Re: [qubes-users] Re: Music streaming in Firefox 59: QubesOS 4.0 / Fedora 26
Hello, <00010age...@gmail.com> schrieb am Mi., 25. Apr. 2018, 21:38: > > Thanks, but unfortunately it did not work. > I was also interested in multimedia usage when running Qubes. As I run into some issues using Firefox I ended up building a multimedia App Template based on Debian. I wrote a short How-to, if you're interested take a look there: https://www.qubes-os.org/doc/multimedia/ Is it an issue for you when you're running a Debian based AppVM? What kind of music service do you want to use? Maybe U can try if it works in my multimedia AppVM before you spent time there. Regards [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJ3yz2u2MhRy7po4crO9wnwHSXqq6wC%2BXUorZanZKKABPYC_Ow%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: 4.0 wouldn't boot after update
On Wed, April 25, 2018 7:48 pm, Jon Solworth wrote: > > Didn't get to far with troubleshooting. I got a shell, was able to > decrypt the volume, but not sure wha to do next. >From that point, you should be able to mount the LVM private partition for the VMs you want to recover and copy out the data. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/205da9c71d521e8f032e64e4352638ac.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] [Q4.0] sys-usb fails to start with xHCI controller
On Thu, April 26, 2018 12:53 am, gluv...@gmail.com wrote: > libxl_pci.c:1176:libxl__device_pci_reset: The kernel doesn't support > reset from sysfs for PCI device :00:14.0 2018-04-25 15:08:20.363+: > libxl: libxl_pci.c:1095:do_pci_add: Error: xc_physdev_map_pirq > irq=-2147483648: Invalid argument Try setting it to not require strict reset. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/08b460fe7322cf72f036cf45fd4f5725.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: ANN: Testing new VPN code for Qubes
On 04/20/2018 11:14 AM, cicero wrote: On 04/20/18 04:58, Chris Laprise wrote: Since there's no connection information in the template -- only the VPN scripts & the OS are there -- templates don't affect configuration issues like different locations. In any case, you have a proxyVM which contains configurations for the connections to various sites, but each proxyVM connects to only one VPN remote site at a time. So to have two AppVMs routed through two different VPN sites, you need two proxyVMs (one for each AppVM). hmm, so I guess by installing the script in the Template(cloned), it would save me from having to re-run the script in the AppProxyVMs, that's it ? You wouldn't have to install it into proxyVMs. But there is still one script-running step when configuring a proxyVM with qubes-tunnel. https://github.com/tasket/qubes-tunnel But, if I'm just cloning the Original AppProxyVMs , to make a 2nd geolocation, doesn't seem like saves me any work by not having to re-run the script, as it is already in the cloned AppProxyVM ? If you clone an already configured proxyVM, no further configuration is required for the clone to connect to the same site. To change the site, you will only need to change the qtunnel.conf link. Do I have this correct? But, sometime in the future, a possible newer version will only run in a Template, but then the rest is about the same on configuration, ( a separate AppProxyVM for each location wanted , unless one wanted to manually change the symlink to change locations ? That's the intention, to make qubes-tunnel (child of Qubes-vpn-support) already available for use in the templates. This simplifies the setup process for users. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/357250d3-c88a-cff5-7bc2-b0dd2f4c8c04%40posteo.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: reddit has incorrect "current" listed FWIW
