Re: [qubes-users] Re: Music streaming in Firefox 59: QubesOS 4.0 / Fedora 26

2018-04-25 Thread 799
Hello,

<00010age...@gmail.com> schrieb am Mi., 25. Apr. 2018, 21:38:

>
> Thanks, but unfortunately it did not work.
>

I was also interested in multimedia usage when running Qubes.
As I run into some issues using Firefox I ended up building a multimedia
App Template based on Debian.

I wrote a short How-to, if you're interested take a look there:
https://www.qubes-os.org/doc/multimedia/

Is it an issue for you when you're running a Debian based AppVM?

What kind of music service do you want to use?
Maybe U can try if it works in my multimedia AppVM before you spent time
there.

Regards

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2u2MhRy7po4crO9wnwHSXqq6wC%2BXUorZanZKKABPYC_Ow%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: 4.0 wouldn't boot after update

2018-04-25 Thread 'awokd' via qubes-users
On Wed, April 25, 2018 7:48 pm, Jon Solworth wrote:

>
> Didn't get to far with troubleshooting.  I got a shell, was able to
> decrypt the volume, but not sure wha to do next.

>From that point, you should be able to mount the LVM private partition for
the VMs you want to recover and copy out the data.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/205da9c71d521e8f032e64e4352638ac.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Q4.0] sys-usb fails to start with xHCI controller

2018-04-25 Thread 'awokd' via qubes-users
On Thu, April 26, 2018 12:53 am, gluv...@gmail.com wrote:

> libxl_pci.c:1176:libxl__device_pci_reset: The kernel doesn't support
> reset from sysfs for PCI device :00:14.0 2018-04-25 15:08:20.363+:
> libxl: libxl_pci.c:1095:do_pci_add: Error: xc_physdev_map_pirq
> irq=-2147483648: Invalid argument

Try setting it to not require strict reset.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/08b460fe7322cf72f036cf45fd4f5725.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: ANN: Testing new VPN code for Qubes

2018-04-25 Thread Chris Laprise

On 04/20/2018 11:14 AM, cicero wrote:

On 04/20/18 04:58, Chris Laprise wrote:
Since there's no connection information in the template -- only the 
VPN scripts & the OS are there -- templates don't affect configuration 
issues like different locations. In any case, you have a proxyVM which 
contains configurations for the connections to various sites, but each 
proxyVM connects to only one VPN remote site at a time. So to have two 
AppVMs routed through two different VPN sites, you need two proxyVMs 
(one for each AppVM).


hmm, so I guess by installing the script in the Template(cloned), it 
would save me from having to re-run the script in the AppProxyVMs, 
that's it ?


You wouldn't have to install it into proxyVMs. But there is still one 
script-running step when configuring a proxyVM with qubes-tunnel.


https://github.com/tasket/qubes-tunnel



But, if I'm just cloning the Original AppProxyVMs , to make a 2nd 
geolocation,  doesn't seem like  saves me any work  by  not having to 
re-run the script, as it is already in the cloned AppProxyVM  ?


If you clone an already configured proxyVM, no further configuration is 
required for the clone to connect to the same site. To change the site, 
you will only need to change the qtunnel.conf link.




Do I have this correct?


But, sometime in the future, a possible newer version will only run in a 
Template, but then the rest is about the same on configuration, ( a 
separate AppProxyVM for each location wanted , unless one wanted to 
manually change the symlink to change locations ?


That's the intention, to make qubes-tunnel (child of Qubes-vpn-support) 
already available for use in the templates. This simplifies the setup 
process for users.



--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/357250d3-c88a-cff5-7bc2-b0dd2f4c8c04%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: reddit has incorrect "current" listed FWIW

2018-04-25 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-04-25 20:49, Name wrote:
> fyi the downloads section is deprecated on the right :)
> 
> 
> https://www.reddit.com/r/Qubes/comments/8e5xm5/how_to_attach_usb_device_to_hvm/?st=jgfv9j5n=6c26e5a5
>

I don't have the ability to change that. Please tell /u/lugh.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=4BSC
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ae3f5732-4724-a8da-e1db-27945715f075%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] GPG setting stuck on copying keys to another VM

