Re: [qubes-users] Restored 3.2 template's and appvm's in 4.0 does not let you start applications from Q-menu.

2018-04-17 Thread 'awokd' via qubes-users
On Tue, April 17, 2018 6:47 pm, Christoffer Lilja wrote:
> In Qubes OS 4.0 if I select (as a example, but not limited to) xterm from
> the Q-menu in a AppVM that was restored from Qubes OS 3.2. The xterm
> won't start, the AppVM in it self starts but not xterm. The same thing if
> I start the AppVM beforehand and select xterm from Q-menu afterwards.
>
>
> But if i run "qvm-run appvm xterm" it starts without any issues.
>
>
> How come it doesn't work from the Q-menu, and do you have any good ideas
> how to debug this and eventually solve it?

I had this too. My solution was to create some new replacements in 4.0,
use qvm-copy-to-vm inside the old 3.2 VMs to copy the data over to the
new, then delete them.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cbdfd159f67faae17c7b6a15db2305b2.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Shell Determine NIC and run rules on NetVM once machine started, not run on local guest.

2018-04-17 Thread Drew White
Shell Determine NIC and run rules on NetVM once machine started, not run on 
local guest.

Is it possible?

I want one VM.. It conencts to the NetVM..
All requests that are on specific ports targeting IP are to be redirected to it 
if it is running.
But every request it makes on that port go wherever they are meant to go.

How can I do this and let the guest tell the NetVM to run a script to determine 
the virtual interface that it is on and use that as the main interface for the 
iptables queries?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fc9010bc-84a5-4ca2-ac40-6ac6a4f341ca%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: ANN: Testing new VPN code for Qubes

2018-04-17 Thread Chris Laprise

On 04/17/2018 09:20 PM, JonHBit wrote:

On Tuesday, April 17, 2018 at 2:13:29 PM UTC-7, Chris Laprise wrote:

Hello fellow Qubes users:

Per issue 3503 the Qubes project would like to incorporate VPN features
from Qubes-vpn-support -- which a number of you are already using --
into the Qubes 4.1 release.

I've set up a new project "qubes-tunnel" to act as a staging area for
testing and eventual forking into Qubes. It is nearly the same as
Qubes-vpn-support except some names & paths are different... and install
to template is required for obvious reasons :) .


Project Link... https://github.com/tasket/qubes-tunnel


Everyone with an available VPN service is welcome to try this out and
report here on your results!

-

PS - Some of you will wonder if installing qubes-tunnel into an existing
template already used for Qubes-vpn-support will cause a conflict; They
will not conflict as long as the two services aren't enabled for the
same ProxyVM(s).

--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886


Worked well for me using a debian-9 template & commit 4e96ca8, only trouble was 
that my VPN provider's configs used /etc/update-resolv-conf and failed silently 
when it was missing - so shipping it with qubes-tunnel and installing it by default 
may be helpful.


Thanks!

This issue just became apparent to me when another user reported it. The 
underlying problem is a bug (or several bugs) in openvpn's option parsing:


https://github.com/tasket/Qubes-vpn-support/issues/19

It only shows up when the config specifies its own scripts which is 
rare. I'm trying out a workaround now which involves:


1. Removing the paths in the up & down options in the .service file.

2. Moving the up & down options to the beginning just after the openvpn 
command.


3. Symlinking the up/down script from /usr/lib/qubes to the 
/rw/config/qtunnel dir.


Hopefully this will override the config's up/down settings as intended.

--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/43b11e07-760e-7357-566d-b74a926f4889%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes VM Hardening v0.8.2 Released!

2018-04-17 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-04-17 11:47, Chris Laprise wrote:
> On 04/17/2018 12:25 AM, none wrote:
>> Is there some official opinion on this from whomever the Qubes
>> developers are ?
> 
> This is the closest to an official opinion I guess:
> 
> https://github.com/QubesOS/qubes-issues/issues/2748
> 

Just to clarify: The current status of that issue means that the core
devs have not yet reviewed the package. We're at step 4 of the
package contribution procedure:

https://www.qubes-os.org/doc/package-contributions/#contribution-procedure

> [...]
> 
>> Am a bit curious who is officially a dev  on here, I have a few guess,
>> besides Marek, but  maybe its folks with the PGP sigs , shrug.
> 
> Just having a PGP sig doesn't indicate status with the project. The
> Qubes core team is listed here:
> 
> https://www.qubes-os.org/team/
> 

Chris is correct on both counts:

1. "However, anyone on the list can choose to sign their messages, so
   the presence of a PGP signature does not indicate authority."

