Re: [qubes-users] fedora-27-minimal: networking support?

2018-05-27 Thread [799]
Hello Johannes,

On 05/28 12:00, Johannes Graumann wrote:
> The fedora-27-minimal template from the repo does not appear to have
> networking support. What needs to be installed to remedy that? 

I have just migrated all my sys-AppVMs from a fedora-26-minimal to a 
fedora-28-minimal image.
I also had some issues with networking and got it working after installing some 
more packages:

When I build my standard-App-Template for daily use, the AppVM was unable to 
connect to the web.
I had to install the following packages in the template to get networking:

dnf install qubes-core-agent-networking 

I guess the same applies for fedora 27.

regards

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180527224032.ye33zkmjm2ar3sfl%40my-privmail.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] fedora-27-minimal: networking support?

2018-05-27 Thread Johannes Graumann
Hello, 

The fedora-27-minimal template from the repo does not appear to have
networking support. What needs to be installed to remedy that? 

Thank you for any hint. 

Sincerely, Joh

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2aed0122eac3084eaa01cae649520c95%40graumannschaft.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Dolphin or Nautilus in a standard Qubes AppVM Template

2018-05-27 Thread [799]
Hello,

I am currently migrating from fedora-26 to fedora-28 which includes replacing 
my templates buy rebuilding from scratch.

I decided to replace my "fat AppVM templates" which have been based on 
fedora-26 before with AppVMs based on the 
fedora-28-minimal template.

The question is now, if I should install Dolphin or Nautilus as the default 
File Manager and which qubes-specific question I should install.
What do you suggest under Qubes Dolphin or Nautilus?


[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180527201319.ik6t2ehakmihh7aj%40my-privmail.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How to attach CDROM /dev/sr0 to appvm?

2018-05-27 Thread Inqubator
On Sunday, May 27, 2018 at 3:41:41 PM UTC+2, awokd wrote:
> On Sat, May 26, 2018 9:24 pm, Inqubator wrote:
> > On Saturday, January 30, 2016 at 11:25:47 AM UTC+1, Dimitri wrote:
> >> I'd like to listen to music but I didn't yet succeed with reading a
> >> CDROM in a appvm. Qubes manager offers the option to attach dom:/dev/sr0
> >> but the device won't show up in the appvm. (qvm-block tells me that
> >> /dev/sr0 is attached as xvdi but there's no xvdi in the vm) Any ideas?
> >> Thanks
> >
> > Same here: I attach my cdrom (sr0) to the domain "personal" but it doesn't
> > show up there. qvm-block, run in dom0, shows it as used by "personal" (as
> > "xvdi").
> >
> > Dmesg does not show anything but throws an error, both in dom0 and
> > personal: "dmesg: read kernel buffer failed: Operation not permitted".
> >
> > Ideas?
> >
> > (BTW: I am using Qubes 4)
> 
> I think that is a Xen limitation. It should work as you describe with data
> CDs, but for music you might have to take one of these
> https://www.qubes-os.org/doc/recording-optical-discs/ approaches.

Thanks for the suggestion.

I had tried with a music CD actually. But when I inserted a data CD, nothing 
changed. It just doesn't show up in the VM, despite the fact that Qubes shows 
it as attached. Very frustrating.

Other ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ad02dc63-5c7d-4611-9e15-0bb504ee7ec7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [SPAM] Re: [qubes-users] Curl error (6) by updating dom0

2018-05-27 Thread evo


On 05/24/18 19:30, awokd wrote:
> On Thu, May 24, 2018 4:24 pm, evo wrote:
>>
>>
>> On 05/24/18 14:33, awokd wrote:
> 
>>>
>>> See the instructions at the top of
>>> https://www.qubes-os.org/doc/installation-guide/.
>>>
>>>
>>
>>
>> thanks!
>> i changed the 4 links to https.
>>
>> ...but now i get curl error (3) on several links
>> "ULR using bad/illegal format or missing URL for ..."
>> und am Ende "... http' contains bad letter"
> 
> You edited /etc/yum.repos.d/qubes-dom0.repo, right? And made the line
> under [qubes-dom0-current] look something like:
> 
> baseurl = https://yum.qubes-os.org/r$releasever/current/dom0/fc25
> 
> 

don't understand it... it still gives me many errors, now again curl
error (6), so i can not update dom0

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/32d9ec99-09e5-261c-820d-e14637546c88%40aliaks.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes System Storage Max size