2018-04-25 Thread 'Xaver' via qubes-users
>> qfile-agent: Fatal error: stat whatever_gpg (error type: No such file or 
>> directory)
> > 
> > Gtk-Message: GtkDialog mapped without a transient parent. This is 
> > discouraged.
> > 

Sometime you can get this error even if the command succeeds 

Check the target VM for the copied file. It may actually be there.

ls ~/QubesIncoming/vm-name/dir-name

​Sent with ProtonMail Secure Email.​


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d613f3HeGmdTBzcq3NC2tbBRbYNtJd7FuQ_LfDJj91sJQHB0IilKb5P8Z_dNqqz3kIeO4bqRQjjnB26c_qQ7xj4bC1xt_9cnvUmshQdqPWc%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] reddit has incorrect "current" listed FWIW

2018-04-25 Thread Name

fyi the downloads section is deprecated on the right :)


https://www.reddit.com/r/Qubes/comments/8e5xm5/how_to_attach_usb_device_to_hvm/?st=jgfv9j5n=6c26e5a5

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a643bc19-8d06-e68a-d40b-bd6593db17c0%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Announcement for users experiencing update errors in dom0 and Fedora TemplateVMs

2018-04-25 Thread john

On 04/25/18 15:16, Andrew David Wong wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

The following message is for Qubes users who are experiencing trouble
while trying to update dom0 or Fedora TemplateVMs. If you have no
problems updating, please disregard this message.

If, while attempting to update dom0 or a Fedora TemplateVM, you have
encountered a message of the form "Error: Failed to synchronize cache
for repo 'qubes-vm-r*-current'", performing the steps below may
resolve the issue. Instructions are provided for both dom0 and Fedora
26 TemplateVMs.


Steps for dom0 updates:

1. Open the Qubes Menu by clicking on the "Q" icon in the top-left
corner of the screen.
2. Select "Terminal Emulator".
3. In the window that opens, enter this command:

sudo nano /etc/yum.repos.d/qubes-dom0.repo

4. This opens the nano text editor. Change all four instances of "http"
to "https".
5. Press CTRL+X, then Y, then ENTER to save changes and exit.
6. Check for updates normally.


Steps for Fedora 26 TemplateVM updates:

1. Open the Qubes Menu by clicking on the "Q" icon in the top-left
corner of the screen.
2. Select "Template: fedora-26", then "fedora-26: Terminal".
3. In the window that opens, enter the command for your version:

[Qubes 3.2] sudo gedit /etc/yum.repos.d/qubes-r3.repo
[Qubes 4.0] sudo gedit /etc/yum.repos.d/qubes-r4.repo

4. This opens the gedit text editor in a window. Change all four
instances of "http" to "https".
5. Click the "Save" button in the top-right corner of the window.
6. Close the window.
7. Check for updates normally.
8. Shut down the TemplateVM.


Thank you to awokd for suggesting and testing these instructions!

For further information about this issue, please see:
https://github.com/QubesOS/qubes-issues/issues/3737

- -- 
Andrew David Wong (Axon)

Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=5Ass
-END PGP SIGNATURE-




Changing both dom0 and the Fed Temp to all https

for Fedora-26 Q4
** (gedit:1959): WARNING **: Set document metadata failed: Setting 
attribute metadata::gedit-encoding not supported


Then using the VMM to update Fed-26  there are like 5-6  [Mirror] 404 
errors .. However, it seems to update


Changing https back to http  and no warning on saving qubes-r4.repo , 
not sure why I'm telling you this  :)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/52d5ebc5-fba6-54f1-4f6a-e87763b92c05%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Announcement for users experiencing update errors in dom0 and Fedora TemplateVMs

2018-04-25 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

The following message is for Qubes users who are experiencing trouble
while trying to update dom0 or Fedora TemplateVMs. If you have no
problems updating, please disregard this message.

If, while attempting to update dom0 or a Fedora TemplateVM, you have
encountered a message of the form "Error: Failed to synchronize cache
for repo 'qubes-vm-r*-current'", performing the steps below may
resolve the issue. Instructions are provided for both dom0 and Fedora
26 TemplateVMs.


