[qubes-users] Re: Install on an up to date Macbook
Am Dienstag, 2. Juli 2019 13:24:17 UTC+2 schrieb Matthias Brumm: > Am Samstag, 29. Juni 2019 01:25:07 UTC+2 schrieb Daniil Travnikov: > > Do not leave this thread after your any steps (successful or not) because I > > want to buy Macbook 12-inch for Qubes OS in near future. And I will keep my > > eyes on this thread. Thank you in advance. > > At the moment the systems boots up and presents me a black screen with > mouse-cursor and restarts a short while after that. > I have a booted system now, but without working keyboard, trackpad (using external keyboard+mouse), wifi (crashing when attaching to sys-net). Perhaps Apple is doing some nasty things to lock up their Macbook. Matthias -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8e7a3adc-92f3-458c-92d9-674fe851b82d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: No vpn-handler-openvpn in service tab
On Thursday, July 4, 2019 at 3:49:42 AM UTC, Chris Laprise wrote: > On 7/3/19 5:34 PM, Philip Pians wrote: > > Must be doing something wrong? Wanted to do the test stage and discovered > > no file called vpn-client-conf. There’s only Openvpn.ovpn; ca.crt; > > client.crt, and client.key that download from VPN provider. Help please. > > > > Where it says: > > sudo cp US_East.ovpn vpn-client.conf > > ...the 'US_East.ovpn' is just an example. So you would do this instead: > > sudo cp Openvpn.ovpn vpn-client.conf > > -- > > Chris Laprise, tas...@posteo.net > https://github.com/tasket > https://twitter.com/ttaskett > PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 Ooh, overlooked that step. How about the directory called “Qubes-vpn-support” that is supposed to be copied? Or is that another directory I can just create? Qubes is starting to make me feel computer illiterate since can’t even get the basics right. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a7183528-77f0-498d-8e7e-ed40bbec12b3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Quick question please, need help!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 03/07/2019 3.11 AM, Sphere wrote: > I'm not particularly knowledgeable about the verification process > being done by dnf on the signature of packages so the question > still lies on me: Is downloading packages from plaintext http > susceptible to MITM? > Suppose an attacker intercepts a package with a valid signature, modifies it, then passes it along to you. When you receive it, dnf (technically gpgv) will not be able to verify the signature (since the package has been modified), so the package won't be installed. In this sense, the MITM attempt will fail. Of course, there's no such thing as perfect security, so an MITM is technically possible if the attacker were find some way to defeat this system, e.g., obtain a copy of the signing key or craft malicious input that exploits a vulnerability in gpgv. (This is why signing keys are closely guarded and gpgv is intentionally simpler and harder to exploit than gpg.) > Even if that is not the case, I believe we can't be for sure that > there's no exploitable vulnerability on dnf involving packages > poisoned either from the source itself or in transit through > plaintext http. > Correct. We can never be sure that there isn't some security flaw that we haven't discovered yet. This is, in fact, a fundamental tenet of the Qubes philosophy: All software has bugs, and we can't fix them all. As we speak, bug software is being written around the world. Even if we tried, we couldn't fix them quickly enough to keep up with the rate at which they're being produced. Instead, we compartmentalize. Separate things in their own boxes so that when bugs inevitably bite, the damage is limited. For the software we can't compartmentalize, keep it as minimal as possible. In any case, it would better to have both signed packages _and_ transit via HTTPS. If I had to choose just one, I'd pick signed packages, since it wouldn't be difficult for an attacker to serve malicious packages over HTTPS. But, again, both would be better. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl0dlZMACgkQ203TvDlQ MDA2XhAAkvv5gxEvQa+D1hgN0eyFeptmNV2ze1NkZrd979ZOC2vnTGNKefRyzcQ+ obBwKOUv8w3czdxRlKx1JJ7gthJYyEukWYIv3mxqYG8ZLx8ZMIvQBU4G7445nrtY S2FaeVrLH6useEUUhpWRQQxWQnLJfuQseEYaS+8i4db9KhslBEcVUlp4BkUVnjcA oCfSSiSjUX6YUP0wcq44dZKQBlzf1V9QYR+K/y+r0B5qngrFF2QyAsUy5fXNQPvA NKbq5tKOU2zOHsuNVSCxokHI1uZkS5pU/hdNxEDslSBM3SiL+numYnrREamgdg9q w0SPCXptJagD/EI3U9jk2CmTYt8kMajiHgDttSqEvG32rp+z1IZwJ0Ku6DTgk7O1 ce3GqD3b1NERjM8VDVdDor0T+4rEnPPfznvEHHcOzdXzS93rU4wxiCjLy4nXK0Ah FqXHAu64u3Z+CKw05WbprcL3xJ1DVULJtPOnrwiiZ88UV327OFZwRJUSS22DrPsC kkvHkJ6kUuM9IFNyXLjrWQnTbFCl+KFhGXDWPS3px8dQwK+l/3idQL4gnxAa8Ygy Dv7ttr9OGqfSLmuZco+nU5KqJ44hgvvpRS/Y/0amumpbsxKJizKn34nLXSQjODc/ CPqDZCQOskKIMaUyD71r81Vj+/iCj21iZLv9Gh4POK0WrHdZXVY= =fWbd -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/efeda109-da60-cbcf-d2b9-759803ecc2d8%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Browsers
