[qubes-users] Re: system doesn't boot after update

2018-10-28 Thread joeh9617
Me too, I did qvm-dom0-update yesterday and when it tried to re-boot it got in 
a boot loop, and I'll re-type the messages here:
-
Xen 4.8.4 (c/s) EFI loader
Using configuration file 'xen.cfg'
vmlinux-4.14.74-1.pvops.qubes.x86_64: 0x495ae000-0x49b8db20
initramfs-4.14.74-1.pvops.qubes.x86_64.img: 
0x49002000-0x495ae000
0x:0x01:0x00.0x0: ROM: 0x19400 bytes at 0x5302e018
0x:0x00:0x02.0x0: ROM: 0x1 bytes at 0x5300c018
-
[0.179397] ACPI Error: [\_SB_.PCIO.XHC_.?HUB.HS11] Namespace lookup failure
 AE-NOT_FOUND (20170720/dswload-210)
[0.179406] ACPI Exception: AE_NOT_FOUND, During name lookup/catalog 
(20170720/psobject-252)
[0.179500] ACPI Exception: AE_NOT_FOUND, (SSDT:ProjSalt) while loading 
table (20170728/tbxfload-220)
[0.188039] ACPI Error: 1 table load failures, 11 successful 
(20170728/tbxflad-246)
[0.508657] Initramfs unpacking failed: read error
[2.762742] Kernel panic 0 not syncing: UFS: Unable to mount root fs on 
unknown-block(0.0)
[2.762769] CPU: Z PID: 1 Comm: swapper/0 Not tainted 
4.1474-1.pvops.qubes.x86_64 #1
[2.762790] Hardware name: LENOVO, BIOS N1TET41W (1.15) 10/20/2017
[2.762813] Call Trace:
[2.762826]  dump_stack+0x5c/0x85
[2.762839]  panic+0xc4/0x252
[2.762851]  mount_block_root+0x35b/0x52c
[2.762865]  ? do_early_param+0x16e/0x16e
[2.762879]  prepare_namespace+0x278/0x245
[2.762892]  ? do_early_param+0x16e/0x16e
[2.762905]  kernel_init_freeable+0x2c8/0x324
[2.762920]  ? rest_init+0xb0/0xb0
[2.762932]  kernel_init+0xa/0x101
[2.762945]  ret_from_fork+0x35/0x40
[2.762964] Kernel Offset: disabled


I anyone could help me get my qubes running again I'd be much obliged.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17aa1c5d-b5b8-42fe-8144-f79fcf1f895f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to connect Tenmplate VM to the internet

2018-10-28 Thread unman
On Sun, Oct 28, 2018 at 10:58:21PM +0100, 799 wrote:
> Hello,
> 
> I am currently building a special Storage VM Template which needs to
> download specific packages and also GIT repositories.
> Therefor I'd like to allow internet access for the template VM.
> The NetVM is set to sys-firewall and access to the internet is allowed
> under Qubes Settings.
> 
> But the Template VM is unable to access the internet.
> What needs to be done, so that I can connect the Template VM?
> 
> - O

Nothing further needs to be done. This should "just work"(TM).

If it isnt working for you then you should do standard troubleshooting-
Check that Template has IP address set (you shouldnt need to set this
manually), and it is consistent with sys-firewall. 
Check the route.
Check that /etc/resolv.conf looks proper.
Check that traffic is arriving at sys-firewall and that rules are set
correctly there.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181029011333.rqxmustqbp6247v5%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes Template with optional, prompted full internal disk enccryption for new AppVMs?

2018-10-28 Thread 'awokd' via qubes-users




Teqleez Motley:

Hi all,
I would like to make a Qubes Template (Debian/Fedora) which upon creation of new 
AppVMs, would offer to encrypt the /home/ folders.

Not sure how to approach/achieve this. Any pointers most appreciated.

For comparison:
Something of the type that Tails offers for Persistent volumes, but without all 
the Tails restrictions:
Just with a variant of the normal Fedora-28 / Debian-9 base.