Steps for dom0 updates:

1. Open the Qubes Menu by clicking on the "Q" icon in the top-left
   corner of the screen.
2. Select "Terminal Emulator".
3. In the window that opens, enter this command:

   sudo nano /etc/yum.repos.d/qubes-dom0.repo

4. This opens the nano text editor. Change all four instances of "http"
   to "https".
5. Press CTRL+X, then Y, then ENTER to save changes and exit.
6. Check for updates normally.


Steps for Fedora 26 TemplateVM updates:

1. Open the Qubes Menu by clicking on the "Q" icon in the top-left
   corner of the screen.
2. Select "Template: fedora-26", then "fedora-26: Terminal".
3. In the window that opens, enter the command for your version:

   [Qubes 3.2] sudo gedit /etc/yum.repos.d/qubes-r3.repo
   [Qubes 4.0] sudo gedit /etc/yum.repos.d/qubes-r4.repo

4. This opens the gedit text editor in a window. Change all four
   instances of "http" to "https".
5. Click the "Save" button in the top-right corner of the window.
6. Close the window.
7. Check for updates normally.
8. Shut down the TemplateVM.


Thank you to awokd for suggesting and testing these instructions!

For further information about this issue, please see:
https://github.com/QubesOS/qubes-issues/issues/3737

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=5Ass
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/507405d3-d596-6233-3c4d-b88948aa396e%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] [Q4.0] sys-usb fails to start with xHCI controller

2018-04-25 Thread gluvfox
The USB mouse worked on the Lenovo Flex 3-1570 during the installation process, 
but once installed, sys-usb (based on fedora-26) fails to start.

When I tried starting manually the following error was displayed:
ERROR: Start failed: internal error: Unale to reset PCI device :00:14.0: 
internal error: libxenlight failed to create new domain 'sys-usb', see 
/var/log/libvirt/libxl/libxl-driver.log for details

/var/log/libvirt/libxl
2018-04-25 15:08:20.363+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:14.0
2018-04-25 15:08:20.363+: libxl: libxl_pci.c:1095:do_pci_add: Error: 
xc_physdev_map_pirq irq=-2147483648: Invalid argument
2018-04-25 15:08:20.363+: libxl: libxl_pci.c:1338:libxl__add_pcidevs: 
libxl_device_pci_add failed: -3
2018-04-25 15:08:20.363+: libxl: 
libxl_create.c:1512:domcreate_attach_devices: unable to add pci devices

There are two USB controllers (Intel Wildcat - xHCI and EHCI) but only xHCI 
seems to be an issue since if I remove it sys-usb starts up, however; the USB 
ports do not work.
Info from lspci -v -s 00:14
00:14.0 USB controller: Intel Corporation Wildcat Point-LP USB xHCI Controller 
(rev 03) (prog-if 30 [XHCI])
Subsystem: Lenovo Device 3820
Flags: medium devsel, IRQ -2147483648
Memory at d450 (64-bit, non-prefetchable) [disabled] [size=64K]
Capabilities: [70] Power Management version 2
Capabilities: [80] MSI: Enable- Count=1/8 Maskable- 64bit+
Kernel driver in use: pciback
Kernel modules: xhci_pci

Based on recommendations for other, similar issues, I tried using PV instead of 
HVM, but it still wouldn't start.

Any help/suggests would be appreciated! -Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ae7e4d5a-f5d1-421a-84ce-ef7500fac745%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Question on release

2018-04-25 Thread Charlie Livingston
I am a new to using Qubes.  Recently, I tried to install on a machine using
an 8th generation Intel chip.  The installation never made it past the
black screen.  It works on my other, older laptop.  Will there be a release
soon that makes Qubes compatible with the newest generation chip?

Thanks,
Charlie

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CACTvK3%3D-EQeEfp2HfKNje%3DKFPZf2tx4s7thvHe%3DofeQCVs5AeQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] XSA-258 and XSA-259 do not affect the security of Qubes OS

2018-04-25 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

The Xen Project has published Xen Security Advisories 258 and 259
(XSA-258 and XSA-259, respectively). These XSAs do *not* affect the
security of Qubes OS, and no user action is necessary.