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2018-04-25 20:49, Name wrote: > fyi the downloads section is deprecated on the right :) > > > https://www.reddit.com/r/Qubes/comments/8e5xm5/how_to_attach_usb_device_to_hvm/?st=jgfv9j5n=6c26e5a5 > I don't have the ability to change that. Please tell /u/lugh. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrhPhcACgkQ203TvDlQ MDDG/Q/+IIDMwR+I1Jt0jsHJ2hcfiTxyEiGeGNFk6KsNh/LyCvWUOr6QQzPgEIiP teF320kgJ2QQeHyshdEBaHjr+6FUg+yJ2zj/pIhikt+HiygedhRjZrtkYKxsGf4m 1JV34NukLbi0DRKId6ZaS2CRyp+Q/e0l+VTwLf7En61RFUGntqYlSG0Iz2N2NgTu Y7c0cW9V+VcrgAeMTf14rNvU9i3ml4KikGuyKOckc7jei2CWT0ClgxblJUvjJKbc d4jxmh/dz98ISWEv/+r7xk6GiMPTKVnRAyKgBPNMNmLIs5/CbuIPPrPJWfWtMvkp 3vu9erNUbhVY9xxYQG+ynWHzdEiGiBGLnjsz86BIIsrk78B4mhhRXBUhr/k8tm9C ynhByQMr57MEsS21SbvK0Wiw17qWe6gVj7vokQ6pFfkkFkgwEf0bXocAjdgAaFzb aOD1g+GhAqdVou4F47HBEoipAzGKcMkUJvOre+7os8gPRIRebtm5W47jTipg6Ae3 ZADNK0TVMqmEnlaptDNed4KOlZ78rcSGZxr9MOgFBnhFPgbJaqV5leDhGO7Hgdo4 oVzqo6sMBD9b3mJ9Nn9KlECoeyg4eA6w0LQ343/M0bta5QH3EQ1r+icABxNOcSog nIzCrL27CvYk7cAQ+FmUJF1sWCHOTUGEfJqAMFcwDunNxT/z9/0= =4BSC -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ae3f5732-4724-a8da-e1db-27945715f075%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] GPG setting stuck on copying keys to another VM
>> qfile-agent: Fatal error: stat whatever_gpg (error type: No such file or >> directory) > > > > Gtk-Message: GtkDialog mapped without a transient parent. This is > > discouraged. > > Sometime you can get this error even if the command succeeds Check the target VM for the copied file. It may actually be there. ls ~/QubesIncoming/vm-name/dir-name Sent with ProtonMail Secure Email. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d613f3HeGmdTBzcq3NC2tbBRbYNtJd7FuQ_LfDJj91sJQHB0IilKb5P8Z_dNqqz3kIeO4bqRQjjnB26c_qQ7xj4bC1xt_9cnvUmshQdqPWc%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] reddit has incorrect "current" listed FWIW
fyi the downloads section is deprecated on the right :) https://www.reddit.com/r/Qubes/comments/8e5xm5/how_to_attach_usb_device_to_hvm/?st=jgfv9j5n=6c26e5a5 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a643bc19-8d06-e68a-d40b-bd6593db17c0%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Announcement for users experiencing update errors in dom0 and Fedora TemplateVMs
On 04/25/18 15:16, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Dear Qubes Community, The following message is for Qubes users who are experiencing trouble while trying to update dom0 or Fedora TemplateVMs. If you have no problems updating, please disregard this message. If, while attempting to update dom0 or a Fedora TemplateVM, you have encountered a message of the form "Error: Failed to synchronize cache for repo 'qubes-vm-r*-current'", performing the steps below may resolve the issue. Instructions are provided for both dom0 and Fedora 26 TemplateVMs. Steps for dom0 updates: 1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen. 2. Select "Terminal Emulator". 3. In the window that opens, enter this command: sudo nano /etc/yum.repos.d/qubes-dom0.repo 4. This opens the nano text editor. Change all four instances of "http" to "https". 5. Press CTRL+X, then Y, then ENTER to save changes and exit. 6. Check for updates normally. Steps for Fedora 26 TemplateVM updates: 1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen. 2. Select "Template: fedora-26", then "fedora-26: Terminal". 3. In the window that opens, enter the command for your version: [Qubes 3.2] sudo gedit /etc/yum.repos.d/qubes-r3.repo [Qubes 4.0] sudo gedit /etc/yum.repos.d/qubes-r4.repo 4. This opens the gedit text editor in a window. Change all four instances of "http" to "https". 5. Click the "Save" button in the top-right corner of the window. 6. Close the window. 7. Check for updates normally. 8. Shut down the TemplateVM. Thank you to awokd for suggesting and testing these instructions! For further information about this issue, please see: https://github.com/QubesOS/qubes-issues/issues/3737 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrhKHgACgkQ203TvDlQ MDBE8A/9Flw5r3vjeDLvotEjfbH4WOKEoPR5xj7ICd8nsHHPYaTiTlG1s8bNC9ic y0CKKfGfg+lWFXSNZ4Fe3Za1BJxWBk2GkLyZAIY/sLCpY3eQaw87nVkTSUakdLwu hOF0NxzJeBp9wCMOjYdWb7Bpz3CpG0E0OUy07q/pqk0XwOVXdvMHSUQmcrJ14jd1 fHOrkse1ZTfuS0s03HsYdkj1/zSAQigpfzGP8VY8jQAAEO+tmNPlGj+KzsucJW3M xZSbW83eh7cyLrnInz6h1sA2gZmTC1ToH9KwD9D2jRPrH/NyNRBjGauqtxpfixgj FXtPDOhvfZ0/QBt7oaBfIwyzm79kLoRhhrYLGC+AOkhz8vM3HcIrLqrW02EojGHc dmwpucQLVAJ+wTVoFgvB5baTdjjn6LCK4h8U8hZGQLYoBds8KFq9goVJxKfK7ypz 1HXOYyJsP0pmU2rllWH1LB1zh2SeaNe8KWPB8Ki7J39r8fVmXzErUAwo/pZLvIsj 5yJIvwpjiQNVQrdpuYfXycqhsKqDzfbaxTp5pcoi618T+FBJugEpj2Y0KI/UngIw sMUm7jpSPJS9An55BuQrCovNATQFePwNVxLSM1lrzL2gPOYhEyc4eZAja+qFiVZR