Not sure you can, but see the following for more information about 
scripting etc:

https://www.qubes-os.org/doc/templates/#important-notes-r40
https://www.qubes-os.org/doc/config-files/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/73d8bc7a-c2b5-2bb7-cba8-1c631b70ff7d%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to connect Tenmplate VM to the internet

2018-10-28 Thread 'awokd' via qubes-users

799:

Hello,

I am currently building a special Storage VM Template which needs to
download specific packages and also GIT repositories.
Therefor I'd like to allow internet access for the template VM.
The NetVM is set to sys-firewall and access to the internet is allowed
under Qubes Settings.

But the Template VM is unable to access the internet.
What needs to be done, so that I can connect the Template VM?


I think you also need to manually configure networking if you really 
want to do that.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/161154b1-1349-7ff0-223a-9ad9835717e9%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] system doesn't boot after update

2018-10-28 Thread 'awokd' via qubes-users




Jovani:

Greetings all,

I have recently updated dom0 and fedora template and now cannot load the system

Even old kernels are not loading

System shows qubes screen, after selecting the kernel it is asking for luks 
password and then fail

I tried to regenrate initframe and regenerate grub but still not loading

Red errors I am getting

Fsck failed with error 4
Failed to start file system check on /Dec/mapper/luks-**


Does it really say "Dec" there, or is that a typo? If it's really "Dec", 
find where it's trying to load that and change it to "dev" instead.



Dependency failed for /sysroot
Dependency failed for initrd root file system
Dependency failed for reload configuration from the real root


Please help

Thanks



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50566f04-07ad-f357-3b4e-3bba88e04eab%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Motherboard recommendations

2018-10-28 Thread Aaron Gray
Hi,

I am looking for Motherboard recommendations for Qubes, either DD3 or DDR4 
based, either Intel or AMD based.

Many thanks in advance,

Aaron

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82a8234b-1754-4827-8986-8b24aac9710e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to connect Tenmplate VM to the internet

2018-10-28 Thread 799
Hello,

I am currently building a special Storage VM Template which needs to
download specific packages and also GIT repositories.
Therefor I'd like to allow internet access for the template VM.
The NetVM is set to sys-firewall and access to the internet is allowed
under Qubes Settings.

But the Template VM is unable to access the internet.
What needs to be done, so that I can connect the Template VM?

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2sa4Jdv9iUoCxdxvtz__vK6-1_WK0wG2eUe00oD0QL54g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Replacement for Lenovo x230 (coreboot'able + high res)

2018-10-28 Thread brendan . hoar
On Sunday, October 28, 2018 at 5:21:06 PM UTC-4, brenda...@gmail.com wrote:
> I'm fairly certain I've heard of x230s with FHD intalled by 51nb.
> 
> Google says... http://www.cnmod.cn/x330/

My bad, that's a new  display *and* more recent, custom motherboard in the old 
shell.

B

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f95234a-27e7-429c-a770-d082e96766a2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Replacement for Lenovo x230 (coreboot'able + high res)

2018-10-28 Thread brendan . hoar
On Sunday, October 28, 2018 at 3:25:42 PM UTC-4, 799 wrote:
> Hello all,

> The W5x0 series is to big for me as I need something more mobile and because 
> I own already a W540 (running Qubes with a stock rom/not coreboot'able).
> The T4x0 series was what I was looking for, but they also don't offer Full HD 
> resolution.
> 
> 
> Holger posted me a link to the most interesting solution which is installing 
> a Full HD Display into the X230 which looks like the best solution to me.
> 
> 
> https://forum.thinkpads.com/viewtopic.php?t=122640
> 
> The process is well described but it seems that it's more targeted to 
> hardware hackers (soldering skills).
> 
> 
> I am wondering why no one is offering this mod as a service as this would 
> create the perfect Qubes Laptop (in my opinion).

I'm fairly certain I've heard of x230s with FHD intalled by 51nb.

Google says... http://www.cnmod.cn/x330/

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a257dcdd-220f-4477-ba51-3a9ba0379f91%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] My farewell to Qubes OS!