These XSAs have been added to the XSA Tracker:

https://www.qubes-os.org/security/xsa/#258
https://www.qubes-os.org/security/xsa/#259

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrhHcoACgkQ203TvDlQ
MDAxdxAAr28EDctBM4JBFFHkSCUtgihUnfac8yEkFj2SBoQ2sY+jPF4xGqqlnqyK
G9KuF1TKZqCZx/PQ3vvwL16mq/nOWDGJJfsFbYjHggDUVs3aqXTH9QdJOQcPtlAZ
RlyeS8FRV98LNdB21OIoNKjuPXgo3Gxr9rHLCdeBPn1HCcUws+meWushcAn/xq/N
TK6hJY6ZrU8Brey7KKbsx0iuGTEU9sV1SdMUz1rZfK8caYU3UaaWjYqMqPIDVjs1
Xmc12u6GKsgmFcOdfpVWhnVbAA3xdcIAdkhEmAe1nRKxYllZkLmeoviSd7QpTwXB
54WQbo29bj77IhH/IcAqWf/s2INEX9k0bBN2TAULOX4ykl1Tb5ethSRFo0m7fm2k
C7w0IIq+Dj+Hq/M/cBJiuQKxdDQI6YMEpWjTpwm9PMRm7YohL2lbGJiQzgBIaRLc
sXAwOka9DF0cn9vpnmgNqZkJGWbUJObpdZLrGTmnbjyIDX9sb05FqIRVrfov6qoc
wgEEMyYy6k/cBteddyw1rP9nLNQaFUdQNs356si26NaYDxnYpuP+pTkSzNGU1d48
UEuF1QGtrIiIRsbHNEx3RZNivSXrg2MZqtrMNoHymrIFSmnC4tWNeRs2BlFB5AFs
iDdzfZcOEE/nsKQVYc5YUI84s64ItPg4YfMx2o7NFct9cd9l6aI=
=yi5p
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7e1cd2bc-32c4-0195-07a8-83da741ffe39%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Windows 10 Os in Qubes 4.0

2018-04-25 Thread [799]
Hello Black Beard,

On 04/23 01:38, Black Beard wrote:
> tommorow i want finished my Qubes installation on my Notebook. 

I am running Qubes since ~1,5y and I must say, it is never really finished, as 
there is so much you can optimize and fine tune ;-)


> Since I need some programs that only runs on Windows, 

As I am running Qubes as my primary OS working in a very windows OS focussed 
world (IT Solution Provider) I need also windows to run ERP-system and to 
connect to microsoft exchange.


> I now ask myself the question, how can I install Windows on Qubes?

It's all in the Qubes Docs:
https://www.qubes-os.org/doc/windows-vm/#qubes-40---windows-vm-installation
Under Qubes 4 you need to download the Qubes Tools manually and then install 
them as they're not in the package repositories.


> Do I risk my privacy with the additional windows installation?

Depends on what you are doing, you can always outsource all tasks which you can 
run under Linux in other AppVms


> I thought about Virtualbox, but that's also a virtual machine.

no.


> What about Linux Wine?

I am runnung a Windows 7 HVM, which is working great and also with enough 
performance.
What is missing: Audio Support 

Additionally I am running Crossover Linux from Codeweavers as it is simpler to 
use than Wine and because I like their Support Team.
https://www.codeweavers.com/products/crossover-linux
I am running Office 2016 without the Windows overhead via Crossover for Linux 
in a Debian-9 AppVM.

Regarding connection to our corporate Exchange I am using a fedora-26 bases 
AppVM (my-mail) which connect to Exchange via DavMail.
In this AppVM I am running Offlineimap + Neomutt and Khal + Khard for plain 
text productivity.
I also keep a browser windows with OWA (Outlook Web Access) open.
The my-mail AppVM is restricted by firewall rules so that it can only connect 
to our Exchange server.
I can open links through a disposable VM or copy & paste links to another AppVM

Additionaly I am using another fedora-26 my-work AppVM which has Cisco 
Anyconnect and VMware Horizon View installed if I need to run special tasks.

Summary:
the great thing with Qubes is, that it is like a toolbox, pick the right tool 
to get your job done.

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180425225418.xdvhzaxtwsyft4gj%40my-privmail.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] To use Windows 7 OEM as a Qubes VM; which hardware metadata is needed?

2018-04-25 Thread Teqleez Motley
On Wed, Apr 25, 2018, at 15:24, Stuart Perkins wrote:
> Ah, I see what you are after.  I doubt an OEM licensed Windows can be 
> used on a different piece of hardware, but it is worth a shot.  You may 
> be stuck buying a "license".  