Ge/HorxVHClCB2Mkiv/mJVss85Py+Zznv6jxDBSiskR5IEt3sOM= =5Ass -END PGP SIGNATURE- Changing both dom0 and the Fed Temp to all https for Fedora-26 Q4 ** (gedit:1959): WARNING **: Set document metadata failed: Setting attribute metadata::gedit-encoding not supported Then using the VMM to update Fed-26 there are like 5-6 [Mirror] 404 errors .. However, it seems to update Changing https back to http and no warning on saving qubes-r4.repo , not sure why I'm telling you this :) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/52d5ebc5-fba6-54f1-4f6a-e87763b92c05%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Announcement for users experiencing update errors in dom0 and Fedora TemplateVMs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Dear Qubes Community, The following message is for Qubes users who are experiencing trouble while trying to update dom0 or Fedora TemplateVMs. If you have no problems updating, please disregard this message. If, while attempting to update dom0 or a Fedora TemplateVM, you have encountered a message of the form "Error: Failed to synchronize cache for repo 'qubes-vm-r*-current'", performing the steps below may resolve the issue. Instructions are provided for both dom0 and Fedora 26 TemplateVMs. Steps for dom0 updates: 1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen. 2. Select "Terminal Emulator". 3. In the window that opens, enter this command: sudo nano /etc/yum.repos.d/qubes-dom0.repo 4. This opens the nano text editor. Change all four instances of "http" to "https". 5. Press CTRL+X, then Y, then ENTER to save changes and exit. 6. Check for updates normally. Steps for Fedora 26 TemplateVM updates: 1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen. 2. Select "Template: fedora-26", then "fedora-26: Terminal". 3. In the window that opens, enter the command for your version: [Qubes 3.2] sudo gedit /etc/yum.repos.d/qubes-r3.repo [Qubes 4.0] sudo gedit /etc/yum.repos.d/qubes-r4.repo 4. This opens the gedit text editor in a window. Change all four instances of "http" to "https". 5. Click the "Save" button in the top-right corner of the window. 6. Close the window. 7. Check for updates normally. 8. Shut down the TemplateVM. Thank you to awokd for suggesting and testing these instructions! For further information about this issue, please see: https://github.com/QubesOS/qubes-issues/issues/3737 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrhKHgACgkQ203TvDlQ MDBE8A/9Flw5r3vjeDLvotEjfbH4WOKEoPR5xj7ICd8nsHHPYaTiTlG1s8bNC9ic y0CKKfGfg+lWFXSNZ4Fe3Za1BJxWBk2GkLyZAIY/sLCpY3eQaw87nVkTSUakdLwu hOF0NxzJeBp9wCMOjYdWb7Bpz3CpG0E0OUy07q/pqk0XwOVXdvMHSUQmcrJ14jd1 fHOrkse1ZTfuS0s03HsYdkj1/zSAQigpfzGP8VY8jQAAEO+tmNPlGj+KzsucJW3M xZSbW83eh7cyLrnInz6h1sA2gZmTC1ToH9KwD9D2jRPrH/NyNRBjGauqtxpfixgj FXtPDOhvfZ0/QBt7oaBfIwyzm79kLoRhhrYLGC+AOkhz8vM3HcIrLqrW02EojGHc dmwpucQLVAJ+wTVoFgvB5baTdjjn6LCK4h8U8hZGQLYoBds8KFq9goVJxKfK7ypz 1HXOYyJsP0pmU2rllWH1LB1zh2SeaNe8KWPB8Ki7J39r8fVmXzErUAwo/pZLvIsj 5yJIvwpjiQNVQrdpuYfXycqhsKqDzfbaxTp5pcoi618T+FBJugEpj2Y0KI/UngIw sMUm7jpSPJS9An55BuQrCovNATQFePwNVxLSM1lrzL2gPOYhEyc4eZAja+qFiVZR Ge/HorxVHClCB2Mkiv/mJVss85Py+Zznv6jxDBSiskR5IEt3sOM= =5Ass -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/507405d3-d596-6233-3c4d-b88948aa396e%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] [Q4.0] sys-usb fails to start with xHCI controller
The USB mouse worked on the Lenovo Flex 3-1570 during the installation process, but once installed, sys-usb (based on fedora-26) fails to start. When I tried starting manually the following error was displayed: ERROR: Start failed: internal error: Unale to reset PCI device :00:14.0: internal error: libxenlight failed to create new domain 'sys-usb', see /var/log/libvirt/libxl/libxl-driver.log for details /var/log/libvirt/libxl 2018-04-25 15:08:20.363+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: The kernel doesn't support reset from sysfs for PCI device :00:14.0 2018-04-25 15:08:20.363+: libxl: libxl_pci.c:1095:do_pci_add: Error: xc_physdev_map_pirq irq=-2147483648: Invalid argument 2018-04-25 15:08:20.363+: libxl: libxl_pci.c:1338:libxl__add_pcidevs: libxl_device_pci_add failed: -3 2018-04-25 15:08:20.363+: libxl: libxl_create.c:1512:domcreate_attach_devices: unable to add pci devices There are two USB controllers (Intel Wildcat - xHCI and EHCI) but only xHCI seems to be an issue since if I remove it sys-usb starts up, however; the USB ports do not work. Info from lspci -v -s 00:14 00:14.0 USB controller: Intel Corporation Wildcat Point-LP USB xHCI Controller (rev 03) (prog-if 30 [XHCI]) Subsystem: Lenovo Device 3820 Flags: medium devsel, IRQ -2147483648 Memory at d450 (64-bit, non-prefetchable) [disabled] [size=64K] Capabilities: [70] Power Management version 2 Capabilities: [80] MSI: Enable- Count=1/8 Maskable- 64bit+ Kernel driver in use: pciback Kernel modules: xhci_pci Based on recommendations for other, similar issues, I tried using PV instead of HVM, but it still wouldn't start. Any help/suggests would be appreciated! -Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ae7e4d5a-f5d1-421a-84ce-ef7500fac745%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Question on release
I am a new to using Qubes. Recently, I tried to install on a machine using an 8th generation Intel chip. The installation never made it past the black screen. It works on my other, older laptop. Will there be a release soon that makes Qubes compatible with the newest generation chip? Thanks, Charlie -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CACTvK3%3D-EQeEfp2HfKNje%3DKFPZf2tx4s7thvHe%3DofeQCVs5AeQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] XSA-258 and XSA-259 do not affect the security of Qubes OS
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Dear Qubes Community, The Xen Project has published Xen Security Advisories 258 and 259 (XSA-258 and XSA-259, respectively). These XSAs do *not* affect the security of Qubes OS, and no user action is necessary. These XSAs have been added to the XSA Tracker: https://www.qubes-os.org/security/xsa/#258 https://www.qubes-os.org/security/xsa/#259 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrhHcoACgkQ203TvDlQ MDAxdxAAr28EDctBM4JBFFHkSCUtgihUnfac8yEkFj2SBoQ2sY+jPF4xGqqlnqyK G9KuF1TKZqCZx/PQ3vvwL16mq/nOWDGJJfsFbYjHggDUVs3aqXTH9QdJOQcPtlAZ RlyeS8FRV98LNdB21OIoNKjuPXgo3Gxr9rHLCdeBPn1HCcUws+meWushcAn/xq/N TK6hJY6ZrU8Brey7KKbsx0iuGTEU9sV1SdMUz1rZfK8caYU3UaaWjYqMqPIDVjs1 Xmc12u6GKsgmFcOdfpVWhnVbAA3xdcIAdkhEmAe1nRKxYllZkLmeoviSd7QpTwXB 54WQbo29bj77IhH/IcAqWf/s2INEX9k0bBN2TAULOX4ykl1Tb5ethSRFo0m7fm2k C7w0IIq+Dj+Hq/M/cBJiuQKxdDQI6YMEpWjTpwm9PMRm7YohL2lbGJiQzgBIaRLc sXAwOka9DF0cn9vpnmgNqZkJGWbUJObpdZLrGTmnbjyIDX9sb05FqIRVrfov6qoc wgEEMyYy6k/cBteddyw1rP9nLNQaFUdQNs356si26NaYDxnYpuP+pTkSzNGU1d48 UEuF1QGtrIiIRsbHNEx3RZNivSXrg2MZqtrMNoHymrIFSmnC4tWNeRs2BlFB5AFs iDdzfZcOEE/nsKQVYc5YUI84s64ItPg4YfMx2o7NFct9cd9l6aI= =yi5p -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7e1cd2bc-32c4-0195-07a8-83da741ffe39%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Windows 10 Os in Qubes 4.0
Hello Black Beard, On 04/23 01:38, Black Beard wrote: > tommorow i want finished my Qubes installation on my Notebook. I am running Qubes since ~1,5y and I must say, it is never really finished, as there is so much you can optimize and fine tune ;-) > Since I need some programs that only runs on Windows, As I am running Qubes as my primary OS working in a very windows OS focussed world (IT Solution Provider) I need also windows to run ERP-system and to connect to microsoft exchange. > I now ask myself the question, how can I install Windows on Qubes? It's all in the Qubes Docs: https://www.qubes-os.org/doc/windows-vm/#qubes-40---windows-vm-installation Under Qubes 4 you need to download the Qubes Tools manually and then install them as they're not in the package repositories. > Do I risk my privacy with the additional windows installation? Depends on what you are doing, you can always outsource all tasks which you can run under Linux in other AppVms > I thought about Virtualbox, but that's also a virtual machine. no. > What about Linux Wine? I am runnung a Windows 7 HVM, which is working great and also with enough performance. What is missing: Audio Support Additionally I am running Crossover Linux from Codeweavers as it is simpler to use than Wine and because I like their Support Team. https://www.codeweavers.com/products/crossover-linux I am running Office 2016 without the Windows overhead via