[qubes-users] How to use encryption key(on flash drive) instead of pass phrase

2018-12-16 Thread Frozentime345
I was trying to follow the custom install guide to do this but keep 
failing at "setting up installation environment". Preferably I would 
want to use just the key and not have any pass phrase.


I learned that you can change the encryption key in dm-crypt so maybe 
the easier method is to install and then add the encryption key? I can 
try experimenting myself with some clues if this method makes sense.


Also once I get all this working, how does one start up the system using 
this method? Is there a way to escape to shell and use cryptsetup?


Finally, I'm using this command to generate the key :
sudo dd if=/dev/random of=filename bs=1 count=4096

Is this okay?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3c9d2b6-13fb-3740-3ce2-9b026ccedf98%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] PS/2 Combo keyboard / mouse port

2018-12-16 Thread unman
On Sat, Dec 15, 2018 at 10:13:49PM -0800, John Smiley wrote:
> Read some interesting things about USB on your site and now I want to change 
> over from USB keyboard and mouse to PS/2.  My mobo has a single port that 
> combines both in what they (Gigabyte) describe as a PS/2 port.  Can I just 
> slap an adapter onto my existing keyboard and mouse (say a PS/2 port splitter 
> and a couple of USB to PS/2 adapters) or do I need a keyboard and mouse that 
> are natively PS/2?
> 
I cant speak to this but I have used usb-Ps/2 adapters separately. Worth
trying with a splitter and see what happens.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181216121112.ct4la6ovrx5qwxob%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Upgrade guide from 4.0 to latest recommended build

2018-12-16 Thread unman
On Sat, Dec 15, 2018 at 06:31:35PM -0800, John Smiley wrote:
> On Saturday, December 15, 2018 at 6:24:49 PM UTC-8, unman wrote:
> > On Sat, Dec 15, 2018 at 06:18:43PM -0800, John Smiley wrote:
> > > On Saturday, December 15, 2018 at 4:59:59 PM UTC-8, unman wrote:
> > > > On Sat, Dec 15, 2018 at 03:42:29PM -0800, John Smiley wrote:
> > > > > On Saturday, December 15, 2018 at 3:19:16 PM UTC-8, John Smiley wrote:
> > > > > > On Saturday, December 15, 2018 at 3:02:13 PM UTC-8, 
> > > > > > 22...@tutamail.com wrote:
> > > > > > > Some typos corrected and clarification added:
> > > > > > > 
> > > > > > > 
> > > > > > > John,
> > > > > > > I'll take a shot at helping but would defer to Unman who has 
> > > > > > > helped me out a lot, both directly and indirectly on this forum.
> > > > > > > 
> > > > > > > Some notes:
> > > > > > > Been using 3.2 and 4.0 only...haven't tried 4.0.1
> > > > > > > Not an expert but have having been using Qubes as my primary for 
> > > > > > > over a year.
> > > > > > > 
> > > > > > > I loaded 4.0, however during the setup I did not add the default 
> > > > > > > whonix template(v13 I think) to my system as the default whonix 
> > > > > > > needs to be removed in order to upgrade to whonix-14. This option 
> > > > > > > is chosen when loading Qubes for the first time.
> > > > > > > 
> > > > > > > I immediately update Dom0 using a VPN connection thru my network
> > > > > > > 
> > > > > > > After installing Qubes 4.0, I immediately install the whonix-14 
> > > > > > > template following these instructions: 
> > > > > > > https://www.whonix.org/wiki/Qubes/Install
> > > > > > > 
> > > > > > > All updates going forward are done thru sys-whonix-14-GW.
> > > > > > > 
> > > > > > > When you say upgrading Firefox are you just updating Firefox or 
> > > > > > > the whole template...I don't just upgrade Firefox, I update the 
> > > > > > > whole template i.e. I update the Debian template and the Fedora 
> > > > > > > template and this updates Firefox in the template and the appvm's 
> > > > > > > associated with the templates. Make sure you are aware of the 
> > > > > > > template/appvm relationship...you don't update the appvm(e.g. 
> > > > > > > sys-whonix), you update the template(whonix-gw) which is the 
> > > > > > > source for the appvm(sys-whonix).
> > > > > > > 
> > > > > > > Other best practices I follow:
> > > > > > > *Fresh templates seems to be the advice(vs upgrading)
> > > > > > > *Whonix-gw template is a key template to update as all my updates 
> > > > > > > are done thru this template/appvms
> > > > > > > * Get a VPN appvm setup as a priority
> > > > > > > * Clone your templates and experiment on the clones, this way you 
> > > > > > > can resort back to your clean template WHEN you F%$# it up (Not 
> > > > > > > IF...you will at some point mess one up)
> > > > > > > 
> > > > > > > Good luck, hope this helps...
> > > > > > 
> > > > > > Thank you @tutamail.  This is more like what I was looking for.  
> > > > > > I've tried most of what you recommend, but not everything.  I'll 
> > > > > > re-install 4.0 and give your suggestions a try.
> > > > > > 
> > > > > > I appreciate the other replies as well.  Sorry if I wasn't clear.  
> > > > > > I only tried 4.0.1-rc1 out of desperation. What I want is the 
> > > > > > latest production 4.0 platform.  Most operating systems have a 
> > > > > > simple process by which you are informed of packages that are out 
> > > > > > of date and are offered an opportunity to upgrade them to the most 
> > > > > > recent version supported by the distributor.  It would be great if 
> > > > > > Qubes had something like that.  Perhaps someday it will. In the 
> > > > > > meantime, there ought to be a document that clearly explains how to 
> > > > > > go from a fresh install to the most recent Qubes-supported version 
> > > > > > of every package installed in each template and dom0.  It would be 
> > > > > > even nicer if there were a nightly/weekly build of the same 
> > > > > > packages used in a fresh install, but all updated to the latest 
> > > > > > supported version so that we could simply download and install that 
> > > > > > and know that we have all of the most recent patches and upgrades.
> > > > > 
> > > > > I can hear some of you now saying that if I want these things then 
> > > > > get up off my lazy ass and build them.  If I weren't fully (some 
> > > > > would say overyly) employed with nothing but free time on my hands, I 
> > > > > still wouldn't do that because I have other interests.  I'm the 
> > > > > consumer here.  Some of you seem to forget that.  This is feeback 
> > > > > coming from a customer.  Treat it as such.
> > > > > 
> > > > > I'm also not a Linux newbie. I'm not stumbling around trying to 
> > > > > figure out where the power button is.  I've used, installed, and 
> > > > > upgraded various forms of Linux for years.  My point is I know a lot 
> > > > > more than most about Linux and virtualization and I'm ha

[qubes-users] Help Needed asap

2018-12-16 Thread Roy Bernat
Hi 

I have update to the latest dom0 update and suddenly 

i have templates that ask for root user when i sudo su . 

i fixed that issue by adding qubes file to /etc/sudoers.d  . 

now the issue that there is no eth0 .  it doesnt get ip . 

i tried add manually the ip and add route and it doesnt work 

how can i fix the network issue ? 