On 7/3/19 1:22 AM, 'Epinsion Polickye' via qubes-users wrote: Hi, I am attempting to use my personal domain to use a few services, however I'm finding a particular issue with two services. When I attempt to watch some particular videos from pluralsight, or access a service in Office365, the site loops / reloads 3-20 times before failing to load the resource. Errors in the browser console seem to indicate it is to do will supported file types and codecs. I don't have any blockers, issues with cookies, issues with filters. Attempted to resolve by installing some gstreamer plugins to no avail (with untrusted repos, without checking signatures etc). Can anyone provide recommended reading for: - Trusting new repos, adding them, verifying signatures, and why (what threats am I defending against, and the likelihood of such threats occuring?) - Linux video and audio formats, mimetypes, the defaults, how to add all of them / common types (good, bad, and ugly) - Linux + firefox - getting the services I mentioned to work, and ensure codecs and the like are available for other services in the future (want to avoid a similar issue - disruptive to productivity) - advice if anyone has come across such issues before Thanks a heap. I'm guessing you might want to try a less secure, and hence easier to use linux distro While you can get a lot of multimedia working, there is a trade off for security by isolation maybe you might want to try this with maybe Fedora-30 https://www.qubes-os.org/doc/multimedia/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2f2acf3a-8350-f950-57b7-6a336ab22a69%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Whonix 15 has been released
On 7/4/19 4:14 AM, dimi wrote: I think the whonix upgrade guide is missing how to handle the a) renaming of the now upgraded templates or b) deleting them. I tried renaming 14 to 15 and ended up with new templates having the upgraded name with 15 in them. Maybe this is just a problem with Qubes Manager. Please advice how to proceed, delete the new 15 templates and manually rename the 14 ones to 15 or manually delete the upgraded 14 templates? they usually want you to ask Whonix questions on the Qubes-Whonix forum fwiw https://forums.whonix.org/c/qubes-whonix -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7c8970ee-8aab-dbb3-1c6f-b32c1da3f2df%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
On Wednesday, July 3, 2019 at 7:10:13 PM UTC-7, awokd wrote: > drok...@gmail.com: > > > Followed the instructions, removed ALL whonix stuff. > > > > To install new version, you run: > > > > sudo qubesctl state.sls qvm.anon-whonix > > > > All that did was re-install all of the whonix-14 stuff I just removed. > > Back to where I started. > > Well, huh. Here's the merge to master that should have set it to pull > -15 instead. Try updating that jinja file manually per Jon's suggestion? Actually, I found an easier way. The way it should be, really. >From dom0 terminal: sudo qubes-dom0-update --enablerepo=qubes-templates-community --action=install qubes-template-whonix-gw-15 sudo qubes-dom0-update --enablerepo=qubes-templates-community --action=install qubes-template-whonix-ws-15 Works fine here. Can't upgrade from Qube Manager, but can upgrade manually from a terminal: sudo apt-get-update-plus dist-upgrade When a new template comes out, should be easy to upgrade to, or at a minimum, just remove, then install new one. I'll stick with these for now. Works. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/22b59509-aadc-4925-83e9-502435d4fcb1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Whonix 15 has been released
I think the whonix upgrade guide is missing how to handle the a) renaming of the now upgraded templates or b) deleting them. I tried renaming 14 to 15 and ended up with new templates having the upgraded name with 15 in them. Maybe this is just a problem with Qubes Manager. Please advice how to proceed, delete the new 15 templates and manually rename the 14 ones to 15 or manually delete the upgraded 14 templates? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f3c06a2b-6bfb-4f25-9d5d-23ddb0842746%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: No vpn-handler-openvpn in service tab
On 7/3/19 5:34 PM, Philip Pians wrote: Must be doing something wrong? Wanted to do the test stage and discovered no file called vpn-client-conf. There’s only Openvpn.ovpn; ca.crt; client.crt, and client.key that download from VPN provider. Help please. Where it says: sudo cp US_East.ovpn vpn-client.conf ...the 'US_East.ovpn' is just an example. So you would do this instead: sudo cp Openvpn.ovpn vpn-client.conf -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/74e7f001-09dd-86eb-8181-f38e38f07728%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Whonix 15 has been released
Jon deps: > On 7/3/19 8:33 PM, 'awokd' via qubes-users wrote: >> dom0: dnf list installed > > well this doesn't show the version all the other qubes-mgmt-salt show > versions but Not > > qubes-mgmt-salt-dom0-virtual-machines.noarch Try dnf info then. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/971c0027-cc53-69b5-175f-41e1997372b4%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
drok...@gmail.com: > Followed