2018-10-28 Thread HawKing
On Thu, 25 Oct 2018 12:21:44 +0200
Joanna Rutkowska  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> Hello Qubes devs and users!
> 
> It's been nearly 9 years[*] since I sent the first internal email
> within ITL to Rafał Wojtczuk and Alex Tereshkin with the original idea
> for making Qubes OS. Shortly after this, we started drafting the
> original architecture and writing some early PoC code...
> 
> Today, I've made an announcement I'm switching focus to another area
> of work and joining the Golem Project as a Chief {Strategy, Security}
> Officer:
> 
> https://www.qubes-os.org/news/2018/10/25/the-next-chapter/
> 
> https://blog.golemproject.net/joanna-rutkowska-joins-golem-as-chief-strategy-security-officer-13f12f0c11c0
> 
> I'd like to thank all the people who made Qubes OS possible, which
> includes: the whole ITL team, all the community contributors, and, of
> course, all the Qubes OS users!
> 
> Qubes OS will continue under the lead of Marek Marczykowski-Górecki,
> who have been a de-facto lead for all the day-to-day development for
> quite some time already!
> 
> Thanks, Marek! Thank you, all!
> 
> Cheers,
> joanna.
> 
> [*] FWIW, the exact date was November 11th, 2009.
> -BEGIN PGP SIGNATURE-
> 
> iQIzBAEBCAAdFiEEtR14vbBDAuE0X2Ly1F2dklVl1NIFAlvRmTYACgkQ1F2dklVl
> 1NIiDxAAtwm3qM1Rq3ow67q5bLu+1VnuM0NQrN/crLu+FDOdaa9XNzSsdWz97UoN
> 2VsRO+RICNttrR7MAaWSgTXtBKOMuSXYc7s5r7VVFtx4qW0xyRaxbr7vBqJRDM5n
> 6eCLdjAFf1Xh8Ju5eDnBJGx41EIywO4Jba3z9+Ww2xyBycQAYY22yRQf6ANlWfwW
> XE0HgBuaJtAEReJc7qpzlG/iwLa/de1eqVa9kOS4HrESllE9wP7qXLrnmwr/yH19
> 2twe3QVS29uVYzPOam6PiCg1PN4AjsYKvihy/Tap11bYfdr1L8OjmE9+KrDPFPek
> MaWlkl/OoiFZsQHhj1somMfFNKH82oTW3zIAZCmmOZgQHgt6T1KDzjehFTASJeFp
> WNmvmowDYfcVYEdjEXQKP78mpxlYz6fChr/A4x3TX64+KsltdZA7l266OMfpXvL4
> Mja4SUvEKqLbyEQxCaDnOwm4cV7k/dHtOXE5fREzUfi+YVu14yVNkPRxg9UpgtCa
> sV/PY7AwOe4JqxV+8VlWWmX0amNf8ZEtz51F2eH6NZZYGaRtTXxTKW6Aad0XHg7p
> 8m2gvH8YWnGPX7ckofcpL7NHR5B6EauXoHKeQZgV9Ix0NQf2CNvBv5ZxZ7IYannH
> mJEcpgRYMtG5b8+x05hBCb7CP5T/tQpt2r5jIK3eqwEzcPY//H8=
> =1ZqA
> -END PGP SIGNATURE-

With only meager success in remote trustless computation (using
homomorphic encryption for example), a system that enables a reasonably
secure, robust, trust-less or verifiable design for general purpose
software and infrastructure actually running in the "cloud" is, in my
opinion, perhaps the hardest and most impactful problem in computer
security currently. If anyone can solve a problem like that in a
realistic way, leave it to Joanna!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6F2075AC-069C-4C45-864F-B891D552CFE4%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Replacement for Lenovo x230 (coreboot'able + high res)

2018-10-28 Thread 799
Hello all,

taii...@gmx.com  schrieb am Sa., 27. Okt. 2018, 19:26:

> Get a T430 (get a better kb from *20 series) or a W520 and install an
> ivy-bridge CPU and a screen upgrade if you can't find one that comes
> with the res you want


The W5x0 series is to big for me as I need something more mobile and
because I own already a W540 (running Qubes with a stock rom/not
coreboot'able).
The T4x0 series was what I was looking for, but they also don't offer Full
HD resolution.

Holger posted me a link to the most interesting solution which is
installing a Full HD Display into the X230 which looks like the best
solution to me.

https://forum.thinkpads.com/viewtopic.php?t=122640
The process is well described but it seems that it's more targeted to
hardware hackers (soldering skills).

I am wondering why no one is offering this mod as a service as this would
create the perfect Qubes Laptop (in my opinion).