Roy 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe26ced4-67a0-4540-b11c-c0ac2567e50d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] fresh qubes-builder minimal templates = Terminal not starting

2018-12-16 Thread n1ete
Am Dienstag, 4. Dezember 2018 01:24:47 UTC+1 schrieb n1ete:
> Am Dienstag, 4. Dezember 2018 01:04:33 UTC+1 schrieb unman:
> > On Mon, Dec 03, 2018 at 06:30:40AM -0800, n1ete wrote:
> > > Am Montag, 3. Dezember 2018 15:07:25 UTC+1 schrieb unman:
> > > > On Mon, Dec 03, 2018 at 06:05:16AM -0800, n1ete wrote:
> > > > > Am Montag, 3. Dezember 2018 13:35:40 UTC+1 schrieb unman:
> > > > > > On Sat, Dec 01, 2018 at 12:56:07PM -0800, n1ete wrote:
> > > > > > > i created today 3 minimal templates for qubes. 
> > > > > > > centos-7, f29 and an debian stretch one...
> > > > > > > 
> > > > > > > they all appear to start fine but the xterm window doesnt show up 
> > > > > > > on all of them.
> > > > > > > my first instant thought that something at the builder script 
> > > > > > > went wrongeven after reread template applications nothing 
> > > > > > > changed... 
> > > > > > > 
> > > > > > > except on the stretch template: after rereading the applications, 
> > > > > > > uxterm was added and is also showing up when i start it from the 
> > > > > > > menu
> > > > > > > this lead me to the assumption that building went in general fine 
> > > > > > > and something else is broken
> > > > > > > 
> > > > > > > .xsession-error log shows no errors expect for some scaling issues
> > > > > > > but mainly after an "qvm-run -a centos-7-minimal xterm" 
> > > > > > > 
> > > > > > > i see
> > > > > > > "
> > > > > > > centos-7-minimal: Starting GUI
> > > > > > > centos-7-minimal: Sending monitor layout
> > > > > > > "
> > > > > > > 
> > > > > > > help for debbuging this and pointing me into the right direction 
> > > > > > > is greatly appreciated ;)
> > > > > > > 
> > > > > > 
> > > > > > run qvm-run with -p flag, and you may see something useful.
> > > > > > 
> > > > > > Or qvm-start centos-7-minimal, and then attach to console using 
> > > > > > 'sudo xl console centos-7-minimal' - log in as root,' su - user', 
> > > > > > and then
> > > > > > start running commands and checking output and logs.
> > > > > > 
> > > > > > unman
> > > > > 
> > > > > 
> > > > > thanks for the hint attaching to the consolelogin as root needs a 
> > > > > password and i didnt set yet any... i could mount the root fs and 
> > > > > chroot into it to set one but did i forgott something when building 
> > > > > these templates? any recommended procedure to set one?
> > > > > 
> > > > You dont have passwordless-root package installed.
> > > > Much easier to qvm-run -u root passwd
> > > 
> > > thank you so much
> > > you think thats it? so i integrate the passwordless-root in my building 
> > > process and it should work?
> > > 
> > > if i do on dom0 a "qvm-run -u root centos-7-minimal passwd" it doesnt 
> > > return anything...and stuck there with a blinking cursor like any 
> > > "qvm-run" command
> > > 
> > 
> > You want to intercat with the passwd command, so of course you need -p;
> > qvm-run -p -u root  passwd
> 
> yeah your right, figured that out a bit later...unfortunatly nothing happens 
> after execution the cursor just sits there like the programm (passwd) is open 
> but i cant see nothing on dom0...i have to ctrl+c out and get some python 
> traceback shown in dom0 terminal.
> 
> cant see in the build logs folder any passwordless sudo meta package but 
> found some other errors in all of the template building logs could this be 
> related to my error?
> 
> "
> -> Installing core RPM packages...
> /bin/sh: error while loading shared libraries: libtinfo.so.5: cannot open 
> shared object file: No such file or directory
> warning: %post(libsepol-2.5-8.1.el7.x86_64) scriptlet failed, exit status 127
> Failed to get D-Bus connection: Operation not permitted
> "
> 
> 
> 
> btw. any easy way to copy+paste logs from dom0 or do i have to copy the files 
> first in a lower lvl domain?


so i put another few hours into troubleshooting and managed to remove some 
build errors trough solving dependencies, tried the 4.0 and 4.1 stable 
sources,but still no luck

so i missed obviously something at the building process?! 

Even if the paswordless sudo setup has to be done on minimal templates, i 
should be able to see and work with a terminal on a fresh created template with 
qubes-builder i guess?

thanks in advance ;)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5085b539-aabd-4248-b19d-1ed772f6de29%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] dom0 error

2018-12-16 Thread Roy Bernat
while trying to update dom0 

getting error sys-firewall command failed with code 1 

Roy 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bee73104-0c19-474e-a846-5df48d623263%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread Chris Laprise

On 12/16/2018 07:59 AM, Roy Bernat wrote:

Hi

I have update to the latest dom0 update and suddenly

i have templates that ask for root user when i sudo su .

i fixed that issue by adding qubes file to /etc/sudoers.d  .

now the issue that there is no eth0 .  it doesnt get ip .

i tried add manually the ip and add route and it doesnt work

how can i fix the network issue ?


It sounds like a problem with auth settings. Had you customized them 
before the update? For example:


https://www.qubes-os.org/doc/vm-sudo/

https://github.com/tasket/Qubes-VM-hardening/blob/master/configure-sudo-prompt


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/884f3259-90e1-7023-86e8-e707a2245969%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread 799
Hello Roy,

Am So., 16. Dez. 2018, 13:59 hat Roy Bernat 
geschrieben:

>
> I have update to the latest dom0 update and suddenly
> i have templates that ask for root user when i sudo su .
> i fixed that issue by adding qubes file to /etc/sudoers.d  .
> now the issue that there is no eth0 .  it doesnt get ip .
> i tried add manually the ip and add route and it doesnt work
> how can i fix the network issue ?
>

Which version of Qubes are you running?
sudo is not working under Qubes 4 with the default templates, you need to
open the terminal as root user:

qvm-run --user root  xterm

Do you have network issues in the template VMs or in all AppVMs?

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2uV1WwuSg6V%2B9_jgqPctGDoL2x-4%3Dv1uF5cQidEXW_PYQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread Roy Bernat
On Sunday, 16 December 2018 08:27:48 UTC-5, 799  wrote:
> Hello Roy,
> 
> 
> 
> Am So., 16. Dez. 2018, 13:59 hat Roy Bernat  geschrieben:
> 
> 
> I have update to the latest dom0 update and suddenly 
> 
> i have templates that ask for root user when i sudo su . 
> 
> i fixed that issue by adding qubes file to /etc/sudoers.d  . 
> 
> now the issue that there is no eth0 .  it doesnt get ip . 
> 
> i tried add manually the ip and add route and it doesnt work 
> 
> how can i fix the network issue ? 
> 
> 
> 
> Which version of Qubes are you running?
> sudo is not working under Qubes 4 with the default templates, you need to 
> open the terminal as root user:
> 
> 
> qvm-run --user root  xterm
> 
> 
> Do you have network issues in the template VMs or in all AppVMs?
> 
> 
> - O

i am running latest qubes version 

i upgrading to the current testing . 

the issue is that i dont have network when i started the appvm . the eth0 is 
missing 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1c71393f-f94e-47ec-b7c6-36c99a1621d1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread Roy Bernat
On Sunday, 16 December 2018 08:28:17 UTC-5, Chris Laprise  wrote:
> On 12/16/2018 07:59 AM, Roy Bernat wrote:
> > Hi
> > 
> > I have update to the latest dom0 update and suddenly
> > 
> > i have templates that ask for root user when i sudo su .
> > 
> > i fixed that issue by adding qubes file to /etc/sudoers.d  .
> > 
> > now the issue that there is no eth0 .  it doesnt get ip .
> > 
> > i tried add manually the ip and add route and it doesnt work
> > 
> > how can i fix the network issue ?
> 
> It sounds like a problem with auth settings. Had you customized them 
> before the update? For example:
> 
> https://www.qubes-os.org/doc/vm-sudo/
> 
> https://github.com/tasket/Qubes-VM-hardening/blob/master/configure-sudo-prompt
> 
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

no i didnt customize . 

suddely after install new testing its happens .   

