[qubes-users] Re: TOR browser updates.

2018-11-19 Thread 'Антон Чехов' via qubes-users
On Tuesday, November 20, 2018 at 3:39:24 AM UTC+1, William Fisher wrote:
> How do I update the TOR browsers at the Template VM level? I've updated TOR 
> at the APP level but it doesn't stay updated.

I updated my template-vm (whonix-gw-14, whonix-ws-14 and sys-whonix) this week 
via console (sudo apt-get update && sudo apt-get dist-upgrade) and the latest 
TOR browser was downloaded. 

I started a disposable whonix-vm and checked (help -> about tor browser) the 
version and it was 8.0.3 which should be the latest.
Starting anon-whonix-vm was not updated (8.0) but tor-browser did download the 
latest version upon opening it (help -> about tor browser) and it stays updated.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fff3de14-ce48-4f6e-9f40-07cf7bf3f427%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] TOR browser updates.

2018-11-19 Thread William Fisher
How do I update the TOR browsers at the Template VM level? I've updated TOR at 
the APP level but it doesn't stay updated.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/472dd504-1403-4e90-a812-bd72828dc671%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Help setting up internet connection via wireless netgear internet adapter without internet

2018-11-19 Thread 'Ryan Carter' via qubes-users


Hi I am having troubles setting up a internet connection via a wireless netgear 
internet adapter. 
Some problems I encountered:
- I believe that I have to install installation disc software via a cd/rom 
drive just like setting up on any other OS without a prior internet connection
- So I tried attaching the cd/rom to sys-net vm by clicking yellow device 
button in top right corner and it was successful although when I went into the 
sys-net vm devices to add it it wasn’t there. I also tried doing it manually 
via the terminal but had no such luck maybe I did something wrong there not 
sure though. 
- Also I tried inserting the wireless adapter w/o the installation disc first 
and it’s not registering at all on devices, but I assume that is b/c the 
software for it hasn’t been downloaded via cd hence my problem

I hope this was informative enough for a proper solution much thanks.
Sent from my iPhone

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9BE4D6C2-7D85-42F1-8708-0CF746905DBE%40icloud.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL report

2018-11-19 Thread haaber
Here is my HCL report. My third install attempt was the good one : UEFI 
boot works, but TPM had to be disabled in BIOS (weird: one has to switch 
TPM on to be able to see a "disable" button :)all the Best, Bernhard


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9edbfce5-d053-5807-126a-58f92ede485e%40web.de.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Dell_Inc_-Latitude_7390-20181119-225448.yml
Description: application/yaml


Re: [qubes-users] Re: debian-based templates (and whonix) ignore dom0 keyboard language in 4.0.1 but not 4.0

2018-11-19 Thread ryangreen
ryan...@tuta.io :
> I'm pretty sure this is a bug (linked below), but am posting here just in 
> case there might be something I am missing:
> https://github.com/QubesOS/updates-status/issues/791 
>  
>  >
> I set the language/keymap settings via localectl as recommended, as well as 
> in the VMs themselves, but the debian-9 and whonix VMs default to english 
> querty still. Removing those and installing the 4.0 templates in the 4.0.1 
> host demonstrates expected inheritance of settings as it should. I could not 
> even find a way besides a startup script to set keyboard settings in the VMs 
> (even /etc/default/keyboard in the VMs was ignored by the templates). 
> Fedora-29 templates seem to be fine. Any ideas?
>
> Thanks!
> Ryan
>

Every time I start a terminal.

Example:

setxkbmap de

Syntax:

setxkbmap yourkeymap

Likely possible to automate using /rw/config/rc.local, /etc/profile.d/,
/etc/X11/Xsession.d/, systemd or otherwise.



setxkbmap in the /rw/config/rc.local did not have an impact in the template or 
appvms. This is surprising because I thought that was its purpose. The script 
was executable, and the same that worked below.

Creating /etc/profile.dl/keymap.sh in the template did work, and is inherited 
by the appvms and dispvms of the template. Danke!