2018-05-27 Thread jsnow
Reza Naqshbendi:
> Hi there,
> 
> I'm using Qubes 3.2 with recently upgraded fedora-28. For one of my VMs
> I wanted to increase the System Storage max size, I mistyped the figure
> and went beyond what I wanted. I've set it around 100GB! I noticed
> immediately but the problem is that I can't change it back. I can
> increase it even more (!) but I can't reduce it. After the setting I got
> the message that I needed to run resize2fs for the change to be
> implemented really. I didn't but after the reboot I see it still having
> the giant size!
> 
> The initial reason for me to increase the system storage size was to be
> able to install GIMP 2.10 through Flatpak. With the default system
> storage size, and in spite of having 15GB in private size of the
> template, I couldn't install the package getting the message that I had
> not enough space left. Space is all over the place, but probably not at
> the right spot.
> 
> Thanks

Hi,

Yea qubes has a problem with shrinking the image size after it's been
expanded.

https://www.qubes-os.org/doc/resize-disk-image/

The easiest thing is probably just to leave it as it is. The template
isn't really using that much space and qubes manager will show how much
space it's actually using. You can redownload a fresh template and start
again too tho.

-- 
Jackie

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/402f1c72-6388-b9aa-b923-126167585e77%40bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] QubesOS template flavors

2018-05-27 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-05-27 08:07, Frédéric Pierret (fepitre) wrote:
> Hi all,
> 
> As many of you have probably already seen, there are now a few more
> of template flavors available in QubesOS like Fedora and CentOS
> with XFCE desktop, and probably more in the future with LXDE, LXQT,
> KDE, etc. (like the spins in Fedora).
> 
> Currently on the repositories, you can download normal and minimal
>  flavors. We were wondering if there is a need for providing also 
> other flavors like fullyloaded and XFCE instead of building them by
> yourself.
> 
> Best, Frédéric
> 

This is great news! Would you mind helping us document all the
template flavors that are currently available, either by submitting a
doc PR or by listing them here so that I can add them to the
appropriate doc page?

For example, here are a few places that might be relevant (depending
on the template flavor):

https://www.qubes-os.org/doc/#managing-operating-systems-within-qubes
https://www.qubes-os.org/doc/templates/
https://www.qubes-os.org/doc/templates/fedora/

It would also be helpful to explain the benefit of having different
desktop environments in templates.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=XQ+e
-END PGP SIGNATURE-


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e535f0bd-e1f8-b8cd-b31d-290c7b888778%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Cukoo sandbox?

2018-05-27 Thread Sandy Harris
Will this work under Qubes-OS?
https://cuckoosandbox.org/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CACXcFm%3DtU5ZLRQbXQT%3DOto88vfcsz5drVeGCHbJv8Kz4waOSwg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0+Electrum Wallet

2018-05-27 Thread donoban
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 05/27/18 18:10, myblackcatisb...@gmail.com wrote:
> Hey Community users,
> 
> iam a new Qubes User and i tried to install the Bitcoin Electrum
> Wallet.
> 
> The Wallet i installed on the Vm Domain Work sucessfully. In the
> Qubes settings I also installed the software bundle. The wallet
> would be marked as installed there. Unfortunately, when I click on
> the button Launch, Electrum does not open. Also a remove is not
> possible.
> 
> What iam doing wrong?

Do you use fedora template? did you use 'sudo dnf install electrum'?
-BEGIN PGP SIGNATURE-
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=hUU3
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6c3c604b-542d-f95b-f05b-83e0aec2ff3c%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Why does sys-firewall needs so much RAM?

2018-05-27 Thread donoban
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 05/27/18 16:40, 799 wrote:> The only thing I am struggling with is
to install something so crucial
> like a firewall which is not coming from the Qubes Team. For me as
> a normal user it is hard to decide if qubes-mirage-firewall is 
> reasonable secure compared to the default sys-firewall.

Well, Thomas Leonard (talex) is a big open source contributor.

Author reputation apart, an unikernel is a more secure than normal
sys-firewall because it has tons of less complexity. An unikernel is a
kernel running a single process with unique address space, without
user system, etc... it only has the needed code/libs for running that
single process. A normal linux distribution like standard sys-firewall
has a lot of things not needed for the firewall task, even
fedora-minimal has a lot of functions and complexity compared to
mirage-firewall.