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bc962c39-7b3e-434b-a541-a72a36eb6236%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread Roy Bernat
On Sunday, 16 December 2018 08:36:58 UTC-5, Roy Bernat  wrote:
> On Sunday, 16 December 2018 08:28:17 UTC-5, Chris Laprise  wrote:
> > On 12/16/2018 07:59 AM, Roy Bernat wrote:
> > > Hi
> > > 
> > > I have update to the latest dom0 update and suddenly
> > > 
> > > i have templates that ask for root user when i sudo su .
> > > 
> > > i fixed that issue by adding qubes file to /etc/sudoers.d  .
> > > 
> > > now the issue that there is no eth0 .  it doesnt get ip .
> > > 
> > > i tried add manually the ip and add route and it doesnt work
> > > 
> > > how can i fix the network issue ?
> > 
> > It sounds like a problem with auth settings. Had you customized them 
> > before the update? For example:
> > 
> > https://www.qubes-os.org/doc/vm-sudo/
> > 
> > https://github.com/tasket/Qubes-VM-hardening/blob/master/configure-sudo-prompt
> > 
> > 
> > -- 
> > 
> > Chris Laprise, tas...@posteo.net
> > https://github.com/tasket
> > https://twitter.com/ttaskett
> > PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
> 
> no i didnt customize . 
> 
> suddely after install new testing its happens .

It seems that all qubes tools are not installed . i am getting 
qubes-usb-proxy not installed . 

is there a way to install all tools again ? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ec74bb5d-4992-4c22-99a5-a87719c9b01e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread Chris Laprise
You could look at 'sudo dnf history' in dom0 to identify the last 
update, then roll back to the prior one:


sudo dnf rollback 

So if the update that caused the problem is transaction 150, specify 149 
on the command line.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c5ea997b-ac16-d817-5341-a2cd51c47356%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread Roy Bernat
On Sunday, 16 December 2018 08:50:32 UTC-5, Chris Laprise  wrote:
> You could look at 'sudo dnf history' in dom0 to identify the last 
> update, then roll back to the prior one:
> 
> sudo dnf rollback 
> 
> So if the update that caused the problem is transaction 150, specify 149 
> on the command line.
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

yes but i can see that the update exclude qubes template . 

resinstall all qubes package will not help? 

maybe the new tool that qubes-update gui cause this issue ? 

Roy

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/763af040-d03b-49e7-815e-25b4c7e949b3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread Chris Laprise

On 12/16/2018 08:54 AM, Roy Bernat wrote:

On Sunday, 16 December 2018 08:50:32 UTC-5, Chris Laprise  wrote:

You could look at 'sudo dnf history' in dom0 to identify the last
update, then roll back to the prior one:

sudo dnf rollback 

So if the update that caused the problem is transaction 150, specify 149
on the command line.

--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886


yes but i can see that the update exclude qubes template .

resinstall all qubes package will not help?

maybe the new tool that qubes-update gui cause this issue ?

Roy



You stated it was dom0 that received the update. A bug in the update 
could conceivably prevent templates from operating correctly.


So the most direct solution IMHO is dnf rollback.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51b29338-d0b0-d583-08a1-255a8c1ea32f%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread Roy Bernat
On Sunday, 16 December 2018 09:02:39 UTC-5, Chris Laprise  wrote:
> On 12/16/2018 08:54 AM, Roy Bernat wrote:
> > On Sunday, 16 December 2018 08:50:32 UTC-5, Chris Laprise  wrote:
> >> You could look at 'sudo dnf history' in dom0 to identify the last
> >> update, then roll back to the prior one:
> >>
> >> sudo dnf rollback 
> >>
> >> So if the update that caused the problem is transaction 150, specify 149
> >> on the command line.
> >>
> >> -- 
> >>
> >> Chris Laprise, tas...@posteo.net
> >> https://github.com/tasket
> >> https://twitter.com/ttaskett
> >> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
> > 
> > yes but i can see that the update exclude qubes template .
> > 
> > resinstall all qubes package will not help?
> > 
> > maybe the new tool that qubes-update gui cause this issue ?
> > 
> > Roy
> > 
> 
> You stated it was dom0 that received the update. A bug in the update 
> could conceivably prevent templates from operating correctly.
> 
> So the most direct solution IMHO is dnf rollback.
> 
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

getting error transaction cant rollback 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f36e0670-f64c-4214-af9f-9ec3f482bf29%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] updating CentOS-7 templates

2018-12-16 Thread Achim Patzner
On 20181215 at 18:06 + Nick Darren wrote:
> On Thu, Dec 13, 2018 at 10:36:18AM +0100, Achim Patzner wrote:
> > So: Which packages (of the few millions) is the one to back out or
> > what would have to be added again?
> I just downgrade these packages upgrade on centos
> 7, 
> xorg-x11-server-{Xorg,common}-1.20.1 back to 
> xorg-x11-server-{Xorg,common}-1.19.5 and now qubes-gui-agent seems 
> working fine with it and I can use back my centos-7 as usual.

Thank you.

Finding the right point to get back to was not trivial -- I did yum
downgrade of these packages but mine were at 1.20.1-5.1 and successive
downgrades using "yum downgrade" brought them to 1.20.1-5, then -3 (and
the I got bored by that game).


Achim



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/91b115d207f5bb1040055fe5b9cb359c7165bb67.camel%40noses.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Adding a repo: works in appvm/dispvm, not in template

2018-12-16 Thread Jake
I need to add an additional yum/dnf repo to install some software, but I 
seem to only be able to do it on an appvm/dispvm, not on a template.


When adding the repo to the template, I cannot install packages after 
adding it, and get the following message when attempting to install 
using dnf:


"Failed to synchronize cache for repo "

Can someone give me a clue about why this works for appvms and not a 
template?


