-26 # also updated apps in Qubes Manager for vmname ``` > The "behind the scenes" section is just explaining how qvm-sync-appmenus > works. It's not instructions on how to create a shortcut, but I can see > why you might think them to be! Let me think on how to reword this or make > it more clear. I guess the difference with that page and what I'm trying to do is the page is written for someone who installed software via the package manager. I'm installing software myself. It make me think I need to put the .desktop file where the OS usually stores them and then it might be picked up. Glen -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b182940e-e55b-4134-978b-4367eb0485e8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes R3.2 Failed to Load Kernel Modules
And I actually know my way around a Linux command line, but the resources do not exist to help users like me. I returned the Latitude. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/37f1a9bf-d92f-425c-944f-efd033059c7e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes R3.2 Failed to Load Kernel Modules
Yeah. I appreciate your feedback. It took me a lot to finally post. I saw everything. I tried everything. Disabled hyperthreading etc. Every time I got to the configuration part it would crash at Setting up Network. I searched every Linux forum. I tried repairing my install six or seven times (this was in fact the second machine I attempted Qubes on). journalctl -xe, didn't seem to list a lot. Systemd-modules-load.service (that one wouldn't work at all), I didn't find much else to try and troubleshoot. I tried to boot in UEFI mode - that didn't work either. I ordered a third machine, a Lenovo to try. My advice to Qubes as a tech savvy user is to meet their users half-way. This is apparently only an OS for rocket scientists or extreme Linux hackers. The HCL doesn't make it very simple to even know what to buy. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0bae554f-4f6e-4be2-b89b-1d25efba2777%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Solved/Progress [Re: Cannot assign USB controller to App VM anymore (Qubes 3.2)]
Thank you for looking into this! Am Samstag, 3. März 2018 13:28:24 UTC+1 schrieb awokd: > On Fri, March 2, 2018 2:27 pm, Stefan wrote: > > > https://www.qubes-os.org/doc/assigning-devices/ > > > > > > and tried enabling 'permissive' mode as described for R3.2 in the above > > documentation. However, this per se doesn't work, as the target file > > (/sys/bus/pci/drivers/pciback/permissive) > > is not writeable, even for root and even when triggered through systemd. > > Just tested again on R3.2 and the procedure in the doc works, but only for > re-assignable devices (ones using the pciback driver in lspci). Are you > sure you were trying to write the correct :? When I tried with an > un-assignable device, I got: > > bash: echo: write error: No such device > This sounds like the error I got; don't really know what the properties of this USB hub are. I did not follow up as this isn't necessary > > > > >> > >> And xl dmesg shows: > >> > >> > >> XEN) [VT-D] It's disallowed to assign :00:1a.0 with shared RMRR at > >> da8d5000 for Dom5. (XEN) XEN_DOMCTL_assign_device: assign :00:1a.0 > >> to dom5 failed (-1) > >> > > > > For the record, xl dmesg is now telling me that > > [VT-D] It's risky to assign .. with shared RMRR at .. for Dom4 > > Setting pci_strictreset to false is what changed this message from > "disallowed" to "risky". > > > what ever that means. > > > > I don't know which of the options / changes did the trick, but one or > > more of the above seems to enable the camera in 'untrusted'. > > Setting pci_strictreset to false. It indeed looks like it. I reset everything (to the best of my recollection) and played again with the various options to pass through the USB hub to 'untrusted'. And indeed, this time around, setting pci_strictreset to false was enough. I was a 100% positive that I tried that before and it seemed not to work. However, this time, after qvm-reset -s .. I rebooted before trying whether this changed anything. Anyways, thanks again for your help! Stefan -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0682b44e-f24f-4a9d-8663-98c82d3b9a0c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Adding AppMenus in Qubes 4