Also, a pretty vulnerable part of standard Qubes is the network stack
of linux. If a compromised sys-net has some exploit for that part of
code, it is likely to scale from it to sys-firewall using the same
explit and then to other AppVM's. So it is nice to have a total
different system between.

Another interesting difference is the programming language. Fedora or
debian sys-firewall has millions of lines of C or similar code, where
common security problems are relative easy to appear and hard to find
and fix. mirage-firewall is mostly based on OCaml, a functional
oriented language where this kind of programming errors are less
likely to happen.

> As far as I understand it is run a docker image (in dom0?).

No. Docker is used in some AppVM for build the mirage-firewall image.
I think docker is used for simplicity the build process. Once you have
your kernel image you pass it to dom0 and just boot a new VM with that
kernel.

> is there any official feedback regarding the qubes-mirage-firewall
> and what do the "Qubes Pro's" think about it.> If it is better,
> then why hasn't it be integrated in the Qubes Image?

Exists this issue:
https://github.com/QubesOS/qubes-issues/issues/3792

There is a problem with current mirage-firewall, the rules are
currently hard coded in the source. So you need to modify, rebuild and
reboot the VM for change them.

Also there is a fork which uses the module.img file (a dummy file in
the other version) for save the rules:
https://github.com/cfcs/qubes-mirage-firewall/tree/user_supplied_rules

This way you can edit the rules without rebuild the whole image, but I
think that you need to reboot the VM.

When I discovered this I wanted to add compatibility with Qubes
Manager for it, but it was pretty difficult with Qubes 3.2 format. Now
I'm using Qubes 4, I would like to try again.

> I will rebuild my sys-firewall from a fedora-26-minimal template
> and try to see if I can reduce memory.
> 
> Question: How can I check how much memory really is consumed?
> 
> [user@dom0 ~]$ xl list [...] sys-firewall shows 1.638 MB
> 
> 
> [user@sys-firewall ~]$ free -h totalusedfree
> shared  buff/cache available Mem:   1.4G133M
> 882M2.9M 454M1.1G Swap:  1.0G  0B
> 1.0G
> 
> Does this mean that only 133 MB is currently used by sys-firewall?
> 
> Maybe I made the mistake trusting the numbers in dom0: xl list?

sys-firewall has 1.4G asigned but only 133M used and 454M cached
(probably during boot process). It has 882M free and it (and part of
the cached) will be reduced when other VM needs more memory.

If you want try to stress your system opening disposable VM's to see
if it gets reduced. I have it with default setup (500min 4000max) and
currently it reports:

[user@sys-firewall ~]$ free -h
  totalusedfree  shared  buff/cache
available
Mem:   348M165M 94M2.6M 88M
  48M
Swap:  1.0G 14M1.0G

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEznLCgPSfWTT+LPrmFBMQ2OPtCKUFAlsK3J4ACgkQFBMQ2OPt
CKUI7hAAt6GuZqV5/4J6UsPwv8K+EQcE2huPq3l5f/psY5KfSLVNqIGXS5nW9sT2
Q1/ZsyYyGD59B6w2+O+eu3oLCMluMJoS12lq8ZHUEpoyPsbolX62eGxlS6nDMKL/
Yd1fZE4i4PwBNxvBGOQnCos+p44+lc0kiQDTq4NLPadNXICQoyzsvTY0P0ck+V+m
jeDrueSY4g/n2+33he8NaNNe+kiMm7Eo6huyCeSFMDYk+QWp8wPbHH7s4+wfoP/h
niAHOD9g/bNORWOXEiz7iUSq7T3ZDcsyVyJxs10Avvx/ZYQXcxaxbIYx1ZNIMuOL
M5JDvRw8D0oK2tU6ee9Yal38DnK1eN3RKMNBdlxWpKD1ZwW3TpWMH25YD5OdbnpT
fE1yjvjW3N0clO99dt7CNkjD5m09fO63gqq4KFyXr51hUqu1ZANtzr7Sky55QgZy
OXmqZsbG9dRa5RFN/bUAQs3LK5WhEwzVcIxRyXsiPuGQQk0qFn0rH/7PEKr6/1sq
9vw6QrlDCFEzfxZEL6Vh3KQ0+8dXZACgwFTg/vo/nP7qvuIkFpLeUHNxKluMyLdi
OMPWwNcl7UZN9ojPQg2X2b8qYisw1IgD1UPmPRjm3lmhe5lDlxIFfIyfqJRlfht8
ktxMkRWzfufBG2S5dwCzYbSAKJB/oNd4SKEOowUfWlfDTwpaNHI=
=OKVC
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, 

[qubes-users] Qubes 4.0+Electrum Wallet

2018-05-27 Thread myblackcatisback
Hey Community users,

iam a new Qubes User and i tried to install the Bitcoin Electrum Wallet. 