Regards,

Jake

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9e2158a-708c-1fa0-4fac-afc6832a4310%40companyzero.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help Needed asap

2018-12-16 Thread Roy Bernat
On Sunday, 16 December 2018 09:10:18 UTC-5, Roy Bernat  wrote:
> On Sunday, 16 December 2018 09:02:39 UTC-5, Chris Laprise  wrote:
> > On 12/16/2018 08:54 AM, Roy Bernat wrote:
> > > On Sunday, 16 December 2018 08:50:32 UTC-5, Chris Laprise  wrote:
> > >> You could look at 'sudo dnf history' in dom0 to identify the last
> > >> update, then roll back to the prior one:
> > >>
> > >> sudo dnf rollback 
> > >>
> > >> So if the update that caused the problem is transaction 150, specify 149
> > >> on the command line.
> > >>
> > >> -- 
> > >>
> > >> Chris Laprise, tas...@posteo.net
> > >> https://github.com/tasket
> > >> https://twitter.com/ttaskett
> > >> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
> > > 
> > > yes but i can see that the update exclude qubes template .
> > > 
> > > resinstall all qubes package will not help?
> > > 
> > > maybe the new tool that qubes-update gui cause this issue ?
> > > 
> > > Roy
> > > 
> > 
> > You stated it was dom0 that received the update. A bug in the update 
> > could conceivably prevent templates from operating correctly.
> > 
> > So the most direct solution IMHO is dnf rollback.
> > 
> > 
> > -- 
> > 
> > Chris Laprise, tas...@posteo.net
> > https://github.com/tasket
> > https://twitter.com/ttaskett
> > PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
> 
> getting error transaction cant rollback

Hi 

thank you for the scripts


on the qubes4 update i am getting error 

i tried --all --available and it gives me error  

gives me always syntax error . 

ROy

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/33a1dd01-88df-4ee6-9865-2d18880b1161%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Adding a repo: works in appvm/dispvm, not in template

2018-12-16 Thread unman
On Sun, Dec 16, 2018 at 01:57:57AM -0600, Jake wrote:
> I need to add an additional yum/dnf repo to install some software, but I
> seem to only be able to do it on an appvm/dispvm, not on a template.
> 
> When adding the repo to the template, I cannot install packages after adding
> it, and get the following message when attempting to install using dnf:
> 
> "Failed to synchronize cache for repo "
> 
> Can someone give me a clue about why this works for appvms and not a
> template?
> 
> Regards,
> 
> Jake

appVMs are networked and templates use a proxy which they access by
qubes-rpc.(see www.qubes-os.org/doc/software-update-vm#updates-proxy)

What's the repo you want to use, and what is the proxy you are
using? (Check in QubesGlobalSettings and 
/etc/qubes-rpc/policy/qubes.UpdatesProxy in dom0)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181216150507.butuplvmdz73xykg%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread qubenix
OGBaby:
> Wow, I had to reread a few materials first but It finally clicked. Security 
> is the sole scope of this method. I had meshed a couple concepts together 
> somewhere along the line. There's been a lot of learning (using 
> linux/terminal included).
> 
> I've managed to successfully download the entire blockchain. 
> 
> Just got the "You are now synchronized with the network. You may start 
> monero-wallet-cli." message via status. 
> 
> Monerod is running. The Height displays as "1727318/1727318 (100%) on 
> mainnet, not mining"
> 
> The log: 'sudo tail -f /home/monerod/.bitmonero/bitmonero.log': "Synced 
> 1727379/1727379 -- Synchronized Ok"
>

Congrats! You're well on your way.

> 
> Only 1 error: Torsocks. Specifically, "connection refused to Tor Socks (in 
> sock5_recv_connect_reply() at socks5.c.549)"
> 
> 
> P.S. Must I wrap 'monero-wallet-gui' with "torsocks"? This is what I'm doing 
> now.

No, only the daemon needs `torsocks`. The wallets (cli and gui) just
make a local connection to the daemon so no `torsocks` needed for them.

> 
> Created the wallet and made time to write down all keys & seed. Connected to 
> Local.
> 
> The GUI, I assume, will remain disconnected. You mentioned above that things 
> should be handled within the Daemon vm, would you mind filling me in? (i.e 
> confirming xmr recieved, sending xmr to address)

I'm not sure what you mean by "disconnected", the gui will connect to
the daemon to retrieve information about the state of the blockchain to
derive your balance. However, it will not connect to the internet
directly to help protect against remote attackers.

I haven't used the gui in about a year, but if you look at left sidebar
there should be some indication that you are connected to the daemon and
it will also show your sync progress (the wallet also needs to sync your
balances, but it only takes a few minutes to an hour depending on hardware).

This might be helpful for you:
https://github.com/monero-ecosystem/monero-GUI-guide/blob/master/monero-GUI-guide.md.

> 
> Or... does monero-wallet-cli commands take it from here? As you can my tell 
> my fogginess is with the addition of the GUI.
> 

You can use either the gui or the cli with the same wallet. It's really
just a matter of preference.

> 
> I've also taken a look at './monerod --help>

That will give you the daemon's options. If you want the cli options you
need to run `monero-wallet-cli` from the wallet vm and the type `help`
at the prompt.

>> The infomation online is a bit scattered however I completely
understand if you'd rather point me some links or resource instead. Any
more guidance is appreciated.
> 

Try here for further reading:
https://ww.getmonero.org/resources/user-guides/.

-- 
qubenix

CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20
EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd921760-aa0f-f15d-18c0-74c4552e6070%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TPM usage

2018-12-16 Thread Eric Duncan
TPM is basically is just a key/value storage on a chip on your motherboard. The 
idea is that Secure Boot's certificate is used to gain access to the TPM to 
pull out the stored keys. Then the keys are used as the key to unlock your 
encrypted partition.

TPM is not used by Qubes by default. 

The additional hardening featured called AEM (Anti-Evil Maid) is the only 
feature of Qubes that uses the TPM.

One thing to note: there are LUKS+TPM versions out there.  But my research led 
me to older versions that don't work on the newest TPM chips.

Also, most govt bodies will have access to the TPM chip to download the binary 
since they have the root CA used for the bios secure boot. So it won't prevent 
them access to the TPM keys.

Therefore, it's best to think of TPM as two-factor auth: always combine your 
long passphrase + TPM for a combination that will be unique.  And the LUKS+TPM 
project is dead for that.  So oh well...

AES hardware acceleration happens in your CPU, FYI. And usually the more higher 
end ones. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/48c657e2-f6d6-43c7-b67c-17e6dd55971a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Adding additional storage to Qubes

2018-12-16 Thread seshu
Hi, I'm a Qubes newbie but coming along really well. I'm using 4.0.1 rc-1. 

I had a question about what the process is to add new storage drives (ssd or 
hdd). Looking through the documentation I can see there are several docs that 
help but raised other questions. So here goes.

There is a doc to add SSD storage 
cache(https://groups.google.com/d/msgid/qubes-users/a08359c9-9eb0-4d1a-ad92-a8a9bc676ea6%40googlegroups.com)
 and one for Storing AppVMs on Secondary Drives 
(https://www.qubes-os.org/doc/secondary-storage/).

Question 1: What's the difference between these two? Or I do understand the 
second doc, but not sure what SSD storage cache is for?

Question 2: My main goal is to add more storage available to the entire system 
for it to use as it needs. This would be after initial install. It doesn't have 
to be specifically for AppVMs, etc. So, I wasn't sure how to do that.

