[qubes-users] Black screen when booting Qubes 4.0.1 installer via usb
I apologize for repeating a question, but I am new to Google groups and cannot figure out (after hours researching) how to post a reply to an existing question :( The question here: https://groups.google.com/forum/?hl=en#!searchin/qubes-users/efi$20install%7Csort:date/qubes-users/Kt66UCWorrI/dngILbv-HAAJ describes exactly what I'm seeing. To summarize: I've installed the 4.0.1 .iso onto a usb drive. When I boot that drive, I see the following on a black screen: " Xen 4.8.4 (c/s ) EFI loader Using configuration file 'BOOTX64.cfg' vmlinuz: 0x000... initrd.img: 0x000... 0x000:0x00:0x02.0x0: ROM: 0x1 bytes at 0x4e52a018 0x:0x39:0x00.0x1: ROM: 0xd800 bytes at 0x4e4b5018 " That's it, no errors or any other text, no way to get out of that screen other than to force a shut down. The one reply (from user "awokd") in that thread points here: https://www.google.com/url?q=https%3A%2F%2Fwww.qubes-os.org%2Fdoc%2Fuefi-troubleshooting%2F%23installation-freezes-before-getting-to-anaconda-qubes-40&sa=D&sntz=1&usg=AFQjCNEl7BS2bWTu5WdbqhuVTcmy_FAwsQ I've seen that and tried to follow it, but do not understand what it is asking me to do... I am able to comment out the mapbs and noexitboot lines in the [qubes-verbose] section of EFI/BOOT/BOOTX64.cfg, but it is not at all clear what is meant in step 2 of this section: https://www.qubes-os.org/doc/uefi-troubleshooting/#change-installer-kernel-parameters-in-uefi what the following means exactly: "Edit your xen config (xen.cfg/BOOTX64.cfg) changing the kernel key to add your kernel parameters on the boot entry of your choice" Specifically this bit: "...changing the kernel key to add your kernel parameters on the boot entry of your choice" Does it mean something more than commenting out the mapbs and noexitboot lines in the [qubes-verbose] section? I'm guessing yes, as I get the same results booting the modified usb installer (black screen with the text shown above), but I can't find any indication what the "kernel parameters" I need to add might be, where I'd find them, or where I'd add them... I'm completely stuck, and cannot find any info other than the one link from awokd pointing to a doc I can't seem to interpret. Is there some more detailed information somewhere I can be pointed to that might help explain what I'm seeing and how to fix this? I apologize again for the duplicate post, and look forward to reading any replies. Thanks! Dan ps - I'm attempting to install on a new System76 Galago Pro laptop with Insyde HxBios firmware, 8th gen I5 chip, & 32GB RAM -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/168e5ba7783.fefb9ac278723.481544816796232546%40xq42.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qubes-dom0-update dependency missing
On 2019-02-11 19:40, di...@airmail.cc wrote: Attempting to update with 'sudo qubes-dom0-update' results in an error that nothing provides qubes-mgmt-salt-dom0-update >= 4.0.5 needed for qubes-desktop-linux-manager. I can see an appropriate package in the qubes-dom0-current-testing repository. Do I simply wait for that to be pushed to qubes-dom0-current or is this a larger problem? Thank you. Update was pushed today. Dom0 updated successfully. Thank you. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f611795697300693260aeac3ac7d669e%40airmail.cc. For more options, visit https://groups.google.com/d/optout.
