[qubes-users] X11 forwarding stopped working in fedora-26, still works in debian-9
sometime in the last couple days, ssh -X stopped working in fedora-26 templates, at least on my box. still works from debian-9. anyone else notice this? anything change? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0b567e4c-3838-44e3-83c7-d258ded406f3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ProxyVM in Qubes 4.0
On 05/10/2018 11:08 PM, Quentin Le Guennec wrote: > From the docs (https://www.qubes-os.org/doc/vpn/) > > "Create a new VM, name it, click the ProxyVM radio button, and choose a > color and template." > > On Qubes 4.0, I don't see that radio button. I don't see anything about > that in the manual page of qvm-create either. Am I missing something? "ProxyVMs" in 4.0 are simply AppVMs with the "provides_network" pref set to true (or the "provides network" radio button checked when creating a VM with the gui) BTW you may want to check Chris Laprise's VPN code https://www.mail-archive.com/qubes-users@googlegroups.com/msg21339.html -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e87ac105-26a6-b8a3-7e12-a400a1c9f3ca%40maa.bz. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
[qubes-users] Re: gpg-split revoke command $ export QUBES_GPG_DOMAIN=work-gpg
On 05/08/18 20:56, qubes-fan-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org wrote: I am playing with gpg-split and I did a missclick. I would need to revoke the command. I executed the command $ export QUBES_GPG_DOMAIN=work-gpg by mistake in vault qube instead of work-gpg cube. Is there a way to revoke it? Thank you this could be wrong, but I went throught the whole setup, but then in my Enigmail VM, it told me something about the 0x232jljla key could not be found in my keyring, though I had the pub/sec key in the splitgpgVM ..so I gave up and just changed the command back eg $ export QUBES_GPG_DOMAIN=EnigmailVM and turned the Enigmail preferences off, and it was repaired , so if it is not in Bash .config , as some newer post references, apparently it doesn't survive VM reboot anyhow This gpg is so complicated, all I can do is cut and paste through the directions, might be something simple and it would have been working, but I guess some encryption without splitgpg is better than no encryption . -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/207c4a59-1664-ecdb-9366-ed3d8e71ed12%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] opening links in another VM opens two browsers
Hey everyone! Hope you are all doing well. I followed the guide here: https://www.qubes-os.org/doc/tips-and-tricks/ so links clicked in one debian-9 AppVM will open in separate debian-9 AppVM. What actually happens is interesting. If I have firefox running in the destination VM already, everything works as expected. The link opens a new tab in the proper AppVM. However, if firefox is not currently running, a clicked link will open the link in a browser in both VMs. Any ideas? -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/47091bca-90fe-286a-e851-008d3f8af1c4%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Keyboard Problems - Corsair Gaming K65 Lux RGB
W dniu czwartek, 10 maja 2018 22:44:06 UTC+2 użytkownik fe...@oxley.org napisał: > HI, > > I have a Corsair Gaming K65 Lux RGB keyboard which does not work for Qubes. > > When I boot my system: > > 1. Press F11 to get to boot selection menu > 2. Select boot drive containing Qubes > 3. Initial boot and then hard disk drive encryption key in requested. > > At (3) the keyboard no longer works. It is frozen, none of the basic > functionality works (e.g. Caps Lock or letters/numbers) but also the keyboard > has locked up e.g. the built in keyboard functions for switching the > backlight off and on do not work. > > I haven't had any issues when running Ubuntu :-) > > I am just posting this to share the information but if anyone has suggestions > that would be great. > > Thanks > Felix You probably have USB controllers blacklisted in Dom0, which makes it impossible to type the encryption key using that keyboard. Plug it usin USB to PS/2 adapter (if your PC has a PS/2 port) and it should work just fine. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20b71929-2f34-461a-95fb-fc1484ee96c5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Keyboard Problems - Corsair Gaming K65 Lux RGB
HI, I have a Corsair Gaming K65 Lux RGB keyboard which does not work for Qubes. When I boot my system: 1. Press F11 to get to boot selection menu 2. Select boot drive containing Qubes 3. Initial boot and then hard disk drive encryption key in requested. At (3) the keyboard no longer works. It is frozen, none of the basic functionality works (e.g. Caps Lock or letters/numbers) but also the keyboard has locked up e.g. the built in keyboard functions for switching the backlight off and on do not work. I haven't had any issues when running Ubuntu :-) I am just posting this to share the information but if anyone has suggestions that would be great. Thanks Felix -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/054be405-cf51-46f4-b959-7a2837dbe30e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] ProxyVM in Qubes 4.0
>From the docs (https://www.qubes-os.org/doc/vpn/) "Create a new VM, name it, click the ProxyVM radio button, and choose a color and template." On Qubes 4.0, I don't see that radio button. I don't see anything about that in the manual page of qvm-create either. Am I missing something? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a80ebf87-0fb2-e8c0-da15-1e845696efdb%40gmail.com. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
[qubes-users] HCL - HP_ZBook_15_G4