Now, I'm currently setup on dual boot, I do realize the security concerns and 
since I'm just testing exploring now I'm only evaluating. I do have some data 
stored on the Win10 drives (hdd). So,

Question 3: is there a way to add those hdd's into the Qubes environment, let's 
say into the home directory of an AppVM so I can have access that way?  I do 
realize the security holes this creates, so its not that I will ultimately 
operate this way. Maybe this question can be translated as, is it possible to 
add an ssd or hdd specifically for /home or user profile data?

Thanks again for all your help. It's been really fun getting back into linux 
and getting to know Qubes. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e780175-605e-41d2-b552-b686ea727adf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TPM usage

2018-12-16 Thread brendan . hoar
On Sunday, December 16, 2018 at 10:44:07 AM UTC-5, Eric Duncan wrote:
> AES hardware acceleration happens in your CPU, FYI. And usually the more 
> higher end ones.

I would wager that any CPU that meets the Qubes R4 requirements (e.g. Intel 
VT-d + EPT or similar AMD features) assuredly implements the AES-NI opcodes.

Not that what you said indicates otherwise, but just to clarify. :)

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24cd3900-3810-485c-b450-4e255878064b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TPM usage

2018-12-16 Thread Eric Duncan
On Sunday, December 16, 2018 at 1:03:45 PM UTC-5, Brendan Hoar wrote:
> On Sunday, December 16, 2018 at 10:44:07 AM UTC-5, Eric Duncan wrote:
> > AES hardware acceleration happens in your CPU, FYI. And usually the more 
> > higher end ones.
> 
> I would wager that any CPU that meets the Qubes R4 requirements (e.g. Intel 
> VT-d + EPT or similar AMD features) assuredly implements the AES-NI opcodes.
> 
> Not that what you said indicates otherwise, but just to clarify. :)
> 
> Brendan

True true.  Though, I've had an old Core i5 that did not have AES-NI... And 
yet, the N4200 Pentium quad core in my tiny UP Squared does!  Go figure.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ede966ba-a82c-443d-8460-db79ede77afb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread OGBaby
Great info!

I wasn't able to get 'torsocks ./monerod' running but found these options 
browsing:


1. 'DNS_PUBLIC=tcp torsocks monerod --p2p-bind-ip 127.0.0.1 --no-igd'

2. 'DNS_PUBLIC=tcp TORSOCKS_ALLOW_INBOUND=1 torsocks monerod --p2p-bind-ip 
127.0.0.1 --no-igd'

I just wanted to run these by you or the qubes community to make sure I don't 
accidently mess with any default settings. (specifically the p2p option which 
we've removed from the systemd file). 

'torsocks monerod' or 'torsocks ./monerod' and the ones I found above all 
attempt to resync the blockchain. Is this normal behavior? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/729b8cef-8030-4a73-ac88-f0325bab6c21%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread OGBaby
By the way, yes the dicconected status is shown on the lower left via the GUI. 
Now I know when the torsocks connection is finally accepted, I will be able to 
see it change to connected and use the GUI normally. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bf6a80a2-e989-40dd-9a57-01136ff54dc4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Nvidia drivers for Qubes 4

2018-12-16 Thread Eric Duncan
On Saturday, December 15, 2018 at 12:52:49 PM UTC-5, archie...@gmail.com wrote:
>
> The second thing i'm wondering is that I don't have /etc/default/grub file
> Where do i have to add the nouveau blacklist? Would echo "blacklist nouveau" 
> >> /etc/modprobe.d/blacklist.conf work?
> 

Yes, and I would prefer this myself so that GRUB upgrades do not wipe it out.  

May I recommend a dedicated file for it?

echo "blacklist nouveau" >> /etc/modprobe.d/blacklist-nouveau.conf

And thank you for posting this.  My P1 arrives this week.  I'm hoping I can get 
Bumblebee or some alternative working in dom0, since it doesn't seem i can 
disable the dGPU in the bios.  We'll see, others are having issues as well.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c3f63c0f-9bcd-4a1c-8893-93300c8db43b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread qubenix
OGBaby:
> Great info!
> 
> I wasn't able to get 'torsocks ./monerod' running but found these options 
> browsing:
> 

Why or where would you intend to run these? The monerod daemon should be
running in the background as soon as the vm is started.

You should never interact with the daemon like this. You should use
`systemctl` to start/stop the daemon. You can check if the daemon is
running by running `sudo systemctl status monerod` or using `tail` on
the debug.log (I gave you instructions in a previous mail on that).

> 
> 1. 'DNS_PUBLIC=tcp torsocks monerod --p2p-bind-ip 127.0.0.1 --no-igd'
> 
> 2. 'DNS_PUBLIC=tcp TORSOCKS_ALLOW_INBOUND=1 torsocks monerod --p2p-bind-ip 
> 127.0.0.1 --no-igd'
> 

You don't need these. They're for setups not as well designed as Whonix,
or if you're offering a remote node onion service.

> I just wanted to run these by you or the qubes community to make sure I don't 
> accidently mess with any default settings. (specifically the p2p option which 
> we've removed from the systemd file).>
> 'torsocks monerod' or 'torsocks ./monerod' and the ones I found above all 
> attempt to resync the blockchain. Is this normal behavior? 
> 

As I said, don't run the daemon from the command line. `systemd` is
handling it already.

-- 
qubenix

CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20
EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1d3968dd-06cd-a0ed-863a-038756f0a32d%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] sharing vms between multiple computers

2018-12-16 Thread 'awokd' via qubes-users

zhewy wrote on 12/2/18 11:15 AM:

couple of vms that i'm wanting to share between multiple computers via a 
connected external drive. the process that i've got it working through seems 
bit convoluted at the moment - sure there's better ways that i don't know 
about; anyone able to provide any help/guidance?

at the moment - to my understanding, the method of notifying qubes about vms on a drive is 
via qubes.xml - so i'm manually  copying the .. sections once 
i've connected the drive. extra fun is then each computer has different vm-ids so i'm 
having to manually craft the id to suit/fit/allocate an unassigned id at each time i'm 
connecting..

anyone know of better ways to do all this?


Only thing I can think of is to share the entire Qubes installation 
between computers too. This can get tricky, though.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62e52af1-eaa1-dcd7-a5fa-06e485f6d582%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot connect to 'win7' qrexec agent for 300 seconds, giving up

2018-12-16 Thread 'awokd' via qubes-users

Franz wrote on 12/2/18 8:54 PM:

  Suddenly  win7 VM stopped starting on Qubes 3.2.  Nothing changed except
perhaps the last couple of dom0 updates.

The error message is:
cannot connect to 'win7' qrexec agent for 300 seconds, giving up

I tried debug mode, but it is just the same.

I had this but it was because Win7 was trying to boot in recovery mode. 
When you enable debug mode, watch the Win7 boot process in the console 
to make sure it's not doing the same. If it is, tell it to start normally.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a8af29d2-1adf-b01e-ef88-1cdf7ed9aa9f%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] R3.2 Boot process crashes starting sys-usb

2018-12-16 Thread 'awokd' via qubes-users

'Udjat' via qubes-users wrote on 12/6/18 2:22 PM:

Hi, Folk's,

the boot process in Release 3.2 crashes always during VM sys-usb start up.
The error message : ... Illegal opcode ...
Exists a way to disable the start of sys-usb for the boot ?
For example are there some kernel parameters to surpress the start of choosen 
VM's ?