The Wallet i installed on the Vm Domain Work sucessfully. In the Qubes settings 
I also installed the software bundle. The wallet would be marked as installed 
there. Unfortunately, when I click on the button Launch, Electrum does not 
open. Also a remove is not possible.

What iam doing wrong?

regards and thx in advance

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b21818be-a653-4eda-99a2-bd85f87a5144%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes System Storage Max size

2018-05-27 Thread Reza Naqshbendi

Hi there,

I'm using Qubes 3.2 with recently upgraded fedora-28. For one of my VMs 
I wanted to increase the System Storage max size, I mistyped the figure 
and went beyond what I wanted. I've set it around 100GB! I noticed 
immediately but the problem is that I can't change it back. I can 
increase it even more (!) but I can't reduce it. After the setting I got 
the message that I needed to run resize2fs for the change to be 
implemented really. I didn't but after the reboot I see it still having 
the giant size!


The initial reason for me to increase the system storage size was to be 
able to install GIMP 2.10 through Flatpak. With the default system 
storage size, and in spite of having 15GB in private size of the 
template, I couldn't install the package getting the message that I had 
not enough space left. Space is all over the place, but probably not at 
the right spot.


Thanks


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed4ea587-ec7f-699f-e98c-a030cd172bd7%40posteo.eu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Why does sys-firewall needs so much RAM?

2018-05-27 Thread 799
On 27 May 2018 at 16:13, donoban  wrote:

> [...]
> Also if you want to save more ram with sys-firewal, consider trying:
> https://github.com/talex5/qubes-mirage-firewall


I haven't heard of the "unikernel firewall", thanks.

More explanation found here:
http://roscidus.com/blog/blog/2016/01/01/a-unikernel-firewall-for-qubesos/

The only thing I am struggling with is to install something so crucial like
a firewall which is not coming from the Qubes Team.
For me as a normal user it is hard to decide if qubes-mirage-firewall is
reasonable secure compared to the default sys-firewall.
As far as I understand it is run a docker image (in dom0?).

is there any official feedback regarding the qubes-mirage-firewall and what
do the "Qubes Pro's" think about it.
If it is better, then why hasn't it be integrated in the Qubes Image?

I will rebuild my sys-firewall from a fedora-26-minimal template and try to
see if I can reduce memory.

Question:
How can I check how much memory really is consumed?

[user@dom0 ~]$ xl list
[...]
sys-firewall shows 1.638 MB


[user@sys-firewall ~]$ free -h
  totalusedfree  shared  buff/cache
available
Mem:   1.4G133M882M2.9M454M
1.1G
Swap:  1.0G  0B1.0G

Does this mean that only 133 MB is currently used by sys-firewall?

Maybe I made the mistake trusting the numbers in dom0: xl list?
[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2sR%2BUd%2B8DBmNkFcuJ4bUoiprmM06wykP%3DsBLyuwZqRApw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Why does sys-firewall needs so much RAM?

2018-05-27 Thread awokd
On Sun, May 27, 2018 2:13 pm, donoban wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 05/27/18 16:04, donoban wrote:
>> On 05/27/18 15:31, 799 wrote:
>>> Hello,
>>
>>> as I have only 16GB of RAM available I'd like to keep an eye on
>>> RAM consumption. I am wondering why my sys-firewall always need >
>>> 3 GB of RAM. What is running there that needs so much memory?
>>
>>> My sys-firewall is based on a fedora-minimal package which has
>>> some additional packages installed to work as a firewall AppVM.
>>> memory consumption according to qvm-ls is 3.083 MB after a fresh
>>> restart only having sys-net and sys-usb running.
>>
>>> my sys-usb is showing 284 MB RAM, my sys-net 384 MB
>>
>>
>> 364M here, could you check how much of this RAM is being really
>> used?
>>
>> Also check top and look what process are consuming too much
>> memory.
>>
>
> Also if you want to save more ram with sys-firewal, consider trying:
> https://github.com/talex5/qubes-mirage-firewall

Sys-firewall defaults to 500/4000 initial/max memory with memory balancing
enabled, so it should surrender memory it's not actually using to other
VMs as needed. You could drop max to 500 as well but leave balancing
enabled. That worked for me on 3.2. I've been relying on balancing in 4.0
except during a couple RCs when it wasn't working.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27d4065848b55a539a39d6e9d48b24c4%40elude.in.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Why does sys-firewall needs so much RAM?