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2sTqMFfD5EYyPRLbF4dg9bxNsW1Zn9quJPOwtj3hb%2BB0w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL entry Lenovo P52 (20M9001NGE)

2018-10-28 Thread Achim Patzner
zes).


3) The Intel NIC needs the usual tweaks for being attached to sys-net.

4) The system is as annoying as all HiDPI devices with Qubes. Only more 
so as it is a 15.6" display at 286 DPI.


Some people claim that a kernel built from last week's bleeding edge 
resources and Intel DRM do at least not crash when lshw is touching it 
and it might even run X. So there is some hope for it. I need the nVidia 
as coprocessor to hand off to some hard number crunching off to it so I 
intend to have the GUI on the Intel GPU. I could use the efifb driver 
but I would have to spend days on the X configuration and on 3840*2160 
it would be slow as hell.



Unrelated to the system itself: The Qubes setup part of the installer 
should be less rigid if something fails during its run. It is assigning 
all network interfaces it can put its hands on to sys-net and then fails 
on bringing it up because of the usual PCI resetting problem with the 
Intel NIC in current Lenovo notebooks (my solution was going to a 
terminal and write an endless loop of "qvm-pci detach sys-net 
" running in the background during the installation). It fails 
with sys-usb if there is a second (or third) USB controller present 
during installation. If you're stupid enough to have it restart the 
setup part it is missing the image files of the template VMs during VM 
setup AND erases them from the Qubes installation (which means your 
template VMs will consist of empty directories).


Oh and should you dare to want to do your own partitioning (I'm using 
btrfs for /), have multiple disks and need to modify the /boot/efi 
partition (i. e. because you do not want to put it on the sda the 
installer chose when you created it) the installation will not continue. 
Using pre-made partitions didn't work either (Fix: Let the installer 
force a /boot/efi on you and move the contents to the intended location 
later.)



Achim

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/em44ee8a6c-b707-403d-885e-f06a044d689e%40sir-face.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-LENOVO-20M9001NGE-20181028-160022.yml
Description: Binary data


[qubes-users] The state of the HiDPI display support in Qubes

2018-10-28 Thread Achim Patzner

Hi!

As I'm trying to set up a Lenovo P52 with HiDPI display (and external 
nVidia GPU -- don't buy one without right now) I'm close to getting rid 
of it completely and install Windows on it...


1) Xfce is not bringing in a single HiDPI theme and the window 
decorations are looking extremely awful unless you find one of the 
scarce themes adapted for this. It would be nice to have at least one 
Theme suitable for an environment like this n the standard distribution. 
At least it is xfce -- setting resolution (and some other things) in 
.Xresources (or the default file in /etc) is solving the worst problems 
easily.


2) The Fedora VMs delivered with Qubes right now are still fully Gnome 
based, so just copying an appropriate Xresources is not sufficient 
(luckily someone created an fc28-xfce template VM; could we please have 
that as part of the standard distribution?) and one has to jump through 
hoops to set up the template correctly.


Could whoever is doing the VM startup scripts right now (still Marek?) 
consider expanding the X setup scripting to not only getting the screen 
size in pixels into the virtual X server but also the correct resolution 
and add a very late script that will, independently of the virtual 
session manager, move a copy of the X resource db data from Dom0 into 
the VM (in the current fedora template this is messed up by 
gsd-xsettings which is merrily overwriting what came from Xresources via 
xinitrc).


Petition: Take the developers' Lenovo laptops and replace them with 
generation 6 HiDPI X1 (and to completely annoy kernel developers they 
have to be using P52 or similar systems).



Achim

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/em98d84865-1e63-45f4-bf99-bb2b2e5a317d%40sir-face.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] system doesn't boot after update

2018-10-28 Thread Jovani
Greetings all,

I have recently updated dom0 and fedora template and now cannot load the system

Even old kernels are not loading 

System shows qubes screen, after selecting the kernel it is asking for luks 
password and then fail

I tried to regenrate initframe and regenerate grub but still not loading 

Red errors I am getting 

Fsck failed with error 4
Failed to start file system check on /Dec/mapper/luks-**
Dependency failed for /sysroot
Dependency failed for initrd root file system 
Dependency failed for reload configuration from the real root


Please help

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ce00e143-7a08-47ac-9eb0-b468dd54271f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] My farewell to Qubes OS!