Though this temporary fix works well enough, I'm curious what the changelog 
between 4.0.0 and 4.0.1  is that produced such behavior, and am assuming it 
must be something small.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LRhx6VD--3-1%40tuta.io.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: debian-based templates (and whonix) ignore dom0 keyboard language in 4.0.1 but not 4.0

2018-11-19 Thread ryangreen
 2:35 AM (12 hours ago) 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LRhvpiA--3-1%40tuta.io.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes: Unable to connect to VPN

2018-11-19 Thread Chris Laprise

On 11/19/2018 03:01 PM, Otto Kratik wrote:

On Monday, November 19, 2018 at 12:27:40 PM UTC-5, Chris Laprise wrote:

It could be as simple as editing your /etc/resolv.conf so it contains
your VPN provider's DNS server (or other DNS server that you prefer)
instead of the Qubes internal routing addresses.


I'll give this a try, thanks. What mystifies me though is that I still have 
Qubes 3.2 installed on an older laptop and can confirm that on that version, 
none of these extra config steps are needed. I can activate and deactivate the 
VPN connection at will on the fly from an AppVM terminal, and it works 
flawlessly every time. Run openvpn and my IP address changes to the provider as 
expected. Hit ctrl-c to terminate the connection, and it goes back to my 
regular ISP-provided address as expected. Ideally I'd actually like to have 
this ability it switch it on and off as many times as desired during any given 
session, but maybe that's no longer possible in Qubes 4.


Qubes 4 networking is re-written and functions somewhat differently than 
Qubes 3.x.




Also, I tried the instructions here:

https://github.com/tasket/Qubes-vpn-support/

..and they did not work. Everything seems to go okay, but after 
copying/installing/linking everything as directed and then shutting down and restarting 
the ProxyVM, it pops up the message "Ready to start link", and then just 
repeatedly does that every 10 seconds or so. The link never actually goes up. Problem 
isn't with the provider's .ovpn config file, since it works fine on Qubes 3.2 as well as 
another mainstream Linux distro, with no issues at all.

Not sure if it's significant, but the service "vpn-handler-openvpn" does not 
appear in the dropdown list of available services in the ProxyVM's settings screen, even 
though the template on which it is based (Debian 9) most definitely has Openvpn installed 
on it. I typed that service name in manually and it accepted it, but it also accepts any 
garbage text entered as well, so no idea whether it's actually functioning properly or 
not.


All that's required for that step is that you type "vpn-handler-openvpn" 
correctly then click '+' and OK. You can go back to the list to make 
sure it is there and checked.


Usually when "Ready to start" appears and there is no connection it 
means there is an auth problem. The username or password may have been 
mistyped, for instance. You can run 'sudo /usr/lib/qubes/qubes-vpn-setup 
--config' to re-enter it.


To see what is happening check the log with 'sudo 
/usr/lib/qubes/qubes-vpn-setup --config'.




I was also admittedly a bit confused about whether I needed to separately 
install the qubes-tunnel package first, but the instructions didn't seem to 
explicitly require it so I did not. Other than that, I followed them to the 
letter but cannot get the link up.


qubes-tunnel is an alternate (re-named) version of Qubes-vpn-support; 
use one or the other.



--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ba7c7865-7b83-6f24-8484-41518dd5f19a%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qubes-open fails

2018-11-19 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 11/15/18 4:03 PM, Sven Semmler wrote:
> What could cause this? I haven't actually changed anything other 
> than running regular updates on the template. As far as I can see 
> qubes-open is a wrapper script around xdg-open setting some 
> environment variables.

I restored the template from backup and the issue is gone. My best bet
is that it was me running dnf autoremove and saying "yes" to something
that I shouldn't have.

/Sven
-BEGIN PGP SIGNATURE-
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=0rQZ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/15663674-66e0-2239-8b52-a26769de49fc%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes: Unable to connect to VPN

2018-11-19 Thread Otto Kratik
On Monday, November 19, 2018 at 12:27:40 PM UTC-5, Chris Laprise wrote:
> It could be as simple as editing your /etc/resolv.conf so it contains 
> your VPN provider's DNS server (or other DNS server that you prefer) 
> instead of the Qubes internal routing addresses.