[qubes-users] qvm-copy-to-vm question
I'm not sure if I'm doing this correctly. According to the usage, the syntax is: qvm-copy-to-vm destination_qube_name FILE When I do this, I get a dialog that asks me which qube I want to copy my file to. Why have this, if I already specified it in the command line? Is there a way to suppress the dialog? And if not, what's the purpose of having the destination_qube_name in the command line in the first place? I'm told that some use qvm-copy instead of qvm-copy-to-vm. Whenever I use the qvm-copy command (with the destination qube and the file to copy) I always get the error message "Can't stat destination_qube. File or directory doesn't exist (or something like that)" All I want to do is copy a file from one qube to the next without hassle. Suggestions? Thanks! Todd -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190213015855.GA2093%40d1stkfactory. For more options, visit https://groups.google.com/d/optout. signature.asc Description: Digital signature
Re: [qubes-users] Preparation for a Qubes Installation: Custom Disk encryption?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 12/02/2019 3.40 AM, Johannes Graumann wrote: > Gentlepeople, > > After playing with it on a secondary machine, I'm looking to transition > from my Arch-setup to Qubes. > > I am traditionally choosing to encrypt my file systems using serpent > (considered the strongest entry into the AES competition with slightly > worse speed than the finally choosen Rijndael algorithm) and the > following partitioning: > - UEFI-required EFI System Partition, 512MB, EFI System > - /boot partition (to be encrypted), 512MB, Linux filesystem > - SWAP partition (to be encrypted using a random key), size of RAM > (`free -m`) + 1 MiB, Linux filesystem > - tmp partition (to be encrypted using a random key), 2GB, Linux > filesystem > > All but the UEFI partition are being encrypted. '/boot' uses a keyfile > resident in '/' (appropriate grub configuration) and thus PW-protectded > through the encryption of '/'. > > Questions: > 1) Does that make sense (for Qubes)? > 2) Am I missing something necessary? > 3) Is there documentation on custom disk encryption and if no: where in > the installation process would I break out (how) to the CLI to get it > done? > > Thanks for any hints. > > Sincerely, Joh > This sounds like what you're looking for: https://www.qubes-os.org/doc/custom-install/ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlxjdecACgkQ203TvDlQ MDBnOBAAljqLh5JK+O1uTHK1DEcGvgpcOMgNOm+r5MfVgUP3Qh3kAPmjidR4npYr e4Ok/4vk1lP+7W6Nst3y8hoiPXwXwFGthwnjjPp4SQBZsEtY2l3nCq+QyoNKTmjC iUtqq4IUue+Mp2WFDvzTfeZTSffMseYb5yRl9HPnB+NKnfiPf9LkBGeziETYztpt woSv6QoULh1f2aUc6PrDH/3ExJot4RB8uZ8z+DlTq56fhcvTnapk20p7yNTwwXd4 T7I961nE3lHqWMgBCAURY2HtQfqd/2NvV8aIVhD/qAIP0f+QjFFpvm9fOVdyTNC/ NR+AKJaUPMvxxea+7d+Z8k3xro7Il+Tj1gI2RGPoooHz3xAvp6mnHSVr5fGE93fk t3wkM4tS2ttPN4Un53EpDwXbqvbWvPdXqnv92zPU+e1Kz3OsZto4vkYiBtd0XErp pUAvNFqEb4e3o/1TB2FYL2feQkFp9lUMoYT0AUCDNRvyu/tKm5QcblYO5lTiKQW8 KArf7ly5F++9J7kb5q8IjPXMF+24gtGi6HYvI5/qJg5hDh87+C3mluqNJe++JdFc rZAvc5xAHZFsU55T8a2Unve2KlzDZvj8qLuxGFL8BPZTyI7fYl7rxWhL4nnmQjWP +gLH3EKXenL3sUQzbuk9j1n9pF3c9/qXJfwozv+8/HjP1Gm9uSk= =biVv -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/77b58987-23df-d378-eeea-08d38b6ed081%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: off topic - invite codes to 'riseup'
Hello, I also need invite codes to sign up for riseup. Please share & thank you in advance!! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/499ddd11-63ac-4bb2-a928-a21b4ee87091%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Upgrading from fedora 26->29, one issue and a step-by-step of my experience
The Qubes documentation for fedora template upgrades is excellent and I only had one issue not covered by it during my upgrade process. I encountered an error that stated I didn't have fedora29 rpmfusion free and nonfree signing keys imported while executing: [user@fedora-29 ~]$ sudo dnf --releasever=29 --setopt=cachedir=/mnt/removable --best --allowerasing distro-sync I checked /etc/pki/rpm-gpg and sure enough, they were missing, I remember looking and it had automatically added fedora 25-28, but not 29. I imported the keys with the following commands: [user@fedora-29-1 rpm-gpg]$ sudo rpm --import 'https://rpmfusion.org/keys?action=AttachFile&do=get&target=RPM-GPG-KEY-rpmfusion-free-fedora-29' [user@fedora-29-1 rpm-gpg]$ sudo rpm --import 'https://rpmfusion.org/keys?action=AttachFile&do=get&target=RPM-GPG-KEY-rpmfusion-nonfree-fedora-29' Is there a better way of doing this that I should have done for the key imports? If multiple others have had this issue and it's not a one-off to me, I'll happily add it to the upgrade docs at the bottom, or on the qubes-community github. I figured I'd document this here and on my blog at least. Blog with my step-by step upgrade details: https://fiascoaverted.blogspot.com/2019/02/upgrading-qubes-to-latest-fedora-29.html -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a06e11b7-a796-402d-af13-da9e7a4853d1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Need guidence on setup Yubikey OTP to login webmail
Hello All,I'm using Qubes 4.0,w ant to setup Yubikey's OTP function to login webmails,having read quite a few posts here and Qubes document,I wan to know that,is there a way of use Yubikey as OTP to login webmail WITHOUT change anything on dom0,I understand that at this instance yubikey act as HID, a keyboard, an input device,so it needs dom0 to allow it,but on the other hand, there is no 'input' at here, plus chang anything in dom0 could be risky,so I don't want to use that approch.is there any other way? like:Use a standalone vm?Or a virtual box in a vm?or a none-qubes tempalte?or any other creative ways?Thank you for your advice, if it's a bit advanced, please kindly give some description, thanks again. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/201902122106.x1CL61Ik015802%40api2.scryptmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Preparation for a Qubes Installation: Custom Disk encryption?