Thanks in advance

ciao

In 3.2 you can boot with another distro, mount the Qubes drive, and edit 
qubes.xml to disable autostart of sys-usb.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bf5acb5d-6bde-911c-90a5-1d1feac938ed%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How many gigabytes of memory is required for G505s?

2018-12-16 Thread 'awokd' via qubes-users

taii...@gmx.com wrote on 12/6/18 5:01 PM:

On 12/05/2018 06:19 PM, '我' via qubes-users wrote:

Hello.

When reading this list I thought G505s A10 is the best laptop for Qubes.
So I'd like to purchase it, but I am wondering how many memory to put in.

Could you give me some advice?



2x8GB DDR3 1600mhz SODIMM's so 16GB

and yes it is the best - remember to install coreboot with microcode
updates btw (check binary only repo + generate microcode from tree)

See also http://dangerousprototypes.com/docs/Lenovo_G505S_hacking for 
help getting the latest microcode.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/07e8e976-1622-c2cd-14e1-1fdfa2d49100%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Resizing qubes partition -- how to extend the LVM pool?

2018-12-16 Thread 'awokd' via qubes-users

mike wrote on 12/7/18 4:04 PM:

Hi All,

I extended my Qubes partition, but don't know how to extend the LVM pool.
I.e. extended the actual partition, LUKS, LVM PV, LVM VG.
Now, my qubes_dom0 VG is of the new extended size.
How can I make Qubes use the whole VG?


Maybe I'm missing something, but I thought LVM pools automatically took 
advantage of an extension. What output are you looking at that says it's 
not? It might have just needed a reboot; sometimes the qubes tools don't 
seem to update immediately.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2450c53-c9c7-4f95-af37-a8577b94215e%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] error device attach failed. no device info received, connection failed.

2018-12-16 Thread 'awokd' via qubes-users

haaber wrote on 12/12/18 1:02 PM:
This happens when I connect my mobile via usb. I have qubes-input-proxy 
installed on sys-usb and untreusted (say), and I can mount other usb 
devices (my backup HD  for example). Did you encouter this problem 
already? Thank you for hints. Bernhard


Yes, some USB devices don't work well with Qubes. If you have a 
free/unused USB controller, you can assign it to your VM but there are 
security tradeoffs.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c7ff209f-636b-97bc-5e9c-1c5a7ff8a4fe%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] disk space management

2018-12-16 Thread 'awokd' via qubes-users

dimi wrote on 12/13/18 2:10 PM:

Having fun with qubes r4 but can't help myself with this problem.

sudo lvs, shows me a bunch of deleted VM's that 'seem' to eat up my disk space.


1) Mostly used  Qubes Manager to delete them. How do you delete appVM's / 
TemplateVM's the right way so that no zombies will up on sudo lvs?

2) Why do i see these deleted VMs in /dev/qubes_dom0/ better yet these deleted 
VM's leave stuff / traces on disk in,
/dev/mapper/
/dev/qubes_dom0/
/home/XXX/.config/menus/applications-merged/user-vmName-vm.menu
/var/log/qubes/
/var/log/xen/

3) sudo lvdisplay is showing me backups, vm--number-back, are these 
actual backups?
Aince i do manual backups to another disk, how do i disable these?

1) Can't recreate- might be an LVS thing. Have you rebooted since 
deleting the VMs?


2) Same for /dev/mapper and /dev/qubes_dom0. I do see some stale entries 
in /home/XXX/.config/menus/applications-merged/user-vmName-vm.menu, 
though. Might be ones I had restored from 3.2. These can probably be 
safely deleted. Those log files don't get pruned automatically AFAIK, so 
you will see old entries out there unless you set up a job to 
periodically delete old ones.


3) Those -back are snapshots kept so you can rollback. See 
https://www.qubes-os.org/doc/software-update-vm/#reverting-changes-to-a-templatevm-r40 
for a little more info.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9055766-b7e0-1b61-0100-f0a1989f856e%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Copy paste between qubes service stopped working

2018-12-16 Thread 'awokd' via qubes-users

Adrian H wrote on 12/13/18 8:38 PM:

Hi,

Occasionally the copy/paste service in dom0 stops working and I have to restart 
the whole machine to get it back working.

Does anybody know which service it is that provides this functionality so I can 
do a simple restart command rather than having to reboot the whole machine.


I think I saw this a few times on 3.2 and closing and reopening Qubes 
Manager worked around it. Don't remember it on 4.0, but try the same.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eeb46e8f-eee1-1234-ea6b-108a713992fc%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How many gigabytes of memory is required for G505s?

2018-12-16 Thread John Smiley
On Wednesday, December 5, 2018 at 3:19:42 PM UTC-8, 我 wrote:
> Hello.
> 
> When reading this list I thought G505s A10 is the best laptop for Qubes.
> So I'd like to purchase it, but I am wondering how many memory to put in.
> 
> Could you give me some advice?

Memory is pretty cheap and it has a very high rate of return if you need/use 
it.  If it were me I would max it out - either from the vendor or upgrade 
yourself.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4ff74a6-7789-4b15-9bae-131a27be2fb6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] PS/2 Combo keyboard / mouse port

2018-12-16 Thread John Smiley
On Sunday, December 16, 2018 at 4:11:14 AM UTC-8, unman wrote:
> On Sat, Dec 15, 2018 at 10:13:49PM -0800, John Smiley wrote:
> > Read some interesting things about USB on your site and now I want to 
> > change over from USB keyboard and mouse to PS/2.  My mobo has a single port 
> > that combines both in what they (Gigabyte) describe as a PS/2 port.  Can I 
> > just slap an adapter onto my existing keyboard and mouse (say a PS/2 port 
> > splitter and a couple of USB to PS/2 adapters) or do I need a keyboard and 
> > mouse that are natively PS/2?
> > 
> I cant speak to this but I have used usb-Ps/2 adapters separately. Worth
> trying with a splitter and see what happens.

If USB is this bad, I shudder to think what horrors lurk within Thunderbolt.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f27f4201-028c-4e43-8956-011ba72600ce%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Thunderbird + Whonix ---Time wrong when emails are received?

2018-12-16 Thread 'awokd' via qubes-users

22...@tutamail.com wrote on 12/14/18 12:28 PM:

FYI...I found this link which indicates ""Whonix is set to UTC...". I tried 
restarting sdwdate-gui yet emails show UTC time?

Is it just to be expected that when using Thunderbird in Whonix 14 that emails 
will now be received on UTC time going forward(vs my local time)?

That seems like a good thing from an anonymity perspective because 
otherwise someone could see your local time appended in email replies.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ec904a35-052f-034e-34be-40041623296b%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes freezes when trying to add in WWAN pci device to sys-net (Lenovo Carbon X1)

2018-12-16 Thread 'awokd' via qubes-users

arthur.breit...@gmail.com wrote on 12/15/18 12:13 AM:

I have a 6th gen Lenovo Carbon X1 and it has a slot for a sim card and 4G LTE. 
It shows up in lspci as:

03:00.0 Wireless controller [0d40]: Intel Corporation Device 7360 (rev 01)

Adding this device to the list of PCI device list selected by the sys-net VM 
froze Qubes. Thereafter, Qubes would always freeze on startup before I could 
login. I had to recover the install by booting from a USB key, mounting the 
disk and editing qubes.xml to remove the offending device.