2018-10-28 Thread David Hobach

On 10/27/18 7:26 PM, taii...@gmx.com wrote:

No!! comp-sci angel D: you are IMO the best computer security
person on the planet and now you leave us :'[


I wasn't too happy neither to see the presumably main Qubes visionary 
leave. Anyway I look forward to hear about new interesting topics from 
Joanna in the future and thank her for everything she's done in the past 
for the Qubes project!


And Marek has simply done an absolutely awesome job for the Qubes 
project in the past so that I bet this project will prosper further.



You can't trust the "cloud" - it will always be someone elses computer

SGX etc is DRM and a proprietary wintel technology that shouldn't be
trusted.


I'm also still waiting for someone to explain to me why I should trust 
some chip manufacturers in the cloud more than I do on my desktop, but 
that may well become one of these interesting topics...


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6d81711a-02cc-80d5-3fbf-8323ab14e353%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.


smime.p7s
Description: S/MIME Cryptographic Signature


Re: [qubes-users] Re: Replacement for Lenovo x230 (coreboot'able + high res)

2018-10-28 Thread David Hobach

On 10/27/18 12:42 PM, superriku11 wrote:

All of the **30 series ThinkPads were supported by Coreboot, last I checked.

The T430 has a 14-inch screen, but not FHD resolution like you would like. 
There is a screen replacement that some people have done to upgrade it to 1920 
x 1080.
http://www.thinkwiki.org/wiki/Replacing_T430_screen_with_a_better_one

If you'd rather not replace the screen, there's also a ThinkPad W530, which has 
a 15-inch screen, and you can get in OEM configuration with a 1920 x 1080 
resolution.


Sometimes you'll also find T530s with FHD, but they'll require some 
tinkering for coreboot (as usual I guess) and you'll want to have an 
IOMMU capable quad core for Qubes (which is less common).


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/25664eb6-48ae-46b6-7d77-75f79e5d563a%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.


smime.p7s
Description: S/MIME Cryptographic Signature


[qubes-users] Day before yesterday update

2018-10-28 Thread 'Andrzej Andrzej' via qubes-users
How do you think? Any action is needed from the user?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20016321.71457.1540726148105%40ichabod.co-bxl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Thinkpad X1 Carbon Gen6 suspend/resume issues

2018-10-28 Thread tfm853 via qubes-users
On Sunday, October 28, 2018 at 11:43:58 AM UTC+1, hron wrote:
> O
> > > 
> > > BIOS v1.31, Hyperthreading on in BIOS
> > > 
> > > 
> > > Hyperthreading disable documented here: 
> > > https://groups.google.com/forum/m/#!topic/qubes-announce/JEtRYPmG-pAl
> > > 
> > > 
> > > Cannot replicate using Arch with sway or Xorg 1.20.3, 4.18.16-ck kernel.  
> > 
> > Thanks alot! This is very helpful.
> > 
> > I re-enabled hyperthreading using the boot option 'smt=on'. All the CPU 
> > related issues are gone then, including the increased heat.
> > 
> > I hope the option to do that will be retained in the future. Hardened 
> > security is a great thing, but actually my prime reason for using Qubes is 
> > its superior organisation and ease to use.
> where exactly did you put this smt=on option in? 
> thanks 
> ron

In `/boot/efi/EFI/qubes/xen.cfg`. Look here 
https://www.qubes-os.org/news/2018/09/02/qsb-43/ for instructions and caveats.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/78e7e981-b404-4afe-852f-a2d6590526cd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Thinkpad X1 Carbon Gen6 suspend/resume issues

2018-10-28 Thread ron
O
> > 
> > BIOS v1.31, Hyperthreading on in BIOS
> > 
> > 
> > Hyperthreading disable documented here: 
> > https://groups.google.com/forum/m/#!topic/qubes-announce/JEtRYPmG-pAl
> > 
> > 
> > Cannot replicate using Arch with sway or Xorg 1.20.3, 4.18.16-ck kernel.  
> 
> Thanks alot! This is very helpful.
> 
> I re-enabled hyperthreading using the boot option 'smt=on'. All the CPU 
> related issues are gone then, including the increased heat.
> 
> I hope the option to do that will be retained in the future. Hardened 
> security is a great thing, but actually my prime reason for using Qubes is 
> its superior organisation and ease to use.
where exactly did you put this smt=on option in? 
thanks 
ron
> 
> Although I expect the heat issue to be a bug of some kind.
> 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181028114353.06325afb%40vm-stargate1.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] My farewell to Qubes OS!