On Sat, March 3, 2018 12:42 pm, awokd wrote: > On Sat, March 3, 2018 5:55 am, Glen H wrote: > >> Hi, >> >> >> >> I'm trying to follow the instructions here for adding app menus: >> >> >> >> https://www.qubes-os.org/doc/managing-appvm-shortcuts/ >> >> >> >> But I can't get it to work. I noticed that only templateVMs have an >> "apps.templates" directory so I added a new vuescan.desktop file to my >> template's dir from Dom0 >> (~/.local/share/qubes-appmenus/fedora-26/apps.templates/vuescan.desktop >> ) >> > > Can you try creating the shortcut in > ~/.local/share/qubes-appmenus/vmname/apps instead? See > https://www.qubes-os.org/doc/dispvm-customization/#adding-arbitrary-progra > ms-to-disposable-vm-application-menu . Looks like another option is to create the .desktop file inside the TemplateVM itself, under /usr/local/share/application and then run qvm-sync-appmenus against that template. https://www.mail-archive.com/qubes-users@googlegroups.com/msg17553.html -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/df790c18acdd49a80fc4f2ab6edaa824.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] kernel panic after upgrade
On Fri, March 2, 2018 8:22 am, mai...@maiski.net wrote: > Hello, > > > Unfortunately after the last update of Qubes 4.0 I have a kernel > panic: "unable to mount root fa on unknown block" and would appreciate > if somebody here could give me a tip. I think there is a typo here, try searching on "unable to mount root fs on unknown block" instead. Looks like there are several possible causes, especially if you are dual/multi-booting. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9c9002d7bf498042059782bde81fd7b4.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Adding AppMenus in Qubes 4
On Sat, March 3, 2018 5:55 am, Glen H wrote: > Hi, > > > I'm trying to follow the instructions here for adding app menus: > > > https://www.qubes-os.org/doc/managing-appvm-shortcuts/ > > > But I can't get it to work. I noticed that only templateVMs have an > "apps.templates" directory so I added a new vuescan.desktop file to my > template's dir from Dom0 > (~/.local/share/qubes-appmenus/fedora-26/apps.templates/vuescan.desktop) Can you try creating the shortcut in ~/.local/share/qubes-appmenus/vmname/apps instead? See https://www.qubes-os.org/doc/dispvm-customization/#adding-arbitrary-programs-to-disposable-vm-application-menu . The "behind the scenes" section is just explaining how qvm-sync-appmenus works. It's not instructions on how to create a shortcut, but I can see why you might think them to be! Let me think on how to reword this or make it more clear. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fdeff695a9fd3d65e26d77925d463878.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Solved/Progress [Re: Cannot assign USB controller to App VM anymore (Qubes 3.2)]
On Fri, March 2, 2018 2:27 pm, sbore...@gmail.com wrote: > https://www.qubes-os.org/doc/assigning-devices/ > > > and tried enabling 'permissive' mode as described for R3.2 in the above > documentation. However, this per se doesn't work, as the target file > (/sys/bus/pci/drivers/pciback/permissive) > is not writeable, even for root and even when triggered through systemd. Just tested again on R3.2 and the procedure in the doc works, but only for re-assignable devices (ones using the pciback driver in lspci). Are you sure you were trying to write the correct :? When I tried with an un-assignable device, I got: bash: echo: write error: No such device > >> >> And xl dmesg shows: >> >> >> XEN) [VT-D] It's disallowed to assign :00:1a.0 with shared RMRR at >> da8d5000 for Dom5. (XEN) XEN_DOMCTL_assign_device: assign :00:1a.0 >> to dom5 failed (-1) >> > > For the record, xl dmesg is now telling me that > [VT-D] It's risky to assign .. with shared RMRR at .. for Dom4 Setting pci_strictreset to false is what changed this message from "disallowed" to "risky". > what ever that means. > > I don't know which of the options / changes did the trick, but one or > more of the above seems to enable the camera in 'untrusted'. Setting pci_strictreset to false. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bc6c4fe2cd0600f39143797d52ddfef1.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: qrexec demon fails to load any VM when I attach any device
On Fri, March 2, 2018 4:00 am, Allen Larocque wrote: > I checked the qvm-pci lists and the audio driver isn't assigned to any > VMs. This is a fresh install with the sys-USB VM on. You wrote "driver" here- you meant "device", right? Double check your VM settings > Devices and make sure it's not assigned to any VM. If that results in unassigning it from one or more, reboot afterwards. > As far as I can summarize the problem now: > 1. lspci shows the audio device. > 2. aplay-l shows 'no audio device' It should, if dom0 recognizes it. Look through "sudo journalctl -b" for errors related to your audio device. > 3. Pulseaudio output and config tabs show no audio devices (except the > virtual one 'simultaneous output'). > > I've been interpreting this as a driver issue? But unsure how to fix/ get > the appropriate drivers Journalctl should give you more information to review. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8db587b36629138ee28e771ab6ec18c9.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] error opening sys-net & dom0 flashing yellow triangle