Hello Qubes Team, See attached for .yml file with my hardware information. I haven't had a chance to test TPM/AEM yet, because I'm having trouble accessing the BIOS after installing Qubes. I need to verify that TXT and TPM are both enabled there and possibly update the BIOS firmware. Thanks for all your efforts on this badass platform! -- Take care, Tom Marciniak -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPqQ4qoeO40eZb8n3u2Ev%3D_LMSBHeCz%2B_U2MuOOUoOVP9dkp_w%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-HP-HP_ZBook_15_G4-20180510-122011.yml Description: application/yaml
Re: [qubes-users] trouble with whonix-14-dvm
mossy: > 'awokd' via qubes-users: >> Think I got it working with the -14 templates from unstable. In dom0: >> >> sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable >> qubes-template-whonix-gw-14 >> qvm-create sys-whonix-14 --class AppVM --template whonix-gw-14 --label black >> qvm-prefs sys-whonix-14 provides_network True >> >> sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable >> qubes-template-whonix-ws-14 >> qvm-features whonix-ws-14 whonix-ws 1 >> qvm-create whonix-ws-dvm-14 --class AppVM --template whonix-ws-14 --label >> green >> qvm-features whonix-ws-14-dvm appmenus-dispvm 1 >> qvm-prefs whonix-ws-dvm-14 template_for_dispvms true >> qvm-prefs whonix-ws-dvm-14 netvm sys-whonix-14 >> qvm-prefs whonix-ws-dvm-14 default_dispvm whonix-ws-dvm-14 >> >> I suspect once these templates get released to stable, the salt command >> will take care of all that for us. >> > > Plus, to ensure updates will work, run the following as well in dom0: > > qvm-tags whonix-gw-14 a whonix-updatevm > qvm-tags whonix-ws-14 a whonix-updatevm > > And thanks for this, I was not aware of qvm-features or some of those > the qvm-prefs flags. Whonix 13 to 14 upgrade worked for me on R4_rc5 > but not final R4.0, but installing fresh templates from unstable did the > trick. > > -m0ssy > also, if you want whonix updates to go through the new sys-whonix-14, in dom0 edit the file: /etc/qubes-rpc/policy/qubes.UpdatesProxy modify the top line: $tag:whonix-updatevm $default allow,target=sys-whonix to become: $tag:whonix-updatevm $default allow,target=sys-whonix-14 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/065ee013-76df-6866-50a5-f1a123acce9d%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] split-gpg export QUBES_GPG_DOMAIN doesnt survive the reboot
On Thu, 10 May 2018, qubes-...@tutanota.com wrote: > I set up the split-gpg with vault-safe VM, where my private keys are stored, > and the work VM, with pub keys and server communication. > > All runs well after executing the > [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe > > The issue is, that the export doesnt survive rebooting the work VM, and I > need to export it again. Is it a Qubes preset, and needs to be executed > every reboot, or am I missing something? Put that export into the startup file of the shell. -- i. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/alpine.DEB.2.20.1805101853480.1344%40whs-18.cs.helsinki.fi. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] trouble with whonix-14-dvm
'awokd' via qubes-users: > Think I got it working with the -14 templates from unstable. In dom0: > > sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable > qubes-template-whonix-gw-14 > qvm-create sys-whonix-14 --class AppVM --template whonix-gw-14 --label black > qvm-prefs sys-whonix-14 provides_network True > > sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable > qubes-template-whonix-ws-14 > qvm-features whonix-ws-14 whonix-ws 1 > qvm-create whonix-ws-dvm-14 --class AppVM --template whonix-ws-14 --label > green > qvm-features whonix-ws-14-dvm appmenus-dispvm 1 > qvm-prefs whonix-ws-dvm-14 template_for_dispvms true > qvm-prefs whonix-ws-dvm-14 netvm sys-whonix-14 > qvm-prefs whonix-ws-dvm-14 default_dispvm whonix-ws-dvm-14 > > I suspect once these templates get released to stable, the salt command > will take care of all that for us. > Plus, to ensure updates will work, run the following as well in dom0: qvm-tags whonix-gw-14 a whonix-updatevm qvm-tags whonix-ws-14 a whonix-updatevm And thanks for this, I was not aware of qvm-features or some of those the qvm-prefs flags. Whonix 13 to 14 upgrade worked for me on R4_rc5 but not final R4.0, but installing fresh templates from unstable did the trick. -m0ssy -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/53a8bd93-3df4-9ab3-44d1-2c92221e346f%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] split-gpg export QUBES_GPG_DOMAIN doesnt survive the reboot
qubes-...@tutanota.com: > I set up the split-gpg with vault-safe VM, where my private keys are stored, > and the work VM, with pub keys and server communication. > > All runs well after executing the > [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe > > The issue is, that the export doesnt survive rebooting the work VM, and I > need to export it again. Is it a Qubes preset, and needs to be executed every > reboot, or am I missing something? > You should add `export QUBES_GPG_DOMAIN=vault-safe` to your ~/.bash_profile good luck! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c2cf2253-9462-ab1e-492a-d51771b79142%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] split-gpg export QUBES_GPG_DOMAIN doesnt survive the reboot
I set up the split-gpg with vault-safe VM, where my private keys are stored, and the work VM, with pub keys and server communication. All runs well after executing the [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe The issue is, that the export doesnt survive rebooting the work VM, and I need to export it again. Is it a Qubes preset, and needs to be executed every reboot, or am I missing something? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/LC8YldD--Z-0%40tutanota.com. For more options, visit https://groups.google.com/d/optout.