2018-05-27 Thread Sergio Matta

> I am wondering why my sys-firewall always need > 3 GB of RAM.
> What is running there that needs so much memory?

my sys-firewall has the original template and uses 2gb.
my personal/work has a cloned template, many installations and uses 3.5 gb.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a816296d-e870-4482-adba-73721dec8cff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] fedora warning

2018-05-27 Thread cooloutac
On Sunday, May 27, 2018 at 8:30:24 AM UTC-4, haaber wrote:
> > dnf warns about failed download (for any reason, including unexpected
> > checksum), but then retry download from another mirror. If all mirrors
> > fails then package installation will fail. Example message for such
> > case:
> > https://github.com/QubesOS/qubes-issues/issues/2945#issuecomment-318877445
> > 
> This is probably be true, but especially on longer download lists 
> impossible to check even for a patient user (and I guess I am not that 
> patient :) The point is: re-downloads are not triggered immediately, and 
> until the requested package arrived (or dl fails), but appear instead 
> "randomly" somewhere later in the output. This happens sometimes several 
> screen pages later. Some of these re-downloads re-fail and the procedure 
> reiterates (I refrain from joining hundreds of lines of actual output 
> here, to deliver proof of that :) My first post was triggered because I 
> overlooked in this chaotic output the important successful download 
> line. This was, I admit, my fault.  However, I still argue that if there 
> is some output, then it should be reasonably verifiable, to my point of 
> view : (almost) unverifiable outputs may also be sent to /dev/null 
> directly. Don't you agree on that? Bernhard

It will prompt you for yes or no.  But I've found that sometimes I constantly 
have an update pending arrow showing in qubes-manager cause it might fail to 
download chrome in fedora template if its repo file not set to https as example 
when using  sys-whonix updatevm. 

But user might not notice this since everything else updates.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d10a058c-c104-43eb-a585-910d95d7e284%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Why does sys-firewall needs so much RAM?

2018-05-27 Thread donoban
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 05/27/18 16:04, donoban wrote:
> On 05/27/18 15:31, 799 wrote:
>> Hello,
> 
>> as I have only 16GB of RAM available I'd like to keep an eye on 
>> RAM consumption. I am wondering why my sys-firewall always need >
>> 3 GB of RAM. What is running there that needs so much memory?
> 
>> My sys-firewall is based on a fedora-minimal package which has 
>> some additional packages installed to work as a firewall AppVM. 
>> memory consumption according to qvm-ls is 3.083 MB after a fresh 
>> restart only having sys-net and sys-usb running.
> 
>> my sys-usb is showing 284 MB RAM, my sys-net 384 MB
> 
> 
> 364M here, could you check how much of this RAM is being really
> used?
> 
> Also check top and look what process are consuming too much
> memory.
> 

Also if you want to save more ram with sys-firewal, consider trying:
https://github.com/talex5/qubes-mirage-firewall
-BEGIN PGP SIGNATURE-
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=QoUp
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe006907-9805-8ab8-b595-46247607ecce%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Teamviewer 13 won't start (QubesOS 3.2)

2018-05-27 Thread 799
Hello,

On 27 May 2018 at 11:22, Others call me jean  wrote:

> On 05/25/2018 05:52 PM, 799 wrote:
> > Hello,
> >
> > Others call me jean  > > schrieb am Fr.,
> > 25. Mai 2018, 14:32:
> >
> > [...]
> > Since Fedora 26 and Teamviewer 13 I can't open teamviewer anymore:
> >
> > [user@fedora-28-dvm ~]$ teamviewer
> >
> > Init...
> > CheckCPU: SSE2 support: yes
> > Checking setup...
> > Launching TeamViewer ...
> > Launching TeamViewer GUI ...
> > [user@fedora-28-dvm ~]$
> >
> > -> no GUI
> >
> Display resolution: 1920x1080
> I don't run other application in the same VM (only a test vm for
> teamviewer)
>

I tried to install & run teamviewer in a fedora-26 based AppVM under Qubes
4 (as I don't have 3.2).
Teamviewer shows the same problem like you are describing unter Qubes 3.2.
Other applications start normally from the same AppVM and I am running a
non high-dpi-resolution.
As such the problem seems to be within the Teamviewer setup.