   https://www.qubes-os.org/support/#staying-safe

2. The core devs are the developers in this list:

   https://www.qubes-os.org/team/#core-team

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrWtBgACgkQ203TvDlQ
MDC6HxAAsjMZLDgpnVfJd5rj4HMQ8j1vZ2i+yrL1CEo2TjFNpHAaLD95Yx1SHv8d
3OmV+o6yUKciqwSvu+uY2+snIKYaNc/X9O+OiCiKQ98waaIYaHhcs8Jnk+BxY+yF
xvHTR6xWKh80oZPSfgq446D53ydqWsdYe6/D+6vLqMy5nS2sZncJi3r375ZZwH+Z
5erIK09d5ojEUbqbHZbpJSQK9D2CRSHufleYhNPQkFR9yn2CkQHHrFJZTSyTjLmD
3VOgh8Yfy9a5vcW6olypWPL+JpRyYXmWieJ7K/6zhFJ9/JDFkzQUbVFRHfry8hTE
ltkggfly/ACluziEWqAIBl/nOvUnbTKzUp4tae8wRtFqQOTUbtJ2Nv3nUL571Jhr
9DWttsHmi4oaEyHmuFFpOHM1dtOlCMpLzo7r8AxQatp+LyWLvbMVliOWSc12Srru
oN7LLDt/EFquSuPh0umVPcsymXWxkiCduvaWbZ7h+p8ylAAUep+JFqRAs1jn2nux
QSTvAzeo3XsnPhDKP5+Hq2BanYhIg9YMPQX2i3QtEnRCvuztyFy1UXuOnjA2waXH
ptG1jub/ib0CXgWz0Ztao0z1Vzk2bRfFufGtJC1to85u8nLH8+93zmnn4LViH/81
pLtpl19nxcbAXkA7LZUUiPseQssfzn1G+tSrmVQ6hFxMCc3cvrU=
=0RHt
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bdc66f4d-b6bf-d515-0c96-a77d8742d5b4%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: Testing new VPN code for Qubes

2018-04-17 Thread JonHBit
On Tuesday, April 17, 2018 at 2:13:29 PM UTC-7, Chris Laprise wrote:
> Hello fellow Qubes users:
> 
> Per issue 3503 the Qubes project would like to incorporate VPN features 
> from Qubes-vpn-support -- which a number of you are already using -- 
> into the Qubes 4.1 release.
> 
> I've set up a new project "qubes-tunnel" to act as a staging area for 
> testing and eventual forking into Qubes. It is nearly the same as 
> Qubes-vpn-support except some names & paths are different... and install 
> to template is required for obvious reasons :) .
> 
> 
> Project Link... https://github.com/tasket/qubes-tunnel
> 
> 
> Everyone with an available VPN service is welcome to try this out and 
> report here on your results!
> 
> -
> 
> PS - Some of you will wonder if installing qubes-tunnel into an existing 
> template already used for Qubes-vpn-support will cause a conflict; They 
> will not conflict as long as the two services aren't enabled for the 
> same ProxyVM(s).
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

Worked well for me using a debian-9 template & commit 4e96ca8, only trouble was 
that my VPN provider's configs used /etc/update-resolv-conf and failed silently 
when it was missing - so shipping it with qubes-tunnel and installing it by 
default may be helpful.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3ec91d2-2ab8-4467-8cc1-3a20fbb838ef%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Thinkpad X1 Carbon 6th gen - Qubes 4.0

2018-04-17 Thread srvlog01
On Monday, April 16, 2018 at 2:14:43 PM UTC-8, fiasc...@gmail.com wrote:
> Summary: Install worked reasonably well and it boots with EFI into the 
> installed Qubes 4.0 nicely. There are a few issues to resolve.
> 
> 2. Suspend/resume doesn't work and I have to do a hard reset. A few times 
> (not all) I had to hard reset twice to get it to reboot properly.
> 

I had an issue similar to this in my Skylake Thinkpad (T460). In dom0, try 
adding i915.enable_rc6=0 to your /etc/default/grub grub_cmdline. 

Then run:

grub2-mkconfig --output /boot/grub2/grub.cfg 

and reboot. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0bcdf4f0-852d-42c0-94a5-3bd92df2a522%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Win7 install hanging since updating Qubes Manager

2018-04-17 Thread Drew White
Hi folks,

Ever since I updated the Qubes Manager I have not been able to install Windows 
7.

The instructions at "https://www.qubes-os.org/doc/hvm/; do not help because 
"qvm-features" does not exist as a function.

What has happenned to Qubes? Why is it starting to fail after updating things? 
were they not tested properly?

Just asking.

Hope someone can help.

Sincerely,
D.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9dc4e5c-62aa-4908-a158-4284d5883056%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Small Templates

2018-04-17 Thread Drew White
On Tuesday, 17 April 2018 22:22:35 UTC+10, awokd  wrote:
> On Tue, April 17, 2018 12:32 am, Drew White wrote:
> > Has anyone managed to work out a miniature template that works for Qubes
> > with all the additions?
> >
> > I'm just talking about super small versions.
> >
> >
> > Are there any versions that are nice and small?
> 
> fedora-minimal is pretty minimal!

it is minimal in what it thinks is minimal, but it is still not nice and small, 
or what I asked about "super small"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8dd3f9ba-ab95-4dff-899a-962f0ad31a3c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Strange 3.2 Multi-monitor woes? PCI device does not exist?