Has anyone experienced a similar issue or has, on the contrary, been able to 
use the integrated 4G/LTE modem on Lenovo X1's?


Haven't used that particular device or model laptop, but you can try 
setting the device to not require strict reset. Experiment with it in a 
test HVM that's not set to autostart, so if it locks up you can just reset.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/915c076e-035a-01ad-2a96-93f835628a9f%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread OGBaby
True, I figured as much. I'll just use the debug/start commands from now on. 
However the wallet should have a connection but there isn't one. Local node is 
"configured" but keep in mind the GUI's network status is "disconnected".


I'm not seeing what else could be wrong. Torsocks' General SOCKS server failure 
is the only error I have at the moment. When looking up the torsocks error 
(given in with status command), these and few other methods were thrown around. 
I will not manipulate the daemon any futher but I can confirm the systemd file 
looks good.

Everything else seem to be in place and running.
 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ccba68c8-c6be-446b-9522-1ffac94671a2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread OGBaby
The last line of the bitmonero.log says: ERROR blockchain 
src/cryptonote_core/nlockchain.cpp:3728 Exception in 
cleanup_handle_incoming_blocks:Failed to commit a transaction to the db: 
MDB_BAD_TXN: Transaction must abort, has a child, or is invalid.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62c1a04f-1add-4cbd-b619-efef9b24720e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread qubenix
OGBaby:
> The last line of the bitmonero.log says: ERROR blockchain 
> src/cryptonote_core/nlockchain.cpp:3728 Exception in 
> cleanup_handle_incoming_blocks:Failed to commit a transaction to the db: 
> MDB_BAD_TXN: Transaction must abort, has a child, or is invalid.
> 

That is a new issue or you are out of space again (I think I remember
seeing that in one of your original mails iirc).

Either way it's not specific to your setup or to Qubes. Best to check on
Monero channels (reddit, irc, etc).

-- 
qubenix

CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20
EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/33cd7193-a769-756c-7b71-cefce6f7b05c%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] R3.2 Boot process crashes starting sys-usb

2018-12-16 Thread unman
On Sun, Dec 16, 2018 at 08:44:54PM +, 'awokd' via qubes-users wrote:
> 'Udjat' via qubes-users wrote on 12/6/18 2:22 PM:
> > Hi, Folk's,
> > 
> > the boot process in Release 3.2 crashes always during VM sys-usb start up.
> > The error message : ... Illegal opcode ...
> > Exists a way to disable the start of sys-usb for the boot ?
> > For example are there some kernel parameters to surpress the start of 
> > choosen VM's ?
> > 
> > Thanks in advance
> > 
> > ciao
> > 
> In 3.2 you can boot with another distro, mount the Qubes drive, and edit
> qubes.xml to disable autostart of sys-usb.
> 
Or you can do this within Qubes:
1. Interrupt the boot process and change the boot parameters to add 
rd.break=cleanup.
2. Boot.
You'll be prompted to decrypt disks and then drop to shell.
The root filesystem will be mounted ro at /sysroot.
3. umount /sysroot.
Mount it rw somewhere else (e.g /mnt - you'll have to create that)
4. mkdir /mnt
5. mount /dev/mapper/blah /mnt
6. cd /mnt/var/lib/qubes/servicevms
7. mv sys-usb sys-usb.bak
8. umount /mnt

Remount /dev/mapper/blah on /sysroot
9. mount /dev/mapper/blah /sysroot
10. exit
exit from the rescue shell

The system should then continue to boot - sys-usb wont be able to start.
Once up, 'mv sys-usb.bak sys-usb', and then fix whatever issue is causing
the crash, or remove the qube and recreate it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181217003740.z73rvrppmatd2euh%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot connect to 'win7' qrexec agent for 300 seconds, giving up

2018-12-16 Thread Franz
On Sun, Dec 16, 2018 at 5:43 PM awokd  wrote:

> Franz wrote on 12/2/18 8:54 PM:
> >   Suddenly  win7 VM stopped starting on Qubes 3.2.  Nothing changed
> except
> > perhaps the last couple of dom0 updates.
> >
> > The error message is:
> > cannot connect to 'win7' qrexec agent for 300 seconds, giving up
> >
> > I tried debug mode, but it is just the same.
> >
> I had this but it was because Win7 was trying to boot in recovery mode.
> When you enable debug mode, watch the Win7 boot process in the console
> to make sure it's not doing the same. If it is, tell it to start normally.
>
>
thanks awokd, doing what you suggest, it hungs forever on the "Starting
Windows" screen. also the dot on Qubes Manager remains yellow. But trying
again it started showing the following:
"Xen pv network class needs to restart the system to complete installation.
Press yes to restart now..."

So the issue seems to be that dom0 update installed some Xen change that
interrupted normal Windows start.

Many thanks awokd

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDM0EC1%2B300VmBDCFYiazy7NGgMJBn8CFqgLoEPXbtoSA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Decrypt from shell or modify boot

2018-12-16 Thread Frozentime345
Is there any way to decrypt the hard drive using a shell and then boot 
like that? Or otherwise modify the boot to accept a key-file(on a flash 
drive) instead of a pass-phrase?


Ctrl+alt+f2 or any other combo doesn't seem to open a shell, is there 
any way?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0079f3c-ab95-b996-1476-b0fcdd755a40%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Upgrade guide from 4.0 to latest recommended build