I found the following link:
https://community.teamviewer.com/t5/Linux/Teamviewer-13-amp-Debian-Stable-9-2-no-GUI/m-p/26156#M1377

from there:

"TeamViewer relies on session info to be made available to the daemon. The
desktop manager (lightdm) is involved in this. TeamViewer needs this
information to allow connecting to the login screen (lightdm) and then
transfer to the actual user session.We focus on that ability in our
development. However, your scenario is also valid of course. Once we get
the (non-installed) TAR package fixed, you might prefer it however. You
should be able to just start it when needed and it should also work if no
desktop manager exists."
I thereof tried to installed lightdm via sudo yum install lightdm but even
after installing it, I got the same problem.

My suggestion is to switch from Teamviewer to AnyDesk, which is working
without any problems under all OSes:
https://anydesk.com/remote-desktop

Companies who are unable/unwilling to provide cross-platform solution
shouldn't be supported.
I have switched from using Teamviewer to AnyDesk and haven't looked back.

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2sYu6v%3D8WXEX_OP%2B-9hXMmVrrgeE-Ma57Uj-dygK_BDJQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Why does sys-firewall needs so much RAM?

2018-05-27 Thread donoban
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 05/27/18 15:31, 799 wrote:
> Hello,
> 
> as I have only 16GB of RAM available I'd like to keep an eye on
> RAM consumption. I am wondering why my sys-firewall always need > 3
> GB of RAM. What is running there that needs so much memory?
> 
> My sys-firewall is based on a fedora-minimal package which has
> some additional packages installed to work as a firewall AppVM. 
> memory consumption according to qvm-ls is 3.083 MB after a fresh
> restart only having sys-net and sys-usb running.
> 
> my sys-usb is showing 284 MB RAM, my sys-net 384 MB
> 

364M here, could you check how much of this RAM is being really used?

Also check top and look what process are consuming too much memory.
-BEGIN PGP SIGNATURE-
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=WXtS
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7a71574e-ab13-5df5-35a8-1daf88c07752%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Inactive keyboard and mouse after updating dom0 | Qubes 4.0

2018-05-27 Thread awokd
On Sun, May 27, 2018 9:59 am, Manual Schmidt wrote:
> Yesterday, I did an update on dom0 and all VMs.
> In my previous configuration I had already a working sys-usb (for USB
> mouse and keyboard).
>
> Now, rebooting Qubes I can access the GRUB Boot Menu (I dont use
> dual/multi boot in GRUB, I switch directly in the BIOS boot menu).
>
> In GRUB advanced options I have access to Xen hyp. 4.8.3, 4.8.3 config and
> 4.8. Keyboard works.
>
> Launching Qubes, I can enter LUKS passphrase with my keyboard. Booting
> routine continues: I can see all VMs (net usb firewall whonix) are booting
> and confirmed with the green OK.
>
> Now, the login window requests passphrase but mouse and keyboard are not
> active anymore.
>
> What happens ?
> How can I access to Qubes again ?
>
> Any help or hint is very welcome!

Try unplugging and reconnecting your keyboard to a different USB port.
Also try a different keyboard- saw someone with a gamer keyboard had a
similar issue. Lastly, if none of that works try booting into Rescue Mode,
editing /var/lib/qubes/qubes.xml, and setting sys-usb's autostart property
to False (and removing the 
lines for good measure), then rebooting. That will hopefully stop sys-usb
from autostarting so you can troubleshoot further, but means dom0 will
have the USB controllers which is less secure.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b7a8a6519b4aca68f4e660d2386787bd%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How to attach CDROM /dev/sr0 to appvm?