2018-04-17 Thread Stumpy
I recently added another gfx card which seemed to go smothly enough 
except it apparently didn't. When I tried to plug in monitors to the 
integrated video ports AND the graphics card things started going 
sideways (and I can't figure out why they would?). One example is most 
times I boot no icons show up, not in the xfce menu nor context menu nor 
on the qubes manager, just the text. When I tried to rotate the monitors 
(via xfce) they acted funny the wallpaper displaying strangly but the 
qubes manager window showing up ok (in the same monitor at the same 
time). Also sometimes (some reboots) I am able to access the "display" 
option to try to fiddle with getting the monitors right, other times 
when try clicking display its like the display window shows up then 
instantly closes (its so fast I can't actually tell if its the display 
settings window or not). Lastly, so far, when I try to start up an appvm 
I get the following:
Error starting VM  PCI device 02:00.0 does not exist (domain 
)

though that happens with all the appvms and the debian templates
and for redhat and whonix I get:
qubes manager
error starting vm 'fedora-26' maximum recursion depth exceeded

I am really really stumped, need help!

PS for what its worth, the gfx card is in a pci-16 slot, the integrated 
gfx ports are hdmi and dvi, the gfx card ports are DP and DVI.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2efb01e34236fb8be28925110ee471f0%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to Alt-Tab Cycle Minimized WIndows

2018-04-17 Thread jsnow
anon432:
> I'm hoping there is an obvious and simple solution, but I have looked through 
> every XFCE and window manager setting I can find.
> 
> System: Qubes 4.0 stable. XFCE desktop.
> 
> Current behavior: If a Window is Minimized, using Alt-Tab to cycle through 
> open windows does NOT show or cycle through the minimized window.
> 
> Expected Behavior: Alt-Tab cycles through all windows on the desktop 
> regardless of minimized status.
> 
> Is this a setting I am missing?
> 
> Is this a security feature I don't understand?
> 
> If so, can I disable it? What are the ramifications?

Hi,

There's a related setting that should fix it. I'm using 3.2 with XFCE,
and I don't know if 4.0 uses a different version that has the setting in
a different place, but for me anyways..

Qubes menu -> system tools -> window manager tweaks
On cycling tab, make sure "include hidden (ie iconified) windows" is checked

-- 
Jackie

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62fc5b58-b5b4-92b5-f724-ca94a2f10816%40bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Dom0 loads only

2018-04-17 Thread Anirban Kar
I am running Qubes3.2. Sometimes I see only dom0 loading. In such case I cannot 
start any other vm like sys_net, sys_firewall, sys_whonix and get an error 
message of insufficient memory. The error got solved after I ran Spinrite 6.0 
at level 5. I have a old HDD. Does it has something to do with IDE mode 
switching as it is required to run Spinrite 6.0. I have checked booting from 
IDE and AHCI. Facing same issue. Is this my hardware problem or a known issue ? 
In normal times dom0, sys_net,sys_firewall,sys_whonix loads automatically and 
Tor connects.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/509ca43b-9ea3-4a09-8e16-9747fab9bdd8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Music streaming in Firefox 59: QubesOS 4.0 / Fedora 26

2018-04-17 Thread 00010agency
What is holding a music streaming station (or entire site) like 
https://www.radiotunes.com/datempolounge back from streaming under QubesOS 4.0 
- Fedora 26 - Firefox 59 ?

AFAIK, MP3 support is now integrated in Fedora. What is still missing?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cc50cf9d-5f5e-4837-862e-b61c6b538e45%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] ANN: Testing new VPN code for Qubes

2018-04-17 Thread Chris Laprise

Hello fellow Qubes users:

Per issue 3503 the Qubes project would like to incorporate VPN features 
from Qubes-vpn-support -- which a number of you are already using -- 
into the Qubes 4.1 release.


I've set up a new project "qubes-tunnel" to act as a staging area for 
testing and eventual forking into Qubes. It is nearly the same as 
Qubes-vpn-support except some names & paths are different... and install 
to template is required for obvious reasons :) .



Project Link... https://github.com/tasket/qubes-tunnel


Everyone with an available VPN service is welcome to try this out and 
report here on your results!


-

PS - Some of you will wonder if installing qubes-tunnel into an existing 
template already used for Qubes-vpn-support will cause a conflict; They 
will not conflict as long as the two services aren't enabled for the 
same ProxyVM(s).


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee24f104-efbc-23f7-aca3-6be86104ddaf%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Thinkpad X1 Carbon 6th gen - Qubes 4.0

2018-04-17 Thread fiasco4297
I'm going to try seeing what drivers are loaded and if any of those are the 
cause. https://www.qubes-os.org/doc/wireless-troubleshooting/ 
Blacklisting the two wifi drivers as per the above did not fix it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ce07b19b-b7ed-4bc1-bea3-a4e10161b28f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Thinkpad X1 Carbon 6th gen - Qubes 4.0

