[qubes-users] Black screen when booting Qubes 4.0.1 installer via usb

2019-02-12 Thread Dan Grant
I apologize for repeating a question, but I am new to Google groups and cannot 
figure out (after hours researching) how to post a reply to an existing 
question :(



The question here:



https://groups.google.com/forum/?hl=en#!searchin/qubes-users/efi$20install%7Csort:date/qubes-users/Kt66UCWorrI/dngILbv-HAAJ



describes exactly what I'm seeing. To summarize:



I've installed the 4.0.1 .iso onto a usb drive. When I boot that drive, I see 
the following on a black screen:



"

Xen 4.8.4 (c/s ) EFI loader

Using configuration file 'BOOTX64.cfg'

vmlinuz: 0x000...

initrd.img: 0x000...

0x000:0x00:0x02.0x0: ROM: 0x1 bytes at 0x4e52a018

0x:0x39:0x00.0x1: ROM: 0xd800 bytes at 0x4e4b5018

"



That's it, no errors or any other text, no way to get out of that screen other 
than to force a shut down.



The one reply (from user "awokd") in that thread points here:



https://www.google.com/url?q=https%3A%2F%2Fwww.qubes-os.org%2Fdoc%2Fuefi-troubleshooting%2F%23installation-freezes-before-getting-to-anaconda-qubes-40&sa=D&sntz=1&usg=AFQjCNEl7BS2bWTu5WdbqhuVTcmy_FAwsQ



I've seen that and tried to follow it, but do not understand what it is asking 
me to do...



I am able to comment out the mapbs and noexitboot lines in the [qubes-verbose] 
section of EFI/BOOT/BOOTX64.cfg, but it is not at all clear what is meant in 
step 2 of this section:



https://www.qubes-os.org/doc/uefi-troubleshooting/#change-installer-kernel-parameters-in-uefi



what the following means exactly:



"Edit your xen config (xen.cfg/BOOTX64.cfg) changing the kernel key to add your 
kernel parameters on the boot entry of your choice"



Specifically this bit: "...changing the kernel key to add your kernel 
parameters on the boot entry of your choice"



Does it mean something more than commenting out the mapbs and noexitboot lines 
in the [qubes-verbose] section? I'm guessing yes, as I get the same results 
booting the modified usb installer (black screen with the text shown above), 
but I can't find any indication what the "kernel parameters" I need to add 
might be, where I'd find them, or where I'd add them...



I'm completely stuck, and cannot find any info other than the one link from 
awokd pointing to a doc I can't seem to interpret. Is there some more detailed 
information somewhere I can be pointed to that might help explain what I'm 
seeing and how to fix this?



I apologize again for the duplicate post, and look forward to reading any 
replies.



Thanks!

Dan



ps - I'm attempting to install on a new System76 Galago Pro laptop with Insyde 
HxBios firmware, 8th gen I5 chip, & 32GB RAM

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/168e5ba7783.fefb9ac278723.481544816796232546%40xq42.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qubes-dom0-update dependency missing

2019-02-12 Thread dinky

On 2019-02-11 19:40, di...@airmail.cc wrote:

Attempting to update with 'sudo qubes-dom0-update' results in an error
that nothing provides qubes-mgmt-salt-dom0-update >= 4.0.5 needed for
qubes-desktop-linux-manager.

I can see an appropriate package in the qubes-dom0-current-testing
repository. Do I simply wait for that to be pushed to
qubes-dom0-current or is this a larger problem?

Thank you.


Update was pushed today. Dom0 updated successfully. Thank you.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f611795697300693260aeac3ac7d669e%40airmail.cc.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qvm-copy-to-vm question

2019-02-12 Thread Todd Lasman
I'm not sure if I'm doing this correctly.

According to the usage, the syntax is:
qvm-copy-to-vm destination_qube_name FILE

When I do this, I get a dialog that asks me which qube I want to copy my
file to. Why have this, if I already specified it in the command line?
Is there a way to suppress the dialog? And if not, what's the purpose of
having the destination_qube_name in the command line in the first place?

I'm told that some use qvm-copy instead of qvm-copy-to-vm. Whenever I
use the qvm-copy command (with the destination qube and the file to
copy) I always get the error message "Can't stat destination_qube. File
or directory doesn't exist (or something like that)"

All I want to do is copy a file from one qube to the next without
hassle. Suggestions?

Thanks!

Todd

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190213015855.GA2093%40d1stkfactory.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


Re: [qubes-users] Preparation for a Qubes Installation: Custom Disk encryption?