2018-12-16 Thread John Smiley
On Sunday, December 16, 2018 at 4:12:56 AM UTC-8, unman wrote:
> On Sat, Dec 15, 2018 at 06:31:35PM -0800, John Smiley wrote:
> > On Saturday, December 15, 2018 at 6:24:49 PM UTC-8, unman wrote:
> > > On Sat, Dec 15, 2018 at 06:18:43PM -0800, John Smiley wrote:
> > > > On Saturday, December 15, 2018 at 4:59:59 PM UTC-8, unman wrote:
> > > > > On Sat, Dec 15, 2018 at 03:42:29PM -0800, John Smiley wrote:
> > > > > > On Saturday, December 15, 2018 at 3:19:16 PM UTC-8, John Smiley 
> > > > > > wrote:
> > > > > > > On Saturday, December 15, 2018 at 3:02:13 PM UTC-8, 
> > > > > > > 22...@tutamail.com wrote:
> > > > > > > > Some typos corrected and clarification added:
> > > > > > > > 
> > > > > > > > 
> > > > > > > > John,
> > > > > > > > I'll take a shot at helping but would defer to Unman who has 
> > > > > > > > helped me out a lot, both directly and indirectly on this forum.
> > > > > > > > 
> > > > > > > > Some notes:
> > > > > > > > Been using 3.2 and 4.0 only...haven't tried 4.0.1
> > > > > > > > Not an expert but have having been using Qubes as my primary 
> > > > > > > > for over a year.
> > > > > > > > 
> > > > > > > > I loaded 4.0, however during the setup I did not add the 
> > > > > > > > default whonix template(v13 I think) to my system as the 
> > > > > > > > default whonix needs to be removed in order to upgrade to 
> > > > > > > > whonix-14. This option is chosen when loading Qubes for the 
> > > > > > > > first time.
> > > > > > > > 
> > > > > > > > I immediately update Dom0 using a VPN connection thru my network
> > > > > > > > 
> > > > > > > > After installing Qubes 4.0, I immediately install the whonix-14 
> > > > > > > > template following these instructions: 
> > > > > > > > https://www.whonix.org/wiki/Qubes/Install
> > > > > > > > 
> > > > > > > > All updates going forward are done thru 
> > > > > > > > sys-whonix-14-GW.
> > > > > > > > 
> > > > > > > > When you say upgrading Firefox are you just updating Firefox or 
> > > > > > > > the whole template...I don't just upgrade Firefox, I update the 
> > > > > > > > whole template i.e. I update the Debian template and the Fedora 
> > > > > > > > template and this updates Firefox in the template and the 
> > > > > > > > appvm's associated with the templates. Make sure you are aware 
> > > > > > > > of the template/appvm relationship...you don't update the 
> > > > > > > > appvm(e.g. sys-whonix), you update the template(whonix-gw) 
> > > > > > > > which is the source for the appvm(sys-whonix).
> > > > > > > > 
> > > > > > > > Other best practices I follow:
> > > > > > > > *Fresh templates seems to be the advice(vs upgrading)
> > > > > > > > *Whonix-gw template is a key template to update as all my 
> > > > > > > > updates are done thru this template/appvms
> > > > > > > > * Get a VPN appvm setup as a priority
> > > > > > > > * Clone your templates and experiment on the clones, this way 
> > > > > > > > you can resort back to your clean template WHEN you F%$# it up 
> > > > > > > > (Not IF...you will at some point mess one up)
> > > > > > > > 
> > > > > > > > Good luck, hope this helps...
> > > > > > > 
> > > > > > > Thank you @tutamail.  This is more like what I was looking for.  
> > > > > > > I've tried most of what you recommend, but not everything.  I'll 
> > > > > > > re-install 4.0 and give your suggestions a try.
> > > > > > > 
> > > > > > > I appreciate the other replies as well.  Sorry if I wasn't clear. 
> > > > > > >  I only tried 4.0.1-rc1 out of desperation. What I want is the 
> > > > > > > latest production 4.0 platform.  Most operating systems have a 
> > > > > > > simple process by which you are informed of packages that are out 
> > > > > > > of date and are offered an opportunity to upgrade them to the 
> > > > > > > most recent version supported by the distributor.  It would be 
> > > > > > > great if Qubes had something like that.  Perhaps someday it will. 
> > > > > > > In the meantime, there ought to be a document that clearly 
> > > > > > > explains how to go from a fresh install to the most recent 
> > > > > > > Qubes-supported version of every package installed in each 
> > > > > > > template and dom0.  It would be even nicer if there were a 
> > > > > > > nightly/weekly build of the same packages used in a fresh 
> > > > > > > install, but all updated to the latest supported version so that 
> > > > > > > we could simply download and install that and know that we have 
> > > > > > > all of the most recent patches and upgrades.
> > > > > > 
> > > > > > I can hear some of you now saying that if I want these things then 
> > > > > > get up off my lazy ass and build them.  If I weren't fully (some 
> > > > > > would say overyly) employed with nothing but free time on my hands, 
> > > > > > I still wouldn't do that because I have other interests.  I'm the 
> > > > > > consumer here.  Some of you seem to forget that.  This is feeback 
> > > > > > coming from a customer.  Treat it as such.
> > > > > > 
> > > > > > I'

[qubes-users] ClipboardPaste "ask" vs "allow" (qrexec question)

2018-12-16 Thread Dave C
There's a comment in /etc/qubes-rpc/policy/qubes.ClipboardPaste:

## Clipboard paste (Ctrl-Shift-V) will treat "ask" as "allow" but only when
## called by this keyboard shortcut. "deny" always deny the operation

This begs the question: how can I paste into a VMs clipboard *not* via the 
keyboard shortcut?

Can qubes.ClipboardPaste be invoked via a qrexec call?  If so, I'd love to see 
an example.  Thanks.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f557a7c0-8127-4c2b-807c-67d298d330a9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] sudo systemctl restart qubes-whonix-torified-updates-proxy-check

2018-12-16 Thread qubes123456
What could it be ? If I enter this command at sys-Whonix: "sudo systemctl 
restart qubes-whonix-torified-updates-proxy-check" and then check it with "sudo 
systemctl status qubes-whonix-torified-updates-proxy-check.service" , Then 
everything is green and everything is fine. But if I enter the same at 
GW-Whonix & at WS-Whonix, then this error message (the written red, see 
screenshot) (screenshot from GW-Whonix Terminal) Thanks in advance

https://ibb.co/BLmyZtk

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82add337-8e1d-4c0f-8b78-83ab53a685fa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] disk space management

2018-12-16 Thread dimi
On Sunday, December 16, 2018 at 11:32:57 PM UTC+2, awokd wrote:
> dimi wrote on 12/13/18 2:10 PM:
> > Having fun with qubes r4 but can't help myself with this problem.
> > 
> > sudo lvs, shows me a bunch of deleted VM's that 'seem' to eat up my disk 
> > space.
> > 
> > 
> > 1) Mostly used  Qubes Manager to delete them. How do you delete appVM's / 
> > TemplateVM's the right way so that no zombies will up on sudo lvs?
> > 
> > 2) Why do i see these deleted VMs in /dev/qubes_dom0/ better yet these 
> > deleted VM's leave stuff / traces on disk in,
> > /dev/mapper/
> > /dev/qubes_dom0/
> > /home/XXX/.config/menus/applications-merged/user-vmName-vm.menu
> > /var/log/qubes/
> > /var/log/xen/
> > 
> > 3) sudo lvdisplay is showing me backups, vm--number-back, are 
> > these actual backups?
> > Aince i do manual backups to another disk, how do i disable these?
> > 
> 1) Can't recreate- might be an LVS thing. Have you rebooted since 
> deleting the VMs?
> 
> 2) Same for /dev/mapper and /dev/qubes_dom0. I do see some stale entries 
> in /home/XXX/.config/menus/applications-merged/user-vmName-vm.menu, 
> though. Might be ones I had restored from 3.2. These can probably be 
> safely deleted. Those log files don't get pruned automatically AFAIK, so 
> you will see old entries out there unless you set up a job to 
> periodically delete old ones.
> 
> 3) Those -back are snapshots kept so you can rollback. See 
> https://www.qubes-os.org/doc/software-update-vm/#reverting-changes-to-a-templatevm-r40
>  
> for a little more info.

1) yes, plenty of reboots have happened
2) pure r4 install here, are you suggesting rm command to delete or some other 
qubes command i am not aware of?
3) well since i deleted the VM's and/or Templates why would i need to keep 
those snapshots around. How do i correctly remove these?
3)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fae4c709-943a-4a75-a6a9-1ea45277f9dc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.