2018-04-17 Thread fiasco4297
On Tuesday, April 17, 2018 at 1:34:34 AM UTC-7, bbrr...@gmail.com wrote:
> On Monday, April 16, 2018 at 11:14:43 PM UTC+1, fiasc...@gmail.com wrote:
> > Summary: Install worked reasonably well and it boots with EFI into the 
> > installed Qubes 4.0 nicely. There are a few issues to resolve.
> > 
> > 1. I have the model with a touch screen and I haven't debugged how to make 
> > it work yet (I'll get to that and post back what worked).
> > 
> > 2. Suspend/resume doesn't work and I have to do a hard reset. A few times 
> > (not all) I had to hard reset twice to get it to reboot properly.
> > 
> > 3. HCL reports no TPM, but I have a dTPM 2.0.
> > 
> > It's booting with UEFI smoothly. I haven't tested the mic, camera, or ports 
> > except USB for storage yet. I'll update once I find fixes for the above. If 
> > anyone could point me in the right direction for the suspend freezing 
> > issue, let me know. I tried shutting down all VMs, including service VMs 
> > after reading this, 
> > https://groups.google.com/d/msg/qubes-users/81t26xq4MEI/HrfDEcjeAgAJ but 
> > the problem persisted didn't change anything.
> 
> Might be worth flashing to most recent BIOS. (I did that straight away on my 
> T480 so I'm not sure if that contributed to suspend eventually working well)

Tried that before anything else.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9722a448-34a1-405f-b4eb-751e603b226c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [QUBES 4.0] Manually update dom0?

2018-04-17 Thread 'awokd' via qubes-users
On Tue, April 17, 2018 4:17 pm, Gerry Doyon wrote:

> I couldn't really see any "gotchas" with respect to the results from
> "sudo journalctl -e". I see a line saying "Activating  the sys-net VM"
> followed by lots of lines stating
> "balance_when_enough_memory(xen_free_memory=49808471,
> total_mempref=1545864883.2, total_available_memory4633140722.8) followed
> later on down by Start failed: qrexex-daemon startup failed: Connection
> tot he VM failed

Thought there'd be a message in that log related to the VM startup
failure, but maybe not. I suspect it's an issue with the NIC sys-net is
trying to use. To confirm, remove it from Selected Devices in Qube
Settings, then try to start sys-net. If it starts up, that's the issue.
Try the "no-strict-reset" workaround here
https://www.qubes-os.org/doc/assigning-devices/#pci-passthrough-issues,
and if that doesn't help then the permissive one (or both!)


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9aa49f7ffa6e85f9e6b2dd5b91df4c10.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Restored 3.2 template's and appvm's in 4.0 does not let you start applications from Q-menu.

2018-04-17 Thread Christoffer Lilja
In Qubes OS 4.0 if I select (as a example, but not limited to) xterm from the 
Q-menu in a AppVM that was restored from Qubes OS 3.2. The xterm won't start, 
the AppVM in it self starts but not xterm. The same thing if I start the AppVM 
beforehand and select xterm from Q-menu afterwards.

But if i run "qvm-run appvm xterm" it starts without any issues.

How come it doesn't work from the Q-menu, and do you have any good ideas how to 
debug this and eventually solve it?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e9964ed-fe98-46cf-9662-6daf24e8639a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes not boot from USB Stick

2018-04-17 Thread alex . montag1977
i have my usb stick created with dd. the install with the same stick works 
great with a other thinkpad.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ffad4c9e-cef6-4621-8d50-c5dafc3c8868%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes not boot from USB Stick

2018-04-17 Thread Black Beard
Hello,

i heard that rufus fails most time by creating a Linux Distribution on a Usb 
Stick. 

Try to copy the files with Unetbootin to your Usb Stick. 

Greetz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7ebe51b9-0a86-42e9-8e37-4f2fb29ce461%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes not boot from USB Stick

2018-04-17 Thread alex . montag1977
Am Dienstag, 17. April 2018 18:05:24 UTC+2 schrieb myblackc...@gmail.com:
> Hello community,
> 
> i verify the Iso file from the Qubes main site successfully.
> 
> Now i following the installation guide to Install the Iso image with rufus on 
> my USB Stick. I use Windows10 at time.
> 
> I've followed all the steps, but the operating system just will not start.
> 
> I see some Linux commands but then I only find a black screen.
> 
> What iam doing wrong?
> 
> About your help i would be very happy.
> 
> If you need some much more details, pls let me know.
> 
> Thanks and regards

hello,
i have the same problem.
i think it is a problem with a dedicated gpu.
it is not possible to deactivated my gpu in the bios.
i think if change the parameter in the bootXX.cfg it is possible to start the 
install also i can't change the parameter.
ps: qubes 3.2 run without problems on my mibook 13"

sorry for my bad english

mfg Alexander

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27def255-f643-4670-be2b-a19faaed965d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes VM Hardening v0.8.2 Released!

2018-04-17 Thread Chris Laprise

On 04/17/2018 12:25 AM, none wrote:
Is there some official opinion on this from whomever the Qubes 
developers are ?


This is the closest to an official opinion I guess:

https://github.com/QubesOS/qubes-issues/issues/2748

Patrick/adrelanos (also on the Qubes team) has expressed positive 
interest: https://github.com/tasket/Qubes-VM-hardening/issues/2




Looks like it's a bit non trivial, and interacts with dom0 ; hence I'm 
likely to break Q4.0  trying to 'harden' it :)



I was thinking I could clone the Deb-9 Template, and all would be OK, if 
I failed however ...


Its pretty benign to the OS itself. The dom0 commands should be 
identical to the related Qubes doc about enabling sudo prompts:


https://www.qubes-os.org/doc/vm-sudo/#replacing-password-less-root-access-with-dom0-user-prompt

You can skip the sudo prompt configuration and use the alternative for 
restoring internal VM security: Just remove the 
qubes-core-agent-passwordless-root package from the template.