2019-02-12 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 12/02/2019 3.40 AM, Johannes Graumann wrote:
> Gentlepeople,
> 
> After playing with it on a secondary machine, I'm looking to transition
> from my Arch-setup to Qubes.
> 
> I am traditionally choosing to encrypt my file systems using serpent
> (considered the strongest entry into the AES competition with slightly
> worse speed than the finally choosen Rijndael algorithm) and the
> following partitioning:
> - UEFI-required EFI System Partition, 512MB, EFI System
> - /boot partition (to be encrypted), 512MB, Linux filesystem
> - SWAP partition (to be encrypted using a random key), size of RAM
> (`free -m`) + 1 MiB, Linux filesystem
> - tmp partition (to be encrypted using a random key), 2GB, Linux
> filesystem
> 
> All but the UEFI partition are being encrypted. '/boot' uses a keyfile
> resident in '/' (appropriate grub configuration) and thus PW-protectded 
> through the encryption of '/'.
> 
> Questions:
> 1) Does that make sense (for Qubes)?
> 2) Am I missing something necessary?
> 3) Is there documentation on custom disk encryption and if no: where in
> the installation process would I break out (how) to the CLI to get it
> done?
> 
> Thanks for any hints.
> 
> Sincerely, Joh
> 

This sounds like what you're looking for:

https://www.qubes-os.org/doc/custom-install/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=biVv
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77b58987-23df-d378-eeea-08d38b6ed081%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: off topic - invite codes to 'riseup'

2019-02-12 Thread cristobal . digital
Hello, I also need invite codes to sign up for riseup.
Please share & thank you in advance!!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/499ddd11-63ac-4bb2-a928-a21b4ee87091%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Upgrading from fedora 26->29, one issue and a step-by-step of my experience

2019-02-12 Thread fiasco4297
The Qubes documentation for fedora template upgrades is excellent and I only 
had one issue not covered by it during my upgrade process.

I encountered an error that stated I didn't have fedora29 rpmfusion free and 
nonfree signing keys imported while executing:

[user@fedora-29 ~]$ sudo dnf --releasever=29 --setopt=cachedir=/mnt/removable 
--best --allowerasing distro-sync

I checked /etc/pki/rpm-gpg and sure enough, they were missing, I remember 
looking and it had automatically added fedora 25-28, but not 29.

I imported the keys with the following commands:

[user@fedora-29-1 rpm-gpg]$ sudo rpm --import 
'https://rpmfusion.org/keys?action=AttachFile&do=get&target=RPM-GPG-KEY-rpmfusion-free-fedora-29'

[user@fedora-29-1 rpm-gpg]$ sudo rpm --import 
'https://rpmfusion.org/keys?action=AttachFile&do=get&target=RPM-GPG-KEY-rpmfusion-nonfree-fedora-29'

Is there a better way of doing this that I should have done for the key imports?

If multiple others have had this issue and it's not a one-off to me, I'll 
happily add it to the upgrade docs at the bottom, or on the qubes-community 
github. I figured I'd document this here and on my blog at least.

Blog with my step-by step upgrade details: 
https://fiascoaverted.blogspot.com/2019/02/upgrading-qubes-to-latest-fedora-29.html

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a06e11b7-a796-402d-af13-da9e7a4853d1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Need guidence on setup Yubikey OTP to login webmail

2019-02-12 Thread monday123 . we
Hello All,I'm using Qubes 4.0,w ant to setup Yubikey's OTP function to login 
webmails,having read quite a few posts here and Qubes document,I wan to know 
that,is there a way of use Yubikey as OTP to login webmail WITHOUT change 
anything on dom0,I understand that at this instance yubikey act as HID, a 
keyboard, an input device,so it needs dom0 to allow it,but on the other hand, 
there is no 'input' at here, plus chang anything in dom0 could be risky,so I 
don't want to use that approch.is there any other way? like:Use a standalone 
vm?Or a virtual box in a vm?or a none-qubes tempalte?or any other creative 
ways?Thank you for your advice, if it's a bit advanced, please kindly give some 
description, thanks again.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/201902122106.x1CL61Ik015802%40api2.scryptmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Preparation for a Qubes Installation: Custom Disk encryption?

2019-02-12 Thread Chris Laprise

On 2/12/19 4:40 AM, Johannes Graumann wrote:

Gentlepeople,

After playing with it on a secondary machine, I'm looking to transition
from my Arch-setup to Qubes.