I'll give this a try, thanks. What mystifies me though is that I still have 
Qubes 3.2 installed on an older laptop and can confirm that on that version, 
none of these extra config steps are needed. I can activate and deactivate the 
VPN connection at will on the fly from an AppVM terminal, and it works 
flawlessly every time. Run openvpn and my IP address changes to the provider as 
expected. Hit ctrl-c to terminate the connection, and it goes back to my 
regular ISP-provided address as expected. Ideally I'd actually like to have 
this ability it switch it on and off as many times as desired during any given 
session, but maybe that's no longer possible in Qubes 4.

Also, I tried the instructions here:

https://github.com/tasket/Qubes-vpn-support/

..and they did not work. Everything seems to go okay, but after 
copying/installing/linking everything as directed and then shutting down and 
restarting the ProxyVM, it pops up the message "Ready to start link", and then 
just repeatedly does that every 10 seconds or so. The link never actually goes 
up. Problem isn't with the provider's .ovpn config file, since it works fine on 
Qubes 3.2 as well as another mainstream Linux distro, with no issues at all.

Not sure if it's significant, but the service "vpn-handler-openvpn" does not 
appear in the dropdown list of available services in the ProxyVM's settings 
screen, even though the template on which it is based (Debian 9) most 
definitely has Openvpn installed on it. I typed that service name in manually 
and it accepted it, but it also accepts any garbage text entered as well, so no 
idea whether it's actually functioning properly or not.

I was also admittedly a bit confused about whether I needed to separately 
install the qubes-tunnel package first, but the instructions didn't seem to 
explicitly require it so I did not. Other than that, I followed them to the 
letter but cannot get the link up.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77f93612-be60-4dbb-b8f5-f78e7af34e59%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes: Unable to connect to VPN

2018-11-19 Thread Chris Laprise

On 11/19/2018 12:27 PM, Chris Laprise wrote:

It could be as simple as editing your /etc/resolv.conf so it contains 
your VPN provider's DNS server (or other DNS server that you prefer) 
instead of the Qubes internal routing addresses.


Replace this:
nameserver 10.139.1.1
nameserver 10.139.1.2

With this:
nameserver 


Forgot to mention when you manually edit resolv.conf it should be 
_after_ the openvpn connection is started. Changing it before might 
prevent openvpn from starting the connection.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9683b1ba-43db-5317-1760-38cc735a2636%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes: Unable to connect to VPN

2018-11-19 Thread Chris Laprise

On 11/19/2018 09:05 AM, Otto Kratik wrote:

On Monday, November 19, 2018 at 1:09:33 AM UTC-5, Chris Laprise wrote:

The Qubes VPN doc has two methods for correct openvpn configuration:

https://www.qubes-os.org/doc/vpn/

A better method is located here:

https://github.com/tasket/Qubes-vpn-support/

The difference is more failsafe checks and much smoother setup & operation.


Thanks for your reply. I'm entirely willing to consider using these better, 
more secure and effective methods in the long run. My first objective however 
is to determine why the simple method I used in Qubes 3.2 (running Openvpn from 
AppVM) does not successfully work the same way in Qubes 4.0.



I would also try pinging known IP addresses (after connecting) to see if
you can get a response. If you can, then the problem is likely with the
DNS routing and dnat in the firewall.


I've just tested this. After connecting to the VPN from within the AppVM, I can 
successfully ping known IP addresses from the terminal. However attempts to 
connect to websites in the browser fail and time out.

What is my next step? How do I check or fix DNS routing and dnat in the 
firewall?


It could be as simple as editing your /etc/resolv.conf so it contains 
your VPN provider's DNS server (or other DNS server that you prefer) 
instead of the Qubes internal routing addresses.


Replace this:
nameserver 10.139.1.1
nameserver 10.139.1.2

With this:
nameserver 

Hopefully that's all you'll need.

