Re: [qubes-users] Shredding VM images

2018-08-21 Thread Jean-Philippe Ouellet
On Mon, Aug 20, 2018 at 6:06 PM, Steve Coleman  wrote:
> On 08/20/18 12:49, Chris Laprise wrote:
>>
>> On 08/20/2018 11:34 AM, tierl...@gmail.com wrote:
>>>
>>> What's the most convenient way to wipe these images? (I'm just talking
>>> about individual VM images)
>>
>>
>> To clarify on your first question: Since encryption is protecting the
>> storage pool that contains the disk images and its on an SSD, the only sure
>> way to 'wipe' them in general (not just in the other-VMs-can't see the data
>> sense) is to throw away the encryption passphrase. This makes the entire
>> pool unusable, but if this seems like a problem you can configure more than
>> one storage pool each with its own encryption key+passphrase and store VMs
>> inside them.
>
>
> With an Opal 2.0 SSD you could create a "locking range" for the volatile
> portion of the VM file system, using sedutil-cli then when destroying the VM
> you simply run it with the '--eraseLockingRange' command which essentially
> flips the key bits associated with that region of the SSD. The logic built
> into the drive will ensure the erase of the physical memory mapped into that
> SSD's defined locking range[n].
>
> sedutil-cli
>
>
> --setupLockingRange <0...n>
> --enableLockingRange <0...n>  
>
>
> --disableLockingRange <0...n>  
> --eraseLockingRange <0...n>  

...as implemented by a black box of untrustworthy firmware.

Don't be surprised when this is found to not work as hoped.

I wouldn't recommend relying on it for anything important.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_BwbkAD__s_-qagjYmJCtVDL6btaJubh0cNQXRNUOtgSA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Possible to downgrade to KDE4 in dom0?

2018-08-21 Thread Chris Laprise

On 08/21/2018 04:52 PM, 'Zeko' via qubes-users wrote:

Hello

I've been using Qubes R4.0 for several months now and I'm getting tired 
of Xfce, but KDE 5 is just unworkable on my nvidia GPU (yeah yeah I know 
nvidia and Linux...). Is it possible to downgrade or install KDE4 in 
dom0 somehow?


Ty
Zeko


You'd be better off switching to integrated graphics; much much simpler.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e34b7fa1-6602-d6f4-c187-dd2b8e3b1b58%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0 sluggish feel

2018-08-21 Thread John S.Recdep
On 08/10/2018 12:54 PM,
brendan.hoar-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:
> On Friday, August 10, 2018 at 12:49:05 AM UTC-4, Outback Dingo wrote:
>> On Fri, Aug 10, 2018 at 6:18 AM John S.Recdep wrote:
>>> I blame intel speedstep for everything in your local uefi ,  and dingos :)
>>
>> great but how do we resolve it... its makes Qubes itself really unuseable
> 
> Maybe try this?
> In dom0:
> sudo xenpm set-scaling-governor performance
> 
> Brendan
> 

seems it wants a   , what would that be?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc1522e8-23e6-ea09-5c5f-1d578abff2f9%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Many [kdmflush] on dom0

2018-08-21 Thread donoban
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

I just did 'top' and noticed a pretty high number of process running
at dom0. After trying to determine the cause of this I discovered that
I have:

# ps aux | grep kdmflush | wc
# 157

More than 150 [kdmflush] threads, some there since two days ago.

- From https://askubuntu.com/questions/986211/what-is-kdmflush
- 
kdmflush is used by Device Mapper to process deferred work that it has
queued up from other contexts where doing immediately so would be
problematic.
- 

So having threads from some days ago seems pretty dangerous.

This is probably not fault of Qubes[1], but maybe somebody has some
info about it.

Regards.



[1] https://access.redhat.com/solutions/2544921

-BEGIN PGP SIGNATURE-
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=z4Yl
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1944b553-65d0-b06c-ac30-38873bc1d72b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Possible to downgrade to KDE4 in dom0?

2018-08-21 Thread 'Zeko' via qubes-users
Hello

I've been using Qubes R4.0 for several months now and I'm getting tired of 
Xfce, but KDE 5 is just unworkable on my nvidia GPU (yeah yeah I know nvidia 
and Linux...). Is it possible to downgrade or install KDE4 in dom0 somehow?

Ty
Zeko

Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0Nhtm8X_z8ZtBRMjiBZX1PDO3GJfFe7R-0ff7qBMs6jglsZsnSO_UUPxeojGUpeLRnBSTTLoHHPawEZcsmH4dBBcTCkwYd6vyV-c9HdfjoM%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fresh r4 install qrexec daemon fails to start. Any suggestion?

2018-08-21 Thread code9n
Thanks, you're right.  I remembered I had the same problem when I installed 
3.2.  Disabled wifi adapter in sys-net and it worked.  Same this time.
Probably because I haven't got a wifi card - it's a desktop and I only use an 
ethernet cable.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e36a506a-8506-4596-ab49-128ba3111339%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] offtopic - how do I reply w/o google account

2018-08-21 Thread Alex
Just reply to the message with a standard e-mail client. It will keep
the SMTP headers required to identify the thread you are replying to, so
Google Groups can display it nicely as if it was a forum.

If your client is smart, it can detect it is a mailing list and force
you to only reply to the list e-mail address (i.e. removing the original
sender from the destinations); otherwise, to avoid having the original
sender receiving your answer two times, manually remove anything but
"qubes-users@googlegroups.com". For example, when Thunderbird detects
you are dealing with a mailing list, an additional "Reply to List"
option pops up in the "Reply" menu, and just replies to the list address.