On 2/12/19 4:40 AM, Johannes Graumann wrote: Gentlepeople, After playing with it on a secondary machine, I'm looking to transition from my Arch-setup to Qubes. I am traditionally choosing to encrypt my file systems using serpent (considered the strongest entry into the AES competition with slightly worse speed than the finally choosen Rijndael algorithm) and the following partitioning: - UEFI-required EFI System Partition, 512MB, EFI System - /boot partition (to be encrypted), 512MB, Linux filesystem - SWAP partition (to be encrypted using a random key), size of RAM (`free -m`) + 1 MiB, Linux filesystem - tmp partition (to be encrypted using a random key), 2GB, Linux filesystem All but the UEFI partition are being encrypted. '/boot' uses a keyfile resident in '/' (appropriate grub configuration) and thus PW-protectded through the encryption of '/'. FWIW, if you switch to legacy BIOS boot and your system has a TPM you may be able to use the Qubes anti-evil-maid package to guard against firmware & boot tampering. Most Qubes users don't seem to opt for it, but I thought you might be interested in the extra security. Questions: 1) Does that make sense (for Qubes)? On this topic, the sensibility of encryption options with Qubes is about the same as for regular Linux distros. Personally, I don't think switching away from AES is necessary. 2) Am I missing something necessary? 3) Is there documentation on custom disk encryption and if no: where in the installation process would I break out (how) to the CLI to get it done? Qubes uses the RHEL/Fedora installation tool called 'anaconda' which is documented on the Red Hat and Fedora sites. I don't recall if the anaconda UI lets you specify the cipher, but the 'kickstart' feature does so that might be an option. Also note that a non-AES cipher may seem nearly as quick as AES for access times, however it will have an impact on multitasking performance since AES is hardware accelerated while the other ciphers are not on most systems. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dad94f39-94b3-dee8-44e7-23601646cbff%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Help needed with random rebooting
Hello All, ‐‐‐ Original Message ‐‐‐ On Tuesday, February 12, 2019 9:16 AM, Chris wrote: > Hello All, > > Any tips on where to look would be appreciated. Update - I have unplugged my USB mouse and currently OK! Regards, Chris - Chris Willard ch...@meliser.co.uk Sent with [ProtonMail](https://protonmail.com) Secure Email. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/Q2C7R4NOOyflJRQ62nfuBsUPa0vxDF0M0TSFRuvqwq7b_rfLqOXyNMg-f_7gRfxsWL_wtALyQ65letxM9Prvlj9NScPBulQoLYCk109AVnY%3D%40meliser.co.uk. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Preparation for a Qubes Installation: Custom Disk encryption?
Gentlepeople, After playing with it on a secondary machine, I'm looking to transition from my Arch-setup to Qubes. I am traditionally choosing to encrypt my file systems using serpent (considered the strongest entry into the AES competition with slightly worse speed than the finally choosen Rijndael algorithm) and the following partitioning: - UEFI-required EFI System Partition, 512MB, EFI System - /boot partition (to be encrypted), 512MB, Linux filesystem - SWAP partition (to be encrypted using a random key), size of RAM (`free -m`) + 1 MiB, Linux filesystem - tmp partition (to be encrypted using a random key), 2GB, Linux filesystem All but the UEFI partition are being encrypted. '/boot' uses a keyfile resident in '/' (appropriate grub configuration) and thus PW-protectded through the encryption of '/'. Questions: 1) Does that make sense (for Qubes)? 2) Am I missing something necessary? 3) Is there documentation on custom disk encryption and if no: where in the installation process would I break out (how) to the CLI to get it done? Thanks for any hints. Sincerely, Joh -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/038dcac4b42e2852a4d3d7a0644fc8251ea1dc4c.camel%40graumannschaft.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Help needed with random rebooting
Hello All, I am having problems with my Qubes laptop rebooting and am after some advice on where to look for the problem. I have a Lenovo ThinkPad W520 which randomly reboots and then tries to boot from the network. Powering it off fixes the problem until it happens again - once or twice a day. Any tips on where to look would be appreciated. Regards, Chris - Chris Willard ch...@meliser.co.uk Sent with [ProtonMail](https://protonmail.com) Secure Email. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ERa-acMzp5_6Srhwr3Mnj45zRTO2ELPo0yGG4IEMmPuCH1L04smyTrTrSJiW_y_SnqK-xNgxK4mp2JqPy6aMGffO-JwEMF1_oTY9PD1WEDs%3D%40meliser.co.uk. For more options, visit https://groups.google.com/d/optout.