There are different ways to make this permanent. The best is probably to 
install the "resolvconf" package (if not already there) and then tell 
openvpn to use its update-resolv-conf script when you run it like this:


sudo openvpn --config link.conf --script-security 2 --up 
/etc/openvpn/update-resolv-conf --down /etc/openvpn/update-resolv-conf


If your VPN provider sends DNS info via DHCP at connection time (most 
do) the script will automatically send it to resolvconf.


If you want to use a different DNS server you can manually set 
resolv.conf at connection time with your own script.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/69a52ada-ea39-8a56-38f2-0d8af8e54f49%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Change update Template from sys-whonix to sys-whonix-New

2018-11-19 Thread 22rip
I recreated a new Appvm for my templates to use for updates. I currently use 
sys-whonix...the new template is sys-whonix-New.


How would I do this?

I have Qubes 4.0 and have been using Whonix 14...

Thanks again to all for any help,
22Rip

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b444d79b-2ff7-4056-ace5-3eb2f625e034%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: i3 wm package still in testing

2018-11-19 Thread Vasilis
aaq via qubes-users:
> lørdag den 17. november 2018 kl. 23.44.01 UTC+1 skrev Vasilis:
>> It seems that the i3 window manager has been in the testing repository for a
>> while, and I don't see many bug reports or posts on the mailing lists with
>> problems associated to the i3 window manager.
>>
>> Anything else required to make this package stable or when it can be moved to
>> the stable repository?
> 
> Hello!
> 
> What version of Qubes are you running?
> 
> I installed i3 directly through "sudo qubes-dom0-update i3" and that resolved 
> fine. Even the patched settings too.
> 
> So it should be in stable already.

Ah Great, I haven't realized that it's in stable repository.
We should update the documentation in https://www.qubes-os.org/doc/i3/


Cheers,
~Vasilis
-- 
Fingerprint: 8FD5 CF5F 39FC 03EB B382 7470 5FBF 70B1 D126 0162
Pubkey: https://pgp.mit.edu/pks/lookup?op=get&search=0x5FBF70B1D1260162

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/88a027b9-fa4b-02f1-5453-856c2dbf1588%40torproject.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Windows HVM TemplateVM never leaves transient state

2018-11-19 Thread Ivan Mitev



On 11/19/18 12:48 PM, qube1...@gmail.com wrote:

I'm a newbie trying to set up a Windows 10 HVM template (without Qubes windows 
tools) in Qubes 4.0.1rc1. The tempalate works fine but never leaves the 
transient state. Is this a known limitation without the windows tools or am I 
missing something?


Without Qubes windows tools (QWT) you don't have qrexec [1], so no 
communication is possible between the (H)VM and dom0 -> no way for dom0 
to know that the vm has properly started. Hence the 'transient' state 
instead of 'running'.



My real issue is that an AppVM of this template never persist/commit the 
private snap image. I'm just guessing this might be due to the fact that the 
qube (AppVM and TemplateVM) never hits the Running state?


No, that's because in template mode the private volume is wiped so you 
have to format it *each time* (+ migrate the user profile folders 
there). You'll have to write a shell script that takes care of that or 
alternatively, try to install QWT, which provides that feature. But if 
you go that route clone/backup your vm first and be ready for some trial 
and error (QWT 3.x is buggy on R4 [2], and I have no idea if the QWT 4.x 
test versions works properly on Win10 as a template).




Normal PVHs AppVM's work fine with their states/private data.


Yes - because their private volume is persistent.


Hope this helps,
Ivan


[1] https://www.qubes-os.org/doc/qrexec3/
[2] https://github.com/QubesOS/qubes-issues/issues/3585

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62248398-13c3-14df-7084-1f4216de487a%40maa.bz.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How to Change Default Language Qubes 4

2018-11-19 Thread DonC




On 11/19/18 00:10, aaq via qubes-users wrote:

søndag den 18. november 2018 kl. 17.00.19 UTC+1 skrev Campbell:

On install I chose UK English with US Keyboard. For some reason upon 
installation Qubes set my laptop keyboard to UK, even though I chose US 
keyboard during installation.