Crossover for Linux in a Debian-9 AppVM. Regarding connection to our corporate Exchange I am using a fedora-26 bases AppVM (my-mail) which connect to Exchange via DavMail. In this AppVM I am running Offlineimap + Neomutt and Khal + Khard for plain text productivity. I also keep a browser windows with OWA (Outlook Web Access) open. The my-mail AppVM is restricted by firewall rules so that it can only connect to our Exchange server. I can open links through a disposable VM or copy & paste links to another AppVM Additionaly I am using another fedora-26 my-work AppVM which has Cisco Anyconnect and VMware Horizon View installed if I need to run special tasks. Summary: the great thing with Qubes is, that it is like a toolbox, pick the right tool to get your job done. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20180425225418.xdvhzaxtwsyft4gj%40my-privmail. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] To use Windows 7 OEM as a Qubes VM; which hardware metadata is needed?
On Wed, Apr 25, 2018, at 15:24, Stuart Perkins wrote: > Ah, I see what you are after. I doubt an OEM licensed Windows can be > used on a different piece of hardware, but it is worth a shot. You may > be stuck buying a "license". Right. I also have XP licence(s), and get what I need running there and also mostly through (LInux) Wine, so I am basically just curious to know if a OEM version could be made to work on a permanent basis beyond the 90 days. Just to know and be able to help others getting such things working also under Qubes. Sometimes all that is missing and preventing moving to Linux/Qubes is a printer driver for specific hardware (scanners, faxes, etc., and for example accounting systems and the like. Regards, Teqleez -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1524692378.1382837.1350865488.2EAD6C3B%40webmail.messagingengine.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Music streaming in Firefox 59: QubesOS 4.0 / Fedora 26
On Wednesday, April 25, 2018 at 3:38:52 PM UTC-4, 00010...@gmail.com wrote: > > maybe mp4? gstreamer1-libav package? > > Thanks, but unfortunately it did not work. > > I found https://itsfoss.com/things-to-do-installing-fedora-22/ and it says to > install all of the following: > > gstreamer-plugins-bad > gstreamer-plugins-bad-free-extras > gstreamer-plugins-ugly > gstreamer-ffmpeg > gstreamer1-libav > gstreamer1-plugins-bad-free-extras > gstreamer1-plugins-bad-freeworld > gstreamer1-plugins-base-tools > gstreamer1-plugins-good-extras > gstreamer1-plugins-ugly > gstreamer1-plugins-bad-free > gstreamer1-plugins-good > gstreamer1-plugins-base > gstreamer1 > > But Fedora 22 is old, so is the above information still correct or does it > need revision? I'm not sure have you tried google chrome? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ae574744-1c2c-4664-8ddc-77dab66b8b04%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: 4.0 wouldn't boot after update
On Wednesday, April 25, 2018 at 2:43:46 PM UTC-5, john wrote: > On 04/25/18 05:13, Jon Solworth wrote: > > I updated qubes 4.0 and there were some errors (about transactions on--I > > believe--some crypto stuff). Afterwards, I couldn't boot getting the > > message > > > > kernel panic -- not syncing: VFS unable to mount fs on unknown block (0,0) > > > > the problem is that my backup is a bit old, and if possible I would like to > > retrieve the data. So: > > > >1. Is there a way to restore the kernel to a working one? or > > alternatively > >2. If I build qubes on an external disk, is there a way to copy over the > > files from my SSD? > >3. Any other suggestions. > > > > (I tried to use troubleshooting with a 4.0 usb stick, but couldn't figure > > out how to recover). > > > > thanks > > Jon > > > > Just curious was this a legacy or efi installation ? and in your > Bios/EFI boot settings do you see two choices for the USB installation > media? > > What happened when you tried 'troubleshooting' USB media exactly ? legacy. Didn't get to far with troubleshooting. I got a shell, was able to decrypt the volume, but not sure wha to do next. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/151c2074-6b0d-46eb-a2e3-67ceed5dbeb0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: 4.0 wouldn't boot after update