The main risk with the vm-boot-protect-root service is that any settings 
or scripts that are subsequently added to VMs in /rw/config, 
/rw/usrlocal, and /rw/bind-dirs may be deleted (although the first time 
it backs up those dirs and those copies are kept indefinitely).




Am a bit curious who is officially a dev  on here, I have a few guess, 
besides Marek, but  maybe its folks with the PGP sigs , shrug.


Just having a PGP sig doesn't indicate status with the project. The 
Qubes core team is listed here:


https://www.qubes-os.org/team/


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d50aba31-12f8-be7d-075e-443dcc916efc%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [QUBES 4.0] Manually update dom0?

2018-04-17 Thread Gerry Doyon
On Tuesday, April 17, 2018 at 3:27:19 PM UTC+1, awokd wrote:
> On Tue, April 17, 2018 2:20 pm, Gerry Doyon wrote:
> > Hi all,
> >
> >
> > I've tried searching the forum for an answer to my problem but have been
> > unsuccessful. I've installed Qubes OS 4.0 on my desktop. During
> > configuration I get errors when the system tries to create then start
> > "sys-net" and "sys-firewall".
> >
> >
> > Manually attempting to start "sys-net" fails.
> 
> Any error message? Might be in "sudo journalctl -e". Also, try switching
> sys-net's template to debian-9 and starting it.

I couldn't really see any "gotchas" with respect to the results from "sudo 
journalctl -e". I see a line saying "Activating  the sys-net VM" followed by 
lots of lines stating "balance_when_enough_memory(xen_free_memory=49808471, 
total_mempref=1545864883.2, total_available_memory4633140722.8) followed later 
on down by Start failed: qrexex-daemon startup failed: Connection tot he VM 
failed


I did as you said but got the same results. 

> > I can't even start a
> > default Fedora VM because "sys-net" fails. I also get a message during
> > boot saying "Failed to Load Kernel Modules".
> 
> Ignore this one.
> 
> > I have a proven, good Internet connection connected to my desktop, but,
> > it won't work because of what I've already mentioned above.
> >
> > Some research indicates that I should update "dom0" to fix a bug that
> > seems to be causing the problem that I am having.
> 
> Link to the bug?

Here's a link: https://github.com/QubesOS/qubes-issues/issues/3133

I get several of the same kinds of errors, like "WARNING: Sum of all thin 
volume sizes (2.05 TiB) exceeds the size of thin pool qubes_dom0/pool00 and the 
size of whole volume group (1.82 TiB)!\n'"

...except with my memory sizes.


> > Yet, without an
> > Internet connection I don't know how to do this.
> >
> >
> > Can I download a "package" then install the update? Any and all help is
> > very much appreciated. Thanks!
> 
> If you have access to another computer, could temporarily swap the hard
> drive to it, install Qubes, then swap back; but I think it would be easier
> to try to fix sys-net first.

I don't have another PC available to test this on, sadly.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/746c6bcf-8763-4e5c-a183-774b9220379e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes not boot from USB Stick

2018-04-17 Thread myblackcatisback
Hello community,

i verify the Iso file from the Qubes main site successfully.

Now i following the installation guide to Install the Iso image with rufus on 
my USB Stick. I use Windows10 at time.

I've followed all the steps, but the operating system just will not start.

I see some Linux commands but then I only find a black screen.

What iam doing wrong?

About your help i would be very happy.

If you need some much more details, pls let me know.

Thanks and regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b4efba6a-7d99-49f1-813b-1dc4a476c97f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to Alt-Tab Cycle Minimized WIndows

2018-04-17 Thread anon432
I'm hoping there is an obvious and simple solution, but I have looked through 
every XFCE and window manager setting I can find.

System: Qubes 4.0 stable. XFCE desktop.

Current behavior: If a Window is Minimized, using Alt-Tab to cycle through open 
windows does NOT show or cycle through the minimized window.

Expected Behavior: Alt-Tab cycles through all windows on the desktop regardless 
of minimized status.

Is this a setting I am missing?

Is this a security feature I don't understand?

If so, can I disable it? What are the ramifications?

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/02b2d873-f2f7-4967-8858-88e4f148e466%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Guide on installing Qubes and Coreboot with encrypted boot on thinkpads

2018-04-17 Thread aantisocial97
Hi to all! All works fine. but last step have some problems

I have a small question about encrypted /boot. 

>dd conv=notrunc bs=512 iflag=fullblock if=/dev/sda1 count=100 
>skip=$((2099199-2048)) seek=0 2> /dev/null | file -s -
/dev/stdin: LUKS encrypted file, ver 1 [aes, xts-plain64, sha256] UUID: 
8453f049-6322-4e5d-b05a-a6c4688fd3a5

This procedure can't find any LUKS patition if you do this 

>Using fdisk, cfdisk or parted delete both sda1 and sda2 and create a new 
>partition using the whole disk called sda.