On Thu, March 1, 2018 12:12 am, yreb...@riseup.net wrote: > Today opening sys-net I get these errors in the terminal , though > sys-net continues on and seems OK , I suppose by now, it is expected > behavior that sys-net takes a long time and sometimes never shutsdown ?? > > File "/usr/bin/qvm-start", line 136, in > main() File "/usr/bin/qvm-start", line 120, in main > xid = vm.start(verbose=options.verbose, > preparing_dvm=options.preparing_dvm, start_guid=not options.noguid, > notify_function=tray_notify_generic if options.tray else None) File > "/usr/lib64/python2.7/site-packages/qubes/modules/005QubesNetVm.py", > line 143, in start vm.attach_network(wait=False) File > "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", > line 1738, in attach_network self._format_net_dev(self.ip, self.mac, > self.netvm.name)) File "/usr/lib64/python2.7/site-packages/libvirt.py", > line 530, in attachDevice if ret == -1: raise libvirtError > ('virDomainAttachDevice() failed', > dom=self) libvirt.libvirtError: invalid argument: network device with mac > 00:16:3e:5e:6c:06 already exists > > > > > I cont'd on after sys-net started via CLI above but occasionally I > see a dom0 flashing triangle FWIW, maybe not related to below ?? > > (XEN) [VT-D]DMAR:[DMA Write] Request device [:04:00.0] fault addr > fff0, iommu reg = 82c0009f4000 (XEN) [VT-D]DMAR: reason 05 - PTE > Write access is not set > (XEN) [VT-D]DMAR:[DMA Write] Request device [:04:00.0] fault addr > fff0, iommu reg = 82c0009f4000 (XEN) [VT-D]DMAR: reason 05 - PTE > Write access is not set > (XEN) [VT-D]DMAR:[DMA Write] Request device [:04:00.0] fault addr > fff0, iommu reg = 82c0009f4000 (XEN) [VT-D]DMAR: reason 05 - PTE > Write access is not set > > > > > THIRDLY, > of late qvm-shutdown --all has been hanging and I must do a hard reboot , > or do qvm-shutdown VM1 VM2 VM3 etc , which is kind of a pain ... > > > I'm not really geeky enough to know if any of these might be related or > fix themselves, Lastly, I am running the security update repo , but > don't recall if any of these started before or after installing the > security patch for the intel issues. > > > any suggestions to do something or nothing appreciated These are probably related. If you don't use the device on 04:00.0 (check with lspci), remove it from sys-net and see if it helps. See https://github.com/QubesOS/qubes-issues/issues/1710 too. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a669cb876630ae99e26ecd09009004b6.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: non qubes
On Thu, March 1, 2018 11:13 am, Yuraeitha wrote: > On Thursday, March 1, 2018 at 9:30:52 AM UTC+1, jer...@disroot.org wrote: > >> where do i find support for security, privacy? (some place where i can >> post with anonimity too, reddit privacy requires java script i think, >> doesn't it compromise anonimity? also i would like to ask how things >> are recommended in doing, like a guide, etc... >> >> for example i need to know if enabling java script to watch youtube in >> tor will compromise anonimity or anything like that, or enabling java >> script in other websites, if it's a risk.. and how i should tell where >> i can enable java script, etc.. also if it's recommended to buy stuff >> through tor, and how, etc and what its benefits, etc... General usage questions about Tor might be best asked over on the tor-users mailing list. Enabling Javascript anywhere is a risk because it opens up attack vectors to your computer, but by itself it will not automatically compromise anonymity. Someone would have to be using an exploit delivered over Javascript to do that. This is pretty unlikely in the case of large sites such as Youtube or Reddit, unless state agencies are targeting you specifically (which Tor makes more difficult). Qubes is designed to contain exploits to a single VM. If you use it with a disposable VM for browsing, even if you do get compromised in a browsing session such as by a Javascript virus in Google ads on Youtube, closing that Tor Browser and opening a new one will result in it using a fresh, non-compromised disposable VM. Buying items through Tor means using your real identity through Tor. Some people use Tor for everything including banking. Some use Tor for all browsing except anything involving their real identity. Others just use Tor occasionally for some sites. Try searching tor-users mailing list for questions similar to yours; you'll need to develop your own answer. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b292931916dfcf1b30f1eff3d6524640.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Mac Spoofing preinstalled? - Qubes 4 rc4