On 04/25/18 05:13, Jon Solworth wrote: I updated qubes 4.0 and there were some errors (about transactions on--I believe--some crypto stuff). Afterwards, I couldn't boot getting the message kernel panic -- not syncing: VFS unable to mount fs on unknown block (0,0) the problem is that my backup is a bit old, and if possible I would like to retrieve the data. So: 1. Is there a way to restore the kernel to a working one? or alternatively 2. If I build qubes on an external disk, is there a way to copy over the files from my SSD? 3. Any other suggestions. (I tried to use troubleshooting with a 4.0 usb stick, but couldn't figure out how to recover). thanks Jon Just curious was this a legacy or efi installation ? and in your Bios/EFI boot settings do you see two choices for the USB installation media? What happened when you tried 'troubleshooting' USB media exactly ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/efd4e79b-6d2d-fbb6-4daa-27effe9fd7b3%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Music streaming in Firefox 59: QubesOS 4.0 / Fedora 26
> maybe mp4? gstreamer1-libav package? Thanks, but unfortunately it did not work. I found https://itsfoss.com/things-to-do-installing-fedora-22/ and it says to install all of the following: gstreamer-plugins-bad gstreamer-plugins-bad-free-extras gstreamer-plugins-ugly gstreamer-ffmpeg gstreamer1-libav gstreamer1-plugins-bad-free-extras gstreamer1-plugins-bad-freeworld gstreamer1-plugins-base-tools gstreamer1-plugins-good-extras gstreamer1-plugins-ugly gstreamer1-plugins-bad-free gstreamer1-plugins-good gstreamer1-plugins-base gstreamer1 But Fedora 22 is old, so is the above information still correct or does it need revision? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a5998474-d81d-413a-a757-c38acd5afe67%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Install Orientdb on Qubes
Hi I wanted to install Orientdb (https://orientdb.com/) on a separate AppVM, so that I could only run it when needed. The Orientdb installation instructions does not work, as it is geared towards a normal Debian (or Fedora) setup. In particular, the /opt/ and /etc/ directories are copied from the template, and thus disappears after every reboot. I therefore offer this advise (probably not optimal, but at least it works for me): 1. Create new AppVM (call it orientdb or whatever) from a relatively clean template. 2. Make sure that Java is installed on the template VM 3. See the installation instructions ( https://orientdb.com/docs/last/Unix-Service.html and especially https://www.hugeserver.com/kb/install-orientdb-debian8-ubuntu16/). Follow the instructions, but instead of copying the unzipped/untarred files to /opt/, put it under the user home directory (e.g. under /home/user/orientdb) 4. To install the service, follow the instructions as given, but replace /opt/orientdb with /home/user/orientdb: (a) Change the configuration file (orientdb.sh), but make the path wherever your orientdb is placed (NOT /opt) (b) Modify the service file (orientdb.service) as indicated. 5. After this, we have to diverge from the instruction: (a) Open /rw/config/rc.local file with root privileges in an editor (b) Copy the following into the file: --- #!/bin/sh sudo cp /home/user/orientdb/bin/orientdb.service /etc/systemd/system/ sudo systemctl daemon-reload sudo systemctl start orientdb sudo systemctl enable orientdb This will copy over the service config file and start the service every time the VM is started up. 6. Make sure the file is executable (sudo chmod +R /rw/config/rc.local) 7. Open your browser, and set the homepage to http://localhost:2480 8. Restart the VM. While this is probably not the best way to do it, at least it works, and will get Orientdb to run as a service when you start up the VM. I hope this will help someone else who also wants to experiment with document- and graph databases, and loves Qubes (obviously). Thanks Barry -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAFRzxQ1vSqM0vyTJzWQnNqb_ceVAd_7w385wzry_KHiadh_G0A%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Steam In-Home Streaming for games to a Qubes VM