If you remove /dev/sda1 and /dev/sda2 use fdisk and then make /dev/sda1

>If the file command detect a LUKS encrypted file it should be safe to continue.

file didn't detect luks patition :( 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/80b7e0ab-6a2b-4c8d-9e37-19b838ca8c0f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [QUBES 4.0] Manually update dom0?

2018-04-17 Thread 'awokd' via qubes-users
On Tue, April 17, 2018 2:20 pm, Gerry Doyon wrote:
> Hi all,
>
>
> I've tried searching the forum for an answer to my problem but have been
> unsuccessful. I've installed Qubes OS 4.0 on my desktop. During
> configuration I get errors when the system tries to create then start
> "sys-net" and "sys-firewall".
>
>
> Manually attempting to start "sys-net" fails.

Any error message? Might be in "sudo journalctl -e". Also, try switching
sys-net's template to debian-9 and starting it.

> I can't even start a
> default Fedora VM because "sys-net" fails. I also get a message during
> boot saying "Failed to Load Kernel Modules".

Ignore this one.

> I have a proven, good Internet connection connected to my desktop, but,
> it won't work because of what I've already mentioned above.
>
> Some research indicates that I should update "dom0" to fix a bug that
> seems to be causing the problem that I am having.

Link to the bug?

> Yet, without an
> Internet connection I don't know how to do this.
>
>
> Can I download a "package" then install the update? Any and all help is
> very much appreciated. Thanks!

If you have access to another computer, could temporarily swap the hard
drive to it, install Qubes, then swap back; but I think it would be easier
to try to fix sys-net first.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e7b4210473ae44ed9725065b99a46b8c.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] [QUBES 4.0] Manually update dom0?

2018-04-17 Thread Gerry Doyon
Hi all,

I've tried searching the forum for an answer to my problem but have been 
unsuccessful. I've installed Qubes OS 4.0 on my desktop. During configuration I 
get errors when the system tries to create then start "sys-net" and 
"sys-firewall".

Manually attempting to start "sys-net" fails. I can't even start a default 
Fedora VM because "sys-net" fails. I also get a message during boot saying 
"Failed to Load Kernel Modules".

I have a proven, good Internet connection connected to my desktop, but, it 
won't work because of what I've already mentioned above.

Some research indicates that I should update "dom0" to fix a bug that seems to 
be causing the problem that I am having. Yet, without an Internet connection I 
don't know how to do this.

Can I download a "package" then install the update? Any and all help is very 
much appreciated. Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0c7a56cd-f23f-4bcc-adcc-34129a7e6708%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: CentOS Virtualization From Multiple .vmdk

2018-04-17 Thread 'awokd' via qubes-users
On Tue, April 17, 2018 1:57 pm, hype wrote:
> awokd, what a relief to get some additional help here!
>
> The issue is that this CentOS VM was distributed as a learning
> environment for a specific course I'm taking with
> software/services/configurations/etc directly tied to the lessons. I need
> everything to be intact.

Some things to try, not sure if they will work!

Might be able to create a new HVM, boot it with a rescue CD and fdisk it.
Then shut it down, loop mount that new partition, then copy all or tar and
untar from the below mount (seems like this one has everything needed).
Once that's done, boot with your rescue CD again and install GRUB.

Could also try similar with qemu-img converting to raw like
https://askubuntu.com/questions/4398/how-do-i-convert-a-multiple-part-vmdk-disk-image-to-qcow2/4598.
Then dd the raw img to your HVM partition, and use the rescue CD to
install GRUB/make it bootable.

> mount /dev/mapper/centos-root turnkey-core.mount ^ alternatively, using
> this gives me access to:
>
> -
> --
>
>
> ls -l turnkey-core.rootfs/ total 76 lrwxrwxrwx   1 root root 7 Jan 17
> 2017 bin -> usr/bin
> drwxr-xr-x   2 root root  4096 May 14  2015 boot drwxr-xr-x   2 root root
> 4096 May 14  2015 dev
> drwxr-xr-x 148 root root 12288 Jun  7  2017 etc drwxr-xr-x   2 root root
> 4096 May 14  2015 home
> drwxr-xr-x   2 root root  4096 Apr 16 23:01 isolinux lrwxrwxrwx   1 root
> root 7 Jan 17  2017 lib -> usr/lib lrwxrwxrwx   1 root root 9 Jan
> 17  2017 lib64 -> usr/lib64
> drwx--   2 root root  4096 May 14  2015 lost+found drwxr-xr-x   2 root
> root  4096 Nov  5  2016 media drwxr-xr-x   3 root root  4096 Nov  5  2016
> mnt drwxr-xr-x   4 root root  4096 Apr 21  2017 opt drwxr-xr-x   2 root
> root  4096 May 14  2015 proc dr-xr-x---  11 root root  4096 Jun  7  2017
> root drwxr-xr-x   2 root root  4096 May 14  2015 run lrwxrwxrwx   1 root
> root 8 Jan 17  2017 sbin -> usr/sbin drwxr-xr-x   2 root root  4096
> Nov  5  2016 srv
> drwxr-xr-x   2 root root  4096 May 14  2015 sys drwxrwxrwt   9 root root
> 4096 Jun  7  2017 tmp
> drwxr-xr-x  13 root root  4096 Jan 17  2017 usr drwxr-xr-x   2 root root
> 4096 May 14  2015 var
>
>
> -
> --


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9bf47cc4abd2e202e6e59e4bbca6e862.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: CentOS Virtualization From Multiple .vmdk

2018-04-17 Thread hype
awokd, what a relief to get some additional help here!