2018-05-27 Thread awokd
On Sat, May 26, 2018 9:24 pm, Inqubator wrote:
> On Saturday, January 30, 2016 at 11:25:47 AM UTC+1, Dimitri wrote:
>> I'd like to listen to music but I didn't yet succeed with reading a
>> CDROM in a appvm. Qubes manager offers the option to attach dom:/dev/sr0
>> but the device won't show up in the appvm. (qvm-block tells me that
>> /dev/sr0 is attached as xvdi but there's no xvdi in the vm) Any ideas?
>> Thanks
>
> Same here: I attach my cdrom (sr0) to the domain "personal" but it doesn't
> show up there. qvm-block, run in dom0, shows it as used by "personal" (as
> "xvdi").
>
> Dmesg does not show anything but throws an error, both in dom0 and
> personal: "dmesg: read kernel buffer failed: Operation not permitted".
>
> Ideas?
>
> (BTW: I am using Qubes 4)

I think that is a Xen limitation. It should work as you describe with data
CDs, but for music you might have to take one of these
https://www.qubes-os.org/doc/recording-optical-discs/ approaches.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3d0f36e076e047754fd792d92e27fcb2%40elude.in.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Why does sys-firewall needs so much RAM?

2018-05-27 Thread 799
Hello,

as I have only 16GB of RAM available I'd like to keep an eye on RAM
consumption.
I am wondering why my sys-firewall always need > 3 GB of RAM.
What is running there that needs so much memory?

My sys-firewall is based on a fedora-minimal package which has some
additional packages installed to work as a firewall AppVM.
memory consumption according to qvm-ls is 3.083 MB after a fresh restart
only having sys-net and sys-usb running.

my sys-usb is showing 284 MB RAM, my sys-net 384 MB

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2uuD4wCdYj9Y%2BFqff6e2Ei53BUrkg-zHTDPmryFg%3DFeEQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Is it possible to create a fast clone/copy-on-write Qube?

2018-05-27 Thread awokd
On Sun, May 27, 2018 1:43 am, fsharpn...@gmail.com wrote:

> Btrfs looks interesting, but given I don't fully understand how Qubes 4
> handles storage even in its vanilla configuration, I'd better get some
> more experience with it under my belt before I experiment with a
> non-default file system.

I find the diagram towards the beginning of
https://www.qubes-os.org/news/2017/10/03/core3/ helpful to see how the
pieces fit together.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4b449b56886b78e7f6fbdd77f409e032%40elude.in.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] QubesOS template flavors

2018-05-27 Thread fepitre
Hi all,

As many of you have probably already seen, there are now a few more of template 
flavors available in QubesOS like Fedora and CentOS with XFCE desktop, and 
probably more in the future with LXDE, LXQT, KDE, etc. (like the spins in 
Fedora).

Currently on the repositories, you can download normal and minimal flavors. We 
were wondering if there is a need for providing also other flavors like 
fullyloaded and XFCE instead of building them by yourself.

Best,
Frédéric

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d8f04668-7723-4a57-9caf-579d9f0ed474%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] fedora warning

2018-05-27 Thread haaber

dnf warns about failed download (for any reason, including unexpected
checksum), but then retry download from another mirror. If all mirrors
fails then package installation will fail. Example message for such
case:
https://github.com/QubesOS/qubes-issues/issues/2945#issuecomment-318877445

This is probably be true, but especially on longer download lists 
impossible to check even for a patient user (and I guess I am not that 
patient :) The point is: re-downloads are not triggered immediately, and 
until the requested package arrived (or dl fails), but appear instead 
"randomly" somewhere later in the output. This happens sometimes several 
screen pages later. Some of these re-downloads re-fail and the procedure 
reiterates (I refrain from joining hundreds of lines of actual output 
here, to deliver proof of that :) My first post was triggered because I 
overlooked in this chaotic output the important successful download 
line. This was, I admit, my fault.  However, I still argue that if there 
is some output, then it should be reasonably verifiable, to my point of 
view : (almost) unverifiable outputs may also be sent to /dev/null 
directly. Don't you agree on that? Bernhard


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ae2c7e67-1a2a-ddbd-7225-7def92e72217%40web.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Inactive keyboard and mouse after updating dom0 | Qubes 4.0

2018-05-27 Thread Manual Schmidt
Yesterday, I did an update on dom0 and all VMs.
In my previous configuration I had already a working sys-usb (for USB mouse and 
keyboard).

Now, rebooting Qubes I can access the GRUB Boot Menu (I dont use dual/multi 
boot in GRUB, I switch directly in the BIOS boot menu).

In GRUB advanced options I have access to Xen hyp. 4.8.3, 4.8.3 config and 4.8. 
Keyboard works.

Launching Qubes, I can enter LUKS passphrase with my keyboard. Booting routine 
continues: I can see all VMs (net usb firewall whonix) are booting and 
confirmed with the green OK.

Now, the login window requests passphrase but mouse and keyboard are not active 
anymore.