2018-10-28 Thread bm-2ctjsegdfzqngqwuqjswro6jrwlc9b3mn3
On Thu, 25 Oct 2018 12:21:44 +0200
Joanna Rutkowska  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> Hello Qubes devs and users!
> 
> It's been nearly 9 years[*] since I sent the first internal email
> within ITL to Rafał Wojtczuk and Alex Tereshkin with the original idea
> for making Qubes OS. Shortly after this, we started drafting the
> original architecture and writing some early PoC code...
> 
> Today, I've made an announcement I'm switching focus to another area
> of work and joining the Golem Project as a Chief {Strategy, Security}
> Officer:
> 
> https://www.qubes-os.org/news/2018/10/25/the-next-chapter/
> 
> https://blog.golemproject.net/joanna-rutkowska-joins-golem-as-chief-strategy-security-officer-13f12f0c11c0
> 
> I'd like to thank all the people who made Qubes OS possible, which
> includes: the whole ITL team, all the community contributors, and, of
> course, all the Qubes OS users!
> 
> Qubes OS will continue under the lead of Marek Marczykowski-Górecki,
> who have been a de-facto lead for all the day-to-day development for
> quite some time already!
> 
> Thanks, Marek! Thank you, all!
> 
> Cheers,
> joanna.
> 
> [*] FWIW, the exact date was November 11th, 2009.
> -BEGIN PGP SIGNATURE-
> 
> iQIzBAEBCAAdFiEEtR14vbBDAuE0X2Ly1F2dklVl1NIFAlvRmTYACgkQ1F2dklVl
> 1NIiDxAAtwm3qM1Rq3ow67q5bLu+1VnuM0NQrN/crLu+FDOdaa9XNzSsdWz97UoN
> 2VsRO+RICNttrR7MAaWSgTXtBKOMuSXYc7s5r7VVFtx4qW0xyRaxbr7vBqJRDM5n
> 6eCLdjAFf1Xh8Ju5eDnBJGx41EIywO4Jba3z9+Ww2xyBycQAYY22yRQf6ANlWfwW
> XE0HgBuaJtAEReJc7qpzlG/iwLa/de1eqVa9kOS4HrESllE9wP7qXLrnmwr/yH19
> 2twe3QVS29uVYzPOam6PiCg1PN4AjsYKvihy/Tap11bYfdr1L8OjmE9+KrDPFPek
> MaWlkl/OoiFZsQHhj1somMfFNKH82oTW3zIAZCmmOZgQHgt6T1KDzjehFTASJeFp
> WNmvmowDYfcVYEdjEXQKP78mpxlYz6fChr/A4x3TX64+KsltdZA7l266OMfpXvL4
> Mja4SUvEKqLbyEQxCaDnOwm4cV7k/dHtOXE5fREzUfi+YVu14yVNkPRxg9UpgtCa
> sV/PY7AwOe4JqxV+8VlWWmX0amNf8ZEtz51F2eH6NZZYGaRtTXxTKW6Aad0XHg7p
> 8m2gvH8YWnGPX7ckofcpL7NHR5B6EauXoHKeQZgV9Ix0NQf2CNvBv5ZxZ7IYannH
> mJEcpgRYMtG5b8+x05hBCb7CP5T/tQpt2r5jIK3eqwEzcPY//H8=
> =1ZqA
> -END PGP SIGNATURE-
> 


With only meager success in remote trustless computation (using
homomorphic encryption for example), a system that enables a reasonably
secure, robust, trust-less or verifiable design for general purpose
software and infrastructure actually running in the "cloud" is, in my
opinion, perhaps the hardest and most impactful problem in computer
security currently. If anyone can solve a problem like that in a
realistic way, leave it to Joanna!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9E84DBCB-699D-499D-A286-DDEA6F552058%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.