On 03/03/2018 02:21 AM, Tristan Fleming wrote: Has mac spoofing been preinstalled in Q4 rc4? I cant find any documentation on it, but the cmd: ip link show wls1 changes every 10 minutes or so. I actually want to stop it and I cant seem to make it static. Lil help!! Ive tried everything I can think of. Im not entirely understanding the network topology. I have figured out that Macchanger is installed on the Debian Template. Im otherwise at a loss. Its not a Qubes feature. When wifi is not connected to an AP, its now the Network Manager and wpa_supplicant default to randomize the mac address. The mac address shouldn't change while you're connected though. Here are a couple links: https://blogs.gnome.org/thaller/2016/08/26/mac-address-spoofing-in-networkmanager-1-4-0/ https://www.qubes-os.org/doc/anonymizing-your-mac-address/ If you haven't tried already, it sounds like you want to change the wifi.scan-rand-mac-address setting. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/35a718d0-92d8-5134-8de9-9fbfe77cc3a1%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes R3.2 Failed to Load Kernel Modules
On Fri, March 2, 2018 3:44 am, alternateg...@gmail.com wrote: > I have the same issue, except Qubes fails to install on my Dell Latitude > E6410. This was the second machine I was unable to install Qubes on, and > this one I purchased specifically because I saw it on the Hardware > Compatibility List. My system also presumably met the core requirements > on site. I get stuck at sys-net in the latter part of installation > process post-GRUB. systemd-modules-load.service will not load in > recovery mode. Machine is a Dell Latitude E6410, Core i5 2.4ghz, 4 GB > DDR3 ram. If Qubes worked I would love to join the community, right now > seems it's still in alpha stages. Help would surely be appreciated. Did you see the notes by the entries for that laptop on the HCL? For example, one says you need to disable hyperthreading on i5. Have you tried that? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e2eef7b070f9a57dff7ae2053791245f.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: how to use email securely in qubes? thunderbird doesn't send messages
Le vendredi 2 mars 2018 14:00:18 UTC+2, jer...@disroot.org a écrit : > 1 email or multiple emails. > says sending message when clicking send (stuck) in thunderbird. I am using thunderbird and enigmail on a StandaloneVM. What OS are you using ? Have you check your FW rules if you have any ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5ac1dd1e-d1fe-4b58-b4ce-36618b4a830d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Migrating to second hard drive
Le vendredi 2 mars 2018 11:26:03 UTC+2, Unman a écrit : > On Fri, Mar 02, 2018 at 04:10:24AM -, 'awokd' via qubes-users wrote: > > On Fri, March 2, 2018 3:38 am, Glen H wrote: > > > On Thursday, March 1, 2018 at 10:37:26 PM UTC-5, Glen H wrote: > > > > > >> Hi, > > >> > > >> > > >> My primary SSD is out of space and I have a second hard drive. I've > > >> formatted it but not sure how to migrate my cubes to it. Does anyone > > >> have any instructions for doing this? > > >> > > >> Ideally, I'd boot from my new hard drive and use original one to store > > >> my backups of my qubes. > > >> > > >> Thanks, > > >> > > >> > > >> Glen > > >> > > > > > > I forgot to mention that I'm on Qubes 4 and I'm pretty knowledgeable > > > about Linux. > > > > Make sure you do a backup first. You might be able to "cheat" and DD the > > small drive to the larger then expand, as long as you're comfortable with > > LVM. On the other hand, pulling the small drive, installing Qubes on the > > new, and restoring from backup wouldn't take that much longer. > > If you cheat you'll have to fix grub if you're using it. I suspect it'll > be cleaner to take the second option and install 4.0 on the new drive > when it comes out. What about doing a backup of all your VMs / template first. Doing a fresh install of Qubes on your new HDD. Restored your backuped VMs ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/06a0bb91-54c6-41e2-8a4f-e2de6ab886a0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.