My guess is that when Qubes set language to UK English it automatically set the 
keyboard to UK, despite what I entered at install.

How do I change the default language to US English, and will that fix my 
keyboard layout?

Hello!

If you aren't going to use any other keyboard layouts than US, then look into 
setting it on X server level. That's what I do at least.

Look here: 
https://wiki.archlinux.org/index.php/Xorg/Keyboard_configuration#Using_X_configuration_files

Basically you need to add a file in /etc/X11/xorg.conf.d/ in dom0 (it doesn't 
really matter what you call the file, as long as you don't have clashing files).

For US layout the file would look something like:
Section "InputClass"
 Identifier "Keyboard Defaults"
 MatchIsKeyboard "yes"
 Option  "XkbLayout" "us"
EndSection

hope this helps!



This did the trick! Simple fix, thank you very much. Edit 00-keyboard 
file in that location, change it from gb to us, and restart and my 
keyboard is correct.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/36dcffe5-271a-68e6-19ab-81c703ba7461%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes: Unable to connect to VPN

2018-11-19 Thread Otto Kratik
On Monday, November 19, 2018 at 1:09:33 AM UTC-5, Chris Laprise wrote:
> The Qubes VPN doc has two methods for correct openvpn configuration:
> 
> https://www.qubes-os.org/doc/vpn/
> 
> A better method is located here:
> 
> https://github.com/tasket/Qubes-vpn-support/
> 
> The difference is more failsafe checks and much smoother setup & operation.

Thanks for your reply. I'm entirely willing to consider using these better, 
more secure and effective methods in the long run. My first objective however 
is to determine why the simple method I used in Qubes 3.2 (running Openvpn from 
AppVM) does not successfully work the same way in Qubes 4.0.


> I would also try pinging known IP addresses (after connecting) to see if
> you can get a response. If you can, then the problem is likely with the
> DNS routing and dnat in the firewall. 

I've just tested this. After connecting to the VPN from within the AppVM, I can 
successfully ping known IP addresses from the terminal. However attempts to 
connect to websites in the browser fail and time out.

What is my next step? How do I check or fix DNS routing and dnat in the 
firewall?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c80be580-203d-4228-b18b-9a980113d8ec%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Windows HVM TemplateVM never leaves transient state

2018-11-19 Thread qube1813
I'm a newbie trying to set up a Windows 10 HVM template (without Qubes windows 
tools) in Qubes 4.0.1rc1. The tempalate works fine but never leaves the 
transient state. Is this a known limitation without the windows tools or am I 
missing something?

My real issue is that an AppVM of this template never persist/commit the 
private snap image. I'm just guessing this might be due to the fact that the 
qube (AppVM and TemplateVM) never hits the Running state?

Normal PVHs AppVM's work fine with their states/private data.

I've tried looking for strange things in the logs but kind of fumbling in the 
dark. What should I look for?

System:
Qubes 4.0.1rc1
LVM thin

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3850acde-8902-4365-b9c6-6c307cb3bece%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] QUESTION - QUBES OS - HARDWARE

2018-11-19 Thread Ádám Bagaméri
Hi

I would like to try the Qubes OS system on my ASUS GL753VE, because
I don’t know which version works on it, and what I need to be good.
I have tried versions, but it is not supported by the hardver.
Could you give me some advice?


I saw the similar but did not go
https://www.qubes-os.org/hcl/#asustek-computer-inc_gl753vd_i7-7700hq_kaby-lake_integrated-graphics

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CALQJ5CvspDuPoY2caCd3Y9_U99tuJ8V-DyPPginzLr-4x0bEGA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0+ Windows 10

2018-11-19 Thread Black Beard

Hey guys,

I'm currently thinking about creating a separate Windows 10 partition besides 
Qubes.
Is this feasible? Or would one jeopardize his safety in any way?