On Friday, March 30, 2018 at 2:21:49 PM UTC-7, awokd wrote: > On Fri, March 30, 2018 8:30 pm, Fox Gluv wrote: > > Looking at the network traffic, the UDP packets that are not making it > > through have a destination of 255.255.255.255 (broadcast), so I'm > > guessing a simple Port forwarding NAT won't work. Would a MASQUERADE work > > better? > > > > Summary question - how do I forward UDP broadcast (255.255.255.255) > > traffic from a separate Win10 machine, to a Qubes 4.0 VM running Debian > > 9? > > I'm not sure it's possible to inbound NAT broadcast traffic, have never > heard of a need for it. There's no way to change Steam to send to a > specific IP/port? The ugly hack approach would be to directly attach a > secondary NIC inside the VM you want to receive broadcast traffic but of > course, you lose a lot of layers of protection by doing that. > > > Also, should I just take this to a networking forum? > > Possibly, maybe some iptables wizard could figure out a way to turn that > broadcast traffic into directed. To close the loop on this, awokd is correct that it is not easy to NAT broadcast traffic. I found a couple ways that might work, but it breaks the purpose/design of broadcast. The best solution I found was to set up a VPN between the server machine and the specific qubes VM. In the end, I sacrificed some security and set up mult-boot. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/18df7979-4dd7-40c5-8025-ce8df513928f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] 4.0 wouldn't boot after update
I updated qubes 4.0 and there were some errors (about transactions on--I believe--some crypto stuff). Afterwards, I couldn't boot getting the message kernel panic -- not syncing: VFS unable to mount fs on unknown block (0,0) the problem is that my backup is a bit old, and if possible I would like to retrieve the data. So: 1. Is there a way to restore the kernel to a working one? or alternatively 2. If I build qubes on an external disk, is there a way to copy over the files from my SSD? 3. Any other suggestions. (I tried to use troubleshooting with a 4.0 usb stick, but couldn't figure out how to recover). thanks Jon -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/af0094ff-427a-4f10-b665-fdaf77531257%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] offlineimap with Split-GPG : get new email via cron doesn't work
Hello, I am using neomutt with offlineimap to get my corporate mail into an Email-AppVM. The current workflow is: 1) get email running offlineimap -o 2) start neomutt I'd like to have offlineimap check the mails in the background using cron. Thereof I have written a small script: /user/check-mail.sh #!/usr/bin/bash # Script will be run by cron #su user -c "/usr/bin/offlineimap -u quiet -f INBOX,INBOX.Inbox_CC" /usr/bin/offlineimap -u quiet -f INBOX,INBOX.Inbox_CC echo Cronjob run at: `date`>> /tmp/cron.log The last line is only for troubleshooting in order to see, if the cronjob has been run. The scripts is working when launched manually. It will open up the SplitGPG window to grant access to my GPG-key in my vault-VM. I need to enter the password once and if the next request is within a 300sec window access will be granted to th eGPG without further user interaction. I have installed cron and setup a cronjob which should run every 3 min in order to be below the 300sec time window when Spli-GPG is asking for a password. I have encrypted the password in my offlineimap-config and it can only be decrypted using my [user@my-mail]$ crontab -l # min hr day-of-month month day-of-week # 0-59 0-23 0-31 1-12 0-7 # Check important mail folders every 3min */3 * * * * /home/user/bin/check-mail.sh unfortunately it seems that this script doesn't work via cron, do you have any idea what is wrong? If I look into the logfile the script is writing (/tmp/cron.log) I see that th ecronjob runs the script but no mails are downloaded. As mentioned running the script manually will work. Is cron running the job as "user" or as "root"? To all offlineimap / mutt users how are you auto-fetching new emails? [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJ3yz2tXWNz6Mst3PeUHtcPUj2EzAhH6vs7OUTg0tf8m_8LrAA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] To use Windows 7 OEM as a Qubes VM; which hardware metadata is needed?