Right.  I also have XP licence(s), and get what I need running there and also 
mostly through (LInux) Wine, so I am basically just curious to know if a OEM 
version could be made to work on a permanent basis beyond the 90 days. Just to 
know and be able to help others getting such things working also under Qubes. 
Sometimes all that is missing  and preventing moving to Linux/Qubes is a 
printer driver for specific hardware (scanners, faxes, etc., and for example 
accounting systems and the like.

Regards,
Teqleez

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1524692378.1382837.1350865488.2EAD6C3B%40webmail.messagingengine.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Music streaming in Firefox 59: QubesOS 4.0 / Fedora 26

2018-04-25 Thread cooloutac
On Wednesday, April 25, 2018 at 3:38:52 PM UTC-4, 00010...@gmail.com wrote:
> > maybe mp4?   gstreamer1-libav package?
> 
> Thanks, but unfortunately it did not work.
> 
> I found https://itsfoss.com/things-to-do-installing-fedora-22/ and it says to 
> install all of the following:
> 
> gstreamer-plugins-bad
> gstreamer-plugins-bad-free-extras
> gstreamer-plugins-ugly
> gstreamer-ffmpeg
> gstreamer1-libav
> gstreamer1-plugins-bad-free-extras
> gstreamer1-plugins-bad-freeworld
> gstreamer1-plugins-base-tools
> gstreamer1-plugins-good-extras
> gstreamer1-plugins-ugly
> gstreamer1-plugins-bad-free
> gstreamer1-plugins-good
> gstreamer1-plugins-base
> gstreamer1
> 
> But Fedora 22 is old, so is the above information still correct or does it 
> need revision?

I'm not sure have you tried google chrome?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ae574744-1c2c-4664-8ddc-77dab66b8b04%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: 4.0 wouldn't boot after update

2018-04-25 Thread Jon Solworth
On Wednesday, April 25, 2018 at 2:43:46 PM UTC-5, john wrote:
> On 04/25/18 05:13, Jon Solworth wrote:
> > I updated qubes 4.0 and there were some errors (about transactions on--I 
> > believe--some crypto stuff).  Afterwards, I couldn't boot getting the 
> > message
> > 
> > kernel panic -- not syncing: VFS unable to mount fs on unknown block (0,0)
> > 
> > the problem is that my backup is a bit old, and if possible I would like to 
> > retrieve the data.  So:
> > 
> >1. Is there a way to restore the kernel to a working one? or 
> > alternatively
> >2. If I build qubes on an external disk, is there a way to copy over the
> >   files from my SSD?
> >3. Any other suggestions.
> > 
> > (I tried to use troubleshooting with a 4.0 usb stick, but couldn't figure 
> > out how to recover).
> > 
> > thanks
> > Jon
> > 
> 
> Just curious was this a legacy or efi installation ?  and in your 
> Bios/EFI boot settings do you see two choices for the USB installation 
> media?
> 
> What happened when you tried 'troubleshooting'  USB media exactly ?

legacy.

Didn't get to far with troubleshooting.  I got a shell, was able to decrypt the 
volume, but not sure wha to do next.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/151c2074-6b0d-46eb-a2e3-67ceed5dbeb0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: 4.0 wouldn't boot after update

2018-04-25 Thread john

On 04/25/18 05:13, Jon Solworth wrote:

I updated qubes 4.0 and there were some errors (about transactions on--I 
believe--some crypto stuff).  Afterwards, I couldn't boot getting the message

kernel panic -- not syncing: VFS unable to mount fs on unknown block (0,0)

the problem is that my backup is a bit old, and if possible I would like to 
retrieve the data.  So:

   1. Is there a way to restore the kernel to a working one? or alternatively
   2. If I build qubes on an external disk, is there a way to copy over the
  files from my SSD?
   3. Any other suggestions.

(I tried to use troubleshooting with a 4.0 usb stick, but couldn't figure out 
how to recover).

thanks
Jon



Just curious was this a legacy or efi installation ?  and in your 
Bios/EFI boot settings do you see two choices for the USB installation 
media?