-- 
Alex

On 08/21/2018 09:12 PM, lite...@gmail.com wrote:
> I have been reading the qubes docs and I now understand how to create a new 
> topic in qubes-users with any email address: https://www.qubes-os.org/support
> 
> How I can post a reply to a topic without a google account?
> 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/95617207-7dcd-c126-43d7-2c3c753bcc9e%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] offtopic - how do I reply w/o google account

2018-08-21 Thread litedag
I have been reading the qubes docs and I now understand how to create a new 
topic in qubes-users with any email address: https://www.qubes-os.org/support

How I can post a reply to a topic without a google account?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5cb446fe-aca0-4b2a-8a80-16fcff725792%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Experimenting with Wireguard VPN @Mullvad.net

2018-08-21 Thread litedag
Wireguard works in fedora-28 without kernel mods

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ea27bb8e-96c4-4db0-b2c3-7a033b8cabe7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fresh r4 install qrexec daemon fails to start. Any suggestion?

2018-08-21 Thread 'awokd' via qubes-users
On Tue, August 21, 2018 1:20 pm, code9n wrote:
> Hi,
>
>
> I made r4 installation USBs many times to install r4 over the last couple
> of days - first fedora media writer in Q3.2, then from Windows with rufus
> with several different USB sticks and several different downloads.  The
> downloads always completed properly, like wise writing onto the USBs.

Doesn't sound like an issue with your media.

> But every time I install r4 all goes well until after the reboot part of
> the install when the 'Qubes Install' window comes up.  After this runs ok
> for a while, dealing with fedora 26, debian 9 and whonix templates - it
> gets as far as (something like) 'setting up network' when I get an error
> box with,
>
> [/usr/bin/qvm-start', 'sys-firewall'] failed: stdout:""
> stderr: "Cannot connect to qrexec agent for 60 seconds, see
> /varlog/xen/console/guest-sys-net.log for details

Probably one of your NICs isn't working. Try temporarily disabling your
wifi adapter in UEFI config. If the install works without error, re-enable
it, go to sys-net's settings Device tab, and add the wifi adapter back in.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/784d7d0d1ab2ae96a54582272e65a7ca.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fresh r4 install qrexec daemon fails to start. Any suggestion?

2018-08-21 Thread code9n
Hi,
 
  I made r4 installation USBs many times to install r4 over the last couple of 
days - first fedora media writer in Q3.2, then from Windows with rufus with 
several different USB sticks and several different downloads.  The downloads 
always completed properly, like wise writing onto the USBs.

  But every time I install r4 all goes well until after the reboot part of the 
install when the 'Qubes Install' window comes up.  After this runs ok for a 
while, dealing with fedora 26, debian 9 and whonix templates - it gets as far 
as (something like) 'setting up network' when I get an error box with, 

[/usr/bin/qvm-start', 'sys-firewall'] failed: stdout:""
stderr: "Cannot connect to qrexec agent for 60 seconds, see 
/varlog/xen/console/guest-sys-net.log for details

  Then when I move on and Qubes opens the qrexec daemon won't run when called.  
eg.  Following installation guide, when I get to:

  sudo qubes-dom0-update

  It tries to open sys-firewall and I get pretty much the same error message:

  ERROR: Cannot connect to qrexec agent for 60 seconds, see
  /var/log/xen/console/guest-sys-net.log for details

  (Waiting 60 seconds does nothing more.)

  Has anyone dealt with this or have any suggestions?  Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bf3fdbc8-0335-47e7-b688-9dc7af1f0405%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dracut and a detached LUKS header

2018-08-21 Thread Unman
On Tue, Aug 21, 2018 at 02:23:56AM -0700, tierl...@gmail.com wrote:
> Is this possible? Can dracut be configured to decrypt a LUKS volume with a 
> detached header?
> 

I think that dracut generally wants to have a UUID, and with a detached
header you won't have one. You could use the serial number. 
You'll also need to add a udev attribute for crypto_LUKS, I think.
I recall reading someone who did have dracut working in this setup, but
it needed some changes to the crypt module.
You could always specify the header file and key file in the kernel
command line using cryptdevice and cryptkey options.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180821113121.55cmmptjgr4tntqs%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Dracut and a detached LUKS header

2018-08-21 Thread tierlebu
Is this possible? Can dracut be configured to decrypt a LUKS volume with a 
detached header?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/07646dfa-30bd-426d-87c7-6adaa212962a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] New Foreshadow exploits CPU bug

2018-08-21 Thread 'Leo Gaspard' via qubes-users
On 08/21/2018 11:39 AM, taii...@gmx.com wrote:
> SGX is another ME service slash intel marketing gimmick invented for DRM
> not security.
> 
> If the person who purchased the computer can't examine the VM's running
> on it then they are not owning it simply licensing it which is why SGX
> is a bad technology and people shouldn't buy x86.
Consider you want to deploy your things in the cloud, eg. because it's
less expensive. Then I guess you would actually like to not have to
trust the cloud provider :)

You still have to trust Intel for actually doing what they promise, but
you have to trust the processor manufacturer at some point anyway.

Not saying SGX actually meets its promises, though, just reacting to
your second paragraph. There are use cases for having the person who
owns a computer not being able to examine VM's running on it. Whether
you want or not to use or have them is a different question.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b3d6a5d2-215b-ac7e-28b5-d50b01ff77b3%40leo.gaspard.ninja.
For more options, visit https://groups.google.com/d/optout.