The issue is that this CentOS VM was distributed as a learning environment for 
a specific course I'm taking with software/services/configurations/etc directly 
tied to the lessons. I need everything to be intact.

I've reached the limit of my experience in this process and can find no other 
material online to help me.

Your dd loopback advice exactly fits this step I'm stuck at. I don't know how 
to make this bootable. Sigh...

I wrote an email to linuxrespin.org yesterday pleading for help which has some 
information for you I dread to paraphrase/reformat so I'll repost here, because 
I list commands run and output of file/directory structures... This bends my 
brain. Apologies and thanks for helping with this mess:

---
 

Hi linuxrespin team!

I'm desperate and need your expertise. For one week now I've been bashing my 
brain trying to get this to work and I've reached the end of my capabilities. 
Can you please help me?

1. I have a CentOS virtual machine which runs perfectly in VirtualBox. The VM 
is in .vmdk format.

*. I run Qubes OS and need to run CentOS as a guest. I need to convert the 
.vmdk virtual hard drives into a format which Qubes will accept.

2. I've used qemu-img to convert the .vmdk files into a raw image.

3. I've mounted the raw image (LVM) onto a loop device and am able to access 
the file system.

4. I have zero understanding of how to make an iso / live iso from this.

Can you please help me?

I've used the guide below to aide me, but the final tool from the author's 
repository does not work for me. Do you know how I can take the CentOS 
filesystem I have access to and turning it into a bootable iso?

https://www.turnkeylinux.org/blog/convert-vm-iso

---

ls -l /media/sf_Linux/CentOS\ 7.x\ 64-bit/
total 54015160
-rwxrwx--- 1 root vboxsf8684 Jun  7  2017 CentOS 7.x 64-bit.nvram
-rwxrwx--- 1 root vboxsf  3413508096 Jun  7  2017 CentOS 7.x 64-bit-s001.vmdk
-rwxrwx--- 1 root vboxsf  2366242816 Jun  7  2017 CentOS 7.x 64-bit-s002.vmdk
-rwxrwx--- 1 root vboxsf  4088070144 Jun  7  2017 CentOS 7.x 64-bit-s003.vmdk
-rwxrwx--- 1 root vboxsf  2242772992 Jun  7  2017 CentOS 7.x 64-bit-s004.vmdk
-rwxrwx--- 1 root vboxsf   226492416 Jun  7  2017 CentOS 7.x 64-bit-s005.vmdk
-rwxrwx--- 1 root vboxsf  786432 Apr 26  2017 CentOS 7.x 64-bit-s006.vmdk
-rwxrwx--- 1 root vboxsf  720896 Apr 26  2017 CentOS 7.x 64-bit-s007.vmdk
-rwxrwx--- 1 root vboxsf 3080192 Jun  7  2017 CentOS 7.x 64-bit-s008.vmdk
-rwxrwx--- 1 root vboxsf  720896 Apr 26  2017 CentOS 7.x 64-bit-s009.vmdk
-rwxrwx--- 1 root vboxsf19136512 Jun  7  2017 CentOS 7.x 64-bit-s010.vmdk
-rwxrwx--- 1 root vboxsf  131072 Apr 26  2017 CentOS 7.x 64-bit-s011.vmdk
-rwxrwx--- 1 root vboxsf1029 Jun  7  2017 CentOS 7.x 64-bit.vmdk
-rwxrwx--- 1 root vboxsf  69 Apr 26  2017 CentOS 7.x 64-bit.vmsd
-rwxrwx--- 1 root vboxsf2888 Jun  7  2017 CentOS 7.x 64-bit.vmx
-rwxrwx--- 1 root vboxsf 272 Apr 26  2017 CentOS 7.x 64-bit.vmxf

---

qemu-img convert -f vmdk turnkey-core.vmdk -O raw turnkey-core.raw
mkdir turnkey-core.mount
loopdev=$(losetup -s -f turnkey-core.raw)
kpartx -a $loopdev

---

ls -l /dev/mapper/
total 0
lrwxrwxrwx 1 root root   7 Apr 16 21:06 centos-home -> ../dm-5
lrwxrwxrwx 1 root root   7 Apr 16 21:06 centos-root -> ../dm-2
lrwxrwxrwx 1 root root   7 Apr 16 21:06 centos-swap -> ../dm-4
lrwxrwxrwx 1 root root   7 Apr 16 21:06 centos-var -> ../dm-3
crw--- 1 root root 10, 236 Apr 14 23:39 control
lrwxrwxrwx 1 root root   7 Apr 16 19:03 loop0p2 -> ../dm-1
lrwxrwxrwx 1 root root   7 Apr 16 19:34 loop1p1 -> ../dm-0
lrwxrwxrwx 1 root root   7 Apr 16 19:34 loop1p2 -> ../dm-6
lrwxrwxrwx 1 root root   7 Apr 16 21:06 loop3p1 -> ../dm-7
lrwxrwxrwx 1 root root   7 Apr 16 21:06 loop3p2 -> ../dm-8