What happened when you tried 'troubleshooting'  USB media exactly ?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/efd4e79b-6d2d-fbb6-4daa-27effe9fd7b3%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Music streaming in Firefox 59: QubesOS 4.0 / Fedora 26

2018-04-25 Thread 00010agency
> maybe mp4?   gstreamer1-libav package?

Thanks, but unfortunately it did not work.

I found https://itsfoss.com/things-to-do-installing-fedora-22/ and it says to 
install all of the following:

gstreamer-plugins-bad
gstreamer-plugins-bad-free-extras
gstreamer-plugins-ugly
gstreamer-ffmpeg
gstreamer1-libav
gstreamer1-plugins-bad-free-extras
gstreamer1-plugins-bad-freeworld
gstreamer1-plugins-base-tools
gstreamer1-plugins-good-extras
gstreamer1-plugins-ugly
gstreamer1-plugins-bad-free
gstreamer1-plugins-good
gstreamer1-plugins-base
gstreamer1

But Fedora 22 is old, so is the above information still correct or does it need 
revision?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5998474-d81d-413a-a757-c38acd5afe67%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Install Orientdb on Qubes

2018-04-25 Thread Barry Du Plessis
Hi

I wanted to install Orientdb (https://orientdb.com/) on a separate AppVM,
so that I could only run it when needed. The Orientdb installation
instructions does not work, as it is geared towards a normal Debian (or
Fedora) setup.  In particular, the /opt/ and /etc/ directories are copied
from the template, and thus disappears after every reboot.

I therefore offer this advise (probably not optimal, but at least it works
for me):
1.  Create new AppVM (call it orientdb or whatever) from a relatively clean
template.
2.  Make sure that Java is installed on the template VM
3.  See the installation instructions (
https://orientdb.com/docs/last/Unix-Service.html and especially
https://www.hugeserver.com/kb/install-orientdb-debian8-ubuntu16/).  Follow
the instructions, but instead of copying the unzipped/untarred files to
/opt/, put it under the user home directory (e.g. under /home/user/orientdb)
4.  To install the service, follow the instructions as given, but replace
/opt/orientdb with /home/user/orientdb:
 (a) Change the configuration file (orientdb.sh), but make the path
wherever your orientdb is placed (NOT /opt)
  (b) Modify the service file (orientdb.service) as indicated.
5.  After this, we have to diverge from the instruction:
  (a) Open /rw/config/rc.local file with root privileges in an editor
  (b) Copy the following into the file:
---

#!/bin/sh
sudo cp /home/user/orientdb/bin/orientdb.service /etc/systemd/system/
sudo systemctl daemon-reload
sudo systemctl start orientdb
sudo systemctl enable orientdb


This will copy over the service config file and start the service every
time the VM is started up.
6.  Make sure the file is executable (sudo chmod +R /rw/config/rc.local)
7.  Open your browser, and set the homepage to http://localhost:2480
8.  Restart the VM.

While this is probably not the best way to do it, at least it works, and
will get Orientdb to run as a service when you start up the VM.

I hope this will help someone else who also wants to experiment with
document- and graph databases, and loves Qubes (obviously).

Thanks

Barry

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAFRzxQ1vSqM0vyTJzWQnNqb_ceVAd_7w385wzry_KHiadh_G0A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Steam In-Home Streaming for games to a Qubes VM

2018-04-25 Thread gluvfox
On Friday, March 30, 2018 at 2:21:49 PM UTC-7, awokd wrote:
> On Fri, March 30, 2018 8:30 pm, Fox Gluv wrote:
> > Looking at the network traffic, the UDP packets that are not making it
> > through have a destination of 255.255.255.255 (broadcast), so I'm
> > guessing a simple Port forwarding NAT won't work. Would a MASQUERADE work
> > better?
> >
> > Summary question - how do I forward UDP broadcast (255.255.255.255)
> > traffic from a separate Win10 machine, to a Qubes 4.0 VM running Debian
> > 9?
> 
> I'm not sure it's possible to inbound NAT broadcast traffic, have never
> heard of a need for it. There's no way to change Steam to send to a
> specific IP/port? The ugly hack approach would be to directly attach a
> secondary NIC inside the VM you want to receive broadcast traffic but of
> course, you lose a lot of layers of protection by doing that.
> 
> > Also, should I just take this to a networking forum?
> 
> Possibly, maybe some iptables wizard could figure out a way to turn that
> broadcast traffic into directed.