On Wed, 25 Apr 2018 09:05:59 +0200 Teqleez Motleywrote: >On Tue, Apr 24, 2018, at 18:40, Stuart Perkins wrote: >> In that case, I would consider pulling the hard drive and using usb >> adapter to access the information without concern for battery life. > >Hm, I thought that in order to get such metadata out, one would have to access >the BIOS/hardware info directly? >For example, the serial number or the like of the motherboard, graphics card, >etc. >The hard drive of that laptop is long gone (reused), no Windows installation >left. >I just have the licence key, and hopefully the possibility to get to the >hardware serial numbers, etc. via some tool... > >Regards, >Teqleez > Ah, I see what you are after. I doubt an OEM licensed Windows can be used on a different piece of hardware, but it is worth a shot. You may be stuck buying a "license". I run Win-7 by downloading the VBox VM from "modern.ie" for IE11/Win7. it is only 32 bit (so no Qubes Windows tools), but it can be re-armed 5 times for 90 days each plus initial activation for 540 days before having to start over. I have a bulk licensed version of XP and the registry hack to get security updates until June of 2019 as well...also 32 bit though. Someone may have hacked the Windblows registry for those things...not sure where to find that information though...such a hack would let you update the registry to match the new "hardware", but I've never hacked that deep into it. :) Stuart -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20180425092438.20e86782%40gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Well supported laptops with 64GB system memory?
Good day everyone! Saw a thread on reddit recently where someone was asking about a qubes supported laptop capable of employing 64GB of system memory. That got me thinking and doing some research, and actually nothing concrete comes up. Is anyone running such a system? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e05938d1-0c3d-8649-4df4-f6164fa3970f%40fastmail.jp. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] To use Windows 7 OEM as a Qubes VM; which hardware metadata is needed?
On Tue, Apr 24, 2018, at 18:40, Stuart Perkins wrote: > In that case, I would consider pulling the hard drive and using usb > adapter to access the information without concern for battery life. Hm, I thought that in order to get such metadata out, one would have to access the BIOS/hardware info directly? For example, the serial number or the like of the motherboard, graphics card, etc. The hard drive of that laptop is long gone (reused), no Windows installation left. I just have the licence key, and hopefully the possibility to get to the hardware serial numbers, etc. via some tool... Regards, Teqleez -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1524639959.1577693.1349920888.37604342%40webmail.messagingengine.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] IMG sharing
Hey, On 04/24/2018 09:54 PM, 799 wrote: > Hello Drew, > > Drew Whiteschrieb am Di., 24. Apr. 2018, 07:14: > >> Is it possible for every guest to share one virtual drive for cacheing and >> auto mounting to same location for file transfers? >> >> i.e. One file always mounted to each guest and one reads while one writes. >> etc. no need to mount and unmount? And it can be multiple images on >> different locations at once? >> > > I haven't understand yet what you are trying to accomplish. > You want a file location ("drive") that is shared between VMs, and you want > that most VMs have read permissions to this location and one can write to > it? > > As mentioned by others this kind of breaks the security model of Qubes but > I had a similar use case to work with data stored in a cloud service. > > I wanted to separate data editing, local data storage and synchronization > to the cloud service. > The idea was that data is always encrypted in the "storage AppVM". Other > "AppVMs" can access this Storage AppVM using SSHfs. > I am using certificates and tight firewall configuration: > - the AppVM can request connection to the storage VM via ssh, login is done > via certificates. > - after authentication the remote location is mounted via SSHfs > - the data is encrypted with encfs and the decryption keys are only stored > on the AppVM which is accessing the data (not the storage VM) > > This setup works quiet well for my usecase as it is less complex than > setting up a Fileserver with NFS to share data between AppVMs. > > I know that this may not the best thing for a die hard Qubes user, but it > allows me to setup inter-AppVM data flows if needed for specific use cases. > > I have also scripted everything so that the firewall ports will only be > opened when needed. > > If you are interested I can upload my scripts/how-to to my GitHub account. Sounds like a good candidate for the Qubes-Community project :) > > [799] > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/afd0011c-9a51-57aa-3894-a99b0151e2b7%40maa.bz. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] IMG sharing
On Tue, Apr 24, 2018, at 20:54, 799 wrote: > I have also scripted everything so that the firewall ports will only be > opened when needed. > > If you are interested I can upload my scripts/how-to to my GitHub account. > Please do that, very interesting! Thanks. Regards, Teqleez -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1524639561.1575805.1349917712.24EC6883%40webmail.messagingengine.com. For more options, visit https://groups.google.com/d/optout.