About a message i would be very happy.

regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fc17b44a-698b-4984-b818-b0b463f15100%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Gaming on Qubes 4.0

2018-11-19 Thread Black Beard

Hey guys,

i updated all of my Domains and bought Crossover Linux. This Software i 
installed on my Fedora 29 Domain. 

An example

I wanted buy a game yesterday via bank transfer and I automatically forwarded 
to the appropriate page. 

Unfortunately, I can not see the opened page properly and therefore cant do 
anything. Only if I click  chaoticall on it, i see that there is content.

Is it even possible to game on the domain, or would I have to install a 
separate HVM or similar?

About messages i happy.

regards and thx in advance

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/00f3fbfe-c0ff-4480-9fba-1ab1f7211841%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] debian-based templates (and whonix) ignore dom0 keyboard language in 4.0.1 but not 4.0

2018-11-19 Thread Patrick Schleizer
ryangr...@tuta.io:
> I'm pretty sure this is a bug (linked below), but am posting here just in 
> case there might be something I am missing:
> https://github.com/QubesOS/updates-status/issues/791 
> 
> I set the language/keymap settings via localectl as recommended, as well as 
> in the VMs themselves, but the debian-9 and whonix VMs default to english 
> querty still. Removing those and installing the 4.0 templates in the 4.0.1 
> host demonstrates expected inheritance of settings as it should. I could not 
> even find a way besides a startup script to set keyboard settings in the VMs 
> (even /etc/default/keyboard in the VMs was ignored by the templates). 
> Fedora-29 templates seem to be fine. Any ideas? 
> 
> Thanks!
> Ryan
> 

Every time I start a terminal.

Example:

setxkbmap de

Syntax:

setxkbmap yourkeymap

Likely possible to automate using /rw/config/rc.local, /etc/profile.d/,
/etc/X11/Xsession.d/, systemd or otherwise.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7ad936e7-fd33-86d4-c35b-decdea1f6730%40whonix.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Donation costs

2018-11-19 Thread Patrick Schleizer
Achim Patzner:
>> Crypto payments and cash in mail to trusted qubes people (with secret
>> shoppers to help ensure honesty) are the least terrible option.
> 
>> From my point of view on ecology: not. Besides throwing all your money 
> towards China, too or where do you think is most crypto mining being
> done because there currently is no place you're paying less for the
> ecological damage right now. So while China's censorship is not
> threatening me right now, adding unnecessary carbon dioxide to my
> environment is.

I don't think crypto currencies add much carbon dioxide compared to
legacy financial institutions.

How much unnecessary carbon dioxide by all...?

- bank towers (building, electricity, water, maintenance)
- bank employees commuting to banks every work day by cars emitting fumes
- server farms for financial institutions
- cash transports

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2a72de4-e639-cb32-393f-497225550649%40whonix.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to Change Default Language Qubes 4

2018-11-19 Thread aaq via qubes-users
søndag den 18. november 2018 kl. 17.00.19 UTC+1 skrev Campbell:
> On install I chose UK English with US Keyboard. For some reason upon 
> installation Qubes set my laptop keyboard to UK, even though I chose US 
> keyboard during installation.
> 
> My guess is that when Qubes set language to UK English it automatically set 
> the keyboard to UK, despite what I entered at install.
> 
> How do I change the default language to US English, and will that fix my 
> keyboard layout?

Hello!

If you aren't going to use any other keyboard layouts than US, then look into 
setting it on X server level. That's what I do at least.

Look here: 
https://wiki.archlinux.org/index.php/Xorg/Keyboard_configuration#Using_X_configuration_files

Basically you need to add a file in /etc/X11/xorg.conf.d/ in dom0 (it doesn't 
really matter what you call the file, as long as you don't have clashing files).

For US layout the file would look something like:
Section "InputClass"
Identifier "Keyboard Defaults"
MatchIsKeyboard "yes"
Option  "XkbLayout" "us"
EndSection

hope this helps!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aecf7210-c67a-40a0-a96e-7966edd4315d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.