To close the loop on this, awokd is correct that it is not easy to NAT 
broadcast traffic. I found a couple ways that might work, but it breaks the 
purpose/design of broadcast. The best solution I found was to set up a VPN 
between the server machine and the specific qubes VM. In the end, I sacrificed 
some security and set up mult-boot. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/18df7979-4dd7-40c5-8025-ce8df513928f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] 4.0 wouldn't boot after update

2018-04-25 Thread Jon Solworth
I updated qubes 4.0 and there were some errors (about transactions on--I 
believe--some crypto stuff).  Afterwards, I couldn't boot getting the message

kernel panic -- not syncing: VFS unable to mount fs on unknown block (0,0)

the problem is that my backup is a bit old, and if possible I would like to 
retrieve the data.  So:

  1. Is there a way to restore the kernel to a working one? or alternatively
  2. If I build qubes on an external disk, is there a way to copy over the
 files from my SSD?
  3. Any other suggestions.

(I tried to use troubleshooting with a 4.0 usb stick, but couldn't figure out 
how to recover).

thanks
Jon

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/af0094ff-427a-4f10-b665-fdaf77531257%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] offlineimap with Split-GPG : get new email via cron doesn't work

2018-04-25 Thread 799
Hello,

I am using neomutt with offlineimap to get my corporate mail into an
Email-AppVM.
The current workflow is:

1) get email running offlineimap -o
2) start neomutt

I'd like to have offlineimap check the mails in the background using cron.
Thereof I have written a small script:

/user/check-mail.sh
#!/usr/bin/bash
# Script will be run by cron
#su user -c "/usr/bin/offlineimap -u quiet -f INBOX,INBOX.Inbox_CC"
/usr/bin/offlineimap -u quiet -f INBOX,INBOX.Inbox_CC
echo Cronjob run at: `date`>> /tmp/cron.log

The last line is only for troubleshooting in order to see, if the cronjob
has been run.

The scripts is working when launched manually. It will open up the SplitGPG
window to grant access to my GPG-key in my vault-VM.
I need to enter the password once and if the next request is within a
300sec window access will be granted to th eGPG without further user
interaction.

I have installed cron and setup a cronjob which should run every 3 min in
order to be below the 300sec time window when Spli-GPG is asking for a
password. I have encrypted the password in my offlineimap-config and it can
only be decrypted using my

[user@my-mail]$ crontab -l
# min  hr   day-of-month month day-of-week
# 0-59 0-23 0-31 1-12  0-7
# Check important mail folders every 3min
*/3 * * * * /home/user/bin/check-mail.sh

unfortunately it seems that this script doesn't work via cron, do you have
any idea what is wrong?
If I look into the logfile the script is writing (/tmp/cron.log) I see that
th ecronjob runs the script but no mails are downloaded.
As mentioned running the script manually will work.
Is cron running the job as "user" or as "root"?

To all offlineimap / mutt users how are you auto-fetching new emails?

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2tXWNz6Mst3PeUHtcPUj2EzAhH6vs7OUTg0tf8m_8LrAA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] To use Windows 7 OEM as a Qubes VM; which hardware metadata is needed?

2018-04-25 Thread Stuart Perkins


On Wed, 25 Apr 2018 09:05:59 +0200
Teqleez Motley  wrote:

>On Tue, Apr 24, 2018, at 18:40, Stuart Perkins wrote:
>> In that case, I would consider pulling the hard drive and using usb 
>> adapter to access the information without concern for battery life.
>
>Hm, I thought that in order to get such metadata out, one would have to access 
>the BIOS/hardware info directly?
>For example, the serial number or the like of the motherboard, graphics card, 
>etc.
>The hard drive of that laptop is long gone (reused), no Windows installation 
>left.
>I just have the licence key, and hopefully the possibility to get to the 
>hardware serial numbers, etc. via some tool...
>
>Regards,
>Teqleez
>

Ah, I see what you are after.  I doubt an OEM licensed Windows can be used on a 
different piece of hardware, but it is worth a shot.  You may be stuck buying a 
"license".  I run Win-7 by downloading the VBox VM from "modern.ie" for 
IE11/Win7.  it is only 32 bit (so no Qubes Windows tools), but it can be 
re-armed 5 times for 90 days each plus initial activation for 540 days before 
having to start over.  I have a bulk licensed version of XP and the registry 
hack to get security updates until June of 2019 as well...also 32 bit though.