I am traditionally choosing to encrypt my file systems using serpent
(considered the strongest entry into the AES competition with slightly
worse speed than the finally choosen Rijndael algorithm) and the
following partitioning:
- UEFI-required EFI System Partition, 512MB, EFI System
- /boot partition (to be encrypted), 512MB, Linux filesystem
- SWAP partition (to be encrypted using a random key), size of RAM
(`free -m`) + 1 MiB, Linux filesystem
- tmp partition (to be encrypted using a random key), 2GB, Linux
filesystem

All but the UEFI partition are being encrypted. '/boot' uses a keyfile
resident in '/' (appropriate grub configuration) and thus PW-protectded
through the encryption of '/'.


FWIW, if you switch to legacy BIOS boot and your system has a TPM you 
may be able to use the Qubes anti-evil-maid package to guard against 
firmware & boot tampering. Most Qubes users don't seem to opt for it, 
but I thought you might be interested in the extra security.




Questions:
1) Does that make sense (for Qubes)?


On this topic, the sensibility of encryption options with Qubes is about 
the same as for regular Linux distros. Personally, I don't think 
switching away from AES is necessary.



2) Am I missing something necessary?
3) Is there documentation on custom disk encryption and if no: where in
the installation process would I break out (how) to the CLI to get it
done?


Qubes uses the RHEL/Fedora installation tool called 'anaconda' which is 
documented on the Red Hat and Fedora sites. I don't recall if the 
anaconda UI lets you specify the cipher, but the 'kickstart' feature 
does so that might be an option.


Also note that a non-AES cipher may seem nearly as quick as AES for 
access times, however it will have an impact on multitasking performance 
since AES is hardware accelerated while the other ciphers are not on 
most systems.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dad94f39-94b3-dee8-44e7-23601646cbff%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help needed with random rebooting

2019-02-12 Thread Chris
Hello All,

‐‐‐ Original Message ‐‐‐
On Tuesday, February 12, 2019 9:16 AM, Chris  wrote:

> Hello All,
>
> Any tips on where to look would be appreciated.

Update - I have unplugged my USB mouse and currently OK!

Regards,

Chris

-
Chris Willard
ch...@meliser.co.uk

Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/Q2C7R4NOOyflJRQ62nfuBsUPa0vxDF0M0TSFRuvqwq7b_rfLqOXyNMg-f_7gRfxsWL_wtALyQ65letxM9Prvlj9NScPBulQoLYCk109AVnY%3D%40meliser.co.uk.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Preparation for a Qubes Installation: Custom Disk encryption?

2019-02-12 Thread Johannes Graumann
Gentlepeople,

After playing with it on a secondary machine, I'm looking to transition
from my Arch-setup to Qubes.

I am traditionally choosing to encrypt my file systems using serpent
(considered the strongest entry into the AES competition with slightly
worse speed than the finally choosen Rijndael algorithm) and the
following partitioning:
- UEFI-required EFI System Partition, 512MB, EFI System
- /boot partition (to be encrypted), 512MB, Linux filesystem
- SWAP partition (to be encrypted using a random key), size of RAM
(`free -m`) + 1 MiB, Linux filesystem
- tmp partition (to be encrypted using a random key), 2GB, Linux
filesystem

All but the UEFI partition are being encrypted. '/boot' uses a keyfile
resident in '/' (appropriate grub configuration) and thus PW-protectded 
through the encryption of '/'.

Questions:
1) Does that make sense (for Qubes)?
2) Am I missing something necessary?
3) Is there documentation on custom disk encryption and if no: where in
the installation process would I break out (how) to the CLI to get it
done?

Thanks for any hints.

Sincerely, Joh


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/038dcac4b42e2852a4d3d7a0644fc8251ea1dc4c.camel%40graumannschaft.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Help needed with random rebooting

2019-02-12 Thread Chris
Hello All,

I am having problems with my Qubes laptop rebooting and am after some advice on 
where to look for the problem.

I have a Lenovo ThinkPad W520 which randomly reboots and then tries to boot 
from the network. Powering it off fixes the problem until it happens again - 
once or twice a day.

Any tips on where to look would be appreciated.

Regards,

Chris

-
Chris Willard
ch...@meliser.co.uk

Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ERa-acMzp5_6Srhwr3Mnj45zRTO2ELPo0yGG4IEMmPuCH1L04smyTrTrSJiW_y_SnqK-xNgxK4mp2JqPy6aMGffO-JwEMF1_oTY9PD1WEDs%3D%40meliser.co.uk.
For more options, visit https://groups.google.com/d/optout.