---

mkdir turnkey-core.mount
mount /dev/mapper/$(basename $loopdev)p1 turnkey-core.mount

^ the above command gives me access to:

---

config-3.10.0-514.16.1.el7.x86_64
config-3.10.0-514.2.2.el7.x86_64
extlinux
grub
grub2
initramfs-0-rescue-0a268e711a9e49e6958dee98a83bcef2.img
initramfs-3.10.0-514.16.1.el7.x86_64.img
initramfs-3.10.0-514.16.1.el7.x86_64kdump.img
initramfs-3.10.0-514.2.2.el7.x86_64.img

Re: [qubes-users] meetup

2018-04-17 Thread Michael Carbone
On 04/16/18 16:08, mai...@maiski.net wrote:
> Hello guys,
> 
> I am a qubes user for nearly three years now and would love to meet
> other people, discuss, learn from each other, contribute...
> That is why i would like to organize a meetup in the city where i am
> currently residing - Berlin.
> For starters (first meetup) i think a cafe would be fine. And then
> decide where and how often to meet, what do we want to do in particular
> etc.
> 
> Here is a small duddle poll. I think till the end of this week there is
> enough time to get an idea if there are enough people wanting to come:
> 
> https://dudle.inf.tu-dresden.de/would_I_like_to_participate_in_a_Berlin_Qubes_meetup/
> 
> 
> greets,
> 
> m
> 

hey, you may have missed previous emails about it but there is a monthly
meeting in Berlin for Qubes users at a local hackerspace. The most
recent meet-up was today.

You can find out more info here:

https://qubesusersberlin.github.io

There is also a mailing list that you can join to be notified about
meetings or otherwise talk.

Hope to see you at the next meet-up,
Michael

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e546bcb-7ef7-e425-a6a8-9c004ac8bf7d%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Small Templates

2018-04-17 Thread 'awokd' via qubes-users
On Tue, April 17, 2018 12:32 am, Drew White wrote:
> Has anyone managed to work out a miniature template that works for Qubes
> with all the additions?
>
> I'm just talking about super small versions.
>
>
> Are there any versions that are nice and small?

fedora-minimal is pretty minimal!


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7224501f9e812e6d5f0a91f2346f2f4f.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: CentOS Virtualization From Multiple .vmdk

2018-04-17 Thread 'awokd' via qubes-users
On Mon, April 16, 2018 9:34 pm, hype wrote:
> Using the following guide I've been able to mount the raw, qemu-img
> converted .vmdk files onto a loop device, thus I'm able to access every
> partition of the virtual machine.
>
> https://www.turnkeylinux.org/blog/convert-vm-iso
>
>
> Unfortunately the end of the guide is broken for my case and I'm unable
> to generate the iso. I've successfully extracted the root filesystem.
>
> Now that I have all the data, how to I turn this into an iso file which
> will load the vm? Please help, I've been banging my head on this thing
> for a week and am lost. :(

Wouldn't it be easiest to do a fresh install of Centos into a new HVM?
Don't have any experience with it, though. Another thing you might try is
to create the HVM, then dd your loop device straight into the new HVM's
root LVM partition (as long as what's in loop is already a bootable
partition with GRUB). Be careful to not dd to the wrong one.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77ff2d67785a143d69cbd25a49b0a5f9.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Cannot pass USB drive to Windows HVM

2018-04-17 Thread Nico De Musso
I've recently installed a Windows HVM but when i attach a usb hard drive from 
sys-usb to Windows HVM nothing appear on my Windows VM.With Fedora AppVMs is 
working fine but not on Windows.
I would need to attach a printer an external usb audio interface and an usb 
hard drive.
Is that possible to do it?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1f71baa5-3f08-4985-a100-62c740143886%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Thinkpad X1 Carbon 6th gen - Qubes 4.0

2018-04-17 Thread bbrr3332
On Monday, April 16, 2018 at 11:14:43 PM UTC+1, fiasc...@gmail.com wrote:
> Summary: Install worked reasonably well and it boots with EFI into the 
> installed Qubes 4.0 nicely. There are a few issues to resolve.
> 
> 1. I have the model with a touch screen and I haven't debugged how to make it 
> work yet (I'll get to that and post back what worked).
> 
> 2. Suspend/resume doesn't work and I have to do a hard reset. A few times 
> (not all) I had to hard reset twice to get it to reboot properly.
> 
> 3. HCL reports no TPM, but I have a dTPM 2.0.
> 
> It's booting with UEFI smoothly. I haven't tested the mic, camera, or ports 
> except USB for storage yet. I'll update once I find fixes for the above. If 
> anyone could point me in the right direction for the suspend freezing issue, 
> let me know. I tried shutting down all VMs, including service VMs after 
> reading this, 
> https://groups.google.com/d/msg/qubes-users/81t26xq4MEI/HrfDEcjeAgAJ but the 
> problem persisted didn't change anything.

Might be worth flashing to most recent BIOS. (I did that straight away on my 
T480 so I'm not sure if that contributed to suspend eventually working well)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c60e2900-f3f4-4c8a-b123-754121a8361e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.