Someone may have hacked the Windblows registry for those things...not sure 
where to find that information though...such a hack would let you update the 
registry to match the new "hardware", but I've never hacked that deep into it.  
:)

Stuart

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180425092438.20e86782%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Well supported laptops with 64GB system memory?

2018-04-25 Thread Uni Gaia

Good day everyone!

Saw a thread on reddit recently where someone was asking about a qubes 
supported laptop capable of employing 64GB of system memory. That got me 
thinking and doing some research, and actually nothing concrete comes up.


Is anyone running such a system?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e05938d1-0c3d-8649-4df4-f6164fa3970f%40fastmail.jp.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] To use Windows 7 OEM as a Qubes VM; which hardware metadata is needed?

2018-04-25 Thread Teqleez Motley
On Tue, Apr 24, 2018, at 18:40, Stuart Perkins wrote:
> In that case, I would consider pulling the hard drive and using usb 
> adapter to access the information without concern for battery life.  

Hm, I thought that in order to get such metadata out, one would have to access 
the BIOS/hardware info directly?
For example, the serial number or the like of the motherboard, graphics card, 
etc.
The hard drive of that laptop is long gone (reused), no Windows installation 
left.
I just have the licence key, and hopefully the possibility to get to the 
hardware serial numbers, etc. via some tool...

Regards,
Teqleez

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1524639959.1577693.1349920888.37604342%40webmail.messagingengine.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] IMG sharing

2018-04-25 Thread Ivan Mitev
Hey,

On 04/24/2018 09:54 PM, 799 wrote:
> Hello Drew,
> 
> Drew White  schrieb am Di., 24. Apr. 2018, 07:14:
> 
>> Is it possible for every guest to share one virtual drive for cacheing and
>> auto mounting to same location for file transfers?
>>
>> i.e. One file always mounted to each guest and one reads while one writes.
>> etc. no need to mount and unmount? And it can be multiple images on
>> different locations at once?
>>
> 
> I haven't understand yet what you are trying to accomplish.
> You want a file location ("drive") that is shared between VMs, and you want
> that most VMs have read permissions to this location and one can write to
> it?
> 
> As mentioned by others this kind of breaks the security model of Qubes but
> I had a similar use case to work with data stored in a cloud service.
> 
> I wanted to separate data editing, local data storage and synchronization
> to the cloud service.
> The idea was that data is always encrypted in the "storage AppVM". Other
> "AppVMs" can access this Storage AppVM using SSHfs.
> I am using certificates and tight firewall configuration:
> - the AppVM can request connection to the storage VM via ssh, login is done
> via certificates.
> - after authentication the remote location is mounted via SSHfs
> - the data is encrypted with encfs and the decryption keys are only stored
> on the AppVM which is accessing the data (not the storage VM)
> 
> This setup works quiet well for my usecase as it is less complex than
> setting up a Fileserver with NFS to share data between AppVMs.
> 
> I know that this may not the best thing for a die hard Qubes user, but it
> allows me to setup inter-AppVM data flows if needed for specific use cases.
> 
> I have also scripted everything so that the firewall ports will only be
> opened when needed.
> 
> If you are interested I can upload my scripts/how-to to my GitHub account.

Sounds like a good candidate for the Qubes-Community project :)

> 
> [799]
> 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/afd0011c-9a51-57aa-3894-a99b0151e2b7%40maa.bz.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] IMG sharing

2018-04-25 Thread Teqleez Motley
On Tue, Apr 24, 2018, at 20:54, 799 wrote:
> I have also scripted everything so that the firewall ports will only be
> opened when needed.
> 
> If you are interested I can upload my scripts/how-to to my GitHub account.
> 

Please do that, very interesting! Thanks.

Regards,
Teqleez

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1524639561.1575805.1349917712.24EC6883%40webmail.messagingengine.com.
For more options, visit https://groups.google.com/d/optout.