What happens ?
How can I access to Qubes again ?

Any help or hint is very welcome!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f032a0e8-7a1d-4caf-84c1-12545b5f3c13%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Teamviewer 13 won't start (QubesOS 3.2)

2018-05-27 Thread Others call me jean
On 05/25/2018 05:52 PM, 799 wrote:
> Hello,
> 
> Others call me jean  > schrieb am Fr.,
> 25. Mai 2018, 14:32:
> 
> [...]
> Since Fedora 26 and Teamviewer 13 I can't open teamviewer anymore:
> 
> [user@fedora-28-dvm ~]$ teamviewer
> 
> Init...
> CheckCPU: SSE2 support: yes
> Checking setup...
> Launching TeamViewer ...
> Launching TeamViewer GUI ...
> [user@fedora-28-dvm ~]$
> 
> -> no GUI
> 
> This issue sounds like the same problem, but I don't know how I can get
> the solution:
> https://github.com/QubesOS/qubes-issues/issues/3664
> 
> 
> What display resolution are you running and what about other
> applications in the same AppVM?
> 
> [799]

Display resolution: 1920x1080

I don't run other application in the same VM (only a test vm for teamviewer)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/pedt7p%245vf%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Tuxedo BU1406

2018-05-27 Thread 'Aaron Dough' via qubes-users
‐‐‐ Original Message ‐‐‐
On February 22, 2018 2:13 PM, Aaron Dough  wrote:

> Most things seem to work fine, but Ethernet is still problematic at this 
> moment with Qubes 4.0 RC4, but I'll refrain from posting this here until 4.0 
> becomes stable and I've had more time for testing. (If you are interested 
> have a look at my other post "Qubes 4.0 on Tuxedo BU1406". In essence, for 
> now I don't have the Ethernet-controller attached.)

Qubes 4.0 seems to run well, Ethernet, WiFi, Sound and standby work as 
expected. Webcam wasn't tested yet, but recognized by sys-usb, so it should 
work too.

I installed it in BIOS-mode, and had to enable IOMMU (in the bios: Advanced -> 
Advanced Chipset Control -> VT-d).

During the configuration phase there is a message saying "Unable to reset PCI 
device 000:03:00.1". Click OK and ignore it for the moment, then after the 
initial boot enable strict reset for the ethernet controller (03:00.1) in the 
Devices-settings of sys-net.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/v8FmfbTNEL82iIx2l0N7BvSDvJM_CHqEiaKdc8fIG4IB0Q5MopBngbpH3Zst4piA6gAV4UkH09jbOkyJJicUqZ1B4DXC6n9D313ByLm-QDo%3D%40protonmail.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 4.0 on Tuxedo BU1406

2018-05-27 Thread 'Aaron Dough' via qubes-users
A quick update:

Qubes 4.0 seems to run _much_ more stable than the last RCs. Even the last RC I 
tried froze sometimes in the end, but up to now in 4.0 this didn't happen 
again. Strict reset is only needed for the ethernet controller (03:00:1). 
Suspend works like a charm, as does wifi, ethernet and sound. Cam wasn't tested 
yet. Please update the HCL to state that ethernet works :)

Unfortunately I never heard back from Tuxedo after my last mail. My impression 
after talking to them on the phone is that their claim of great 
linux-compatibility is limited to a handful of distros they offer an 
optimization-script for, which is basically Ubuntu and a few Ubuntu-based ones. 
All other distros (including fedora) are not officially supported, even if they 
seem to run well. From my POV this is not honestly communicated on their 
website.

So I don't think the BU1406 was too bad of a choice for Qubes, as there are not 
too many notebooks out there which offer this kind of customization: You can 
reach (and upgrade) most important components like the two hard drives and both 
ram slots, you can clean the cooling fan, buy a second battery as it is 
external etc. I am disappointed however of Tuxedos understanding of "linux", 
with which they really mean "ubuntu", and if you are looking for the best 
compatibility with Qubes, it's probably not the best choice out there.

Thanks again for all the help,
Aaron

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cwxRyr9jPT4KP5tbQOd8VyT-Rou4-csJ8iXzwoss-s4Pz_A6ChLvJXZOcVyYpBgKlZbMXc8VFWJWDd4DRWBLBxz442SJds7aEsRSyPnW7zU%3D%40protonmail.ch.
For more options, visit https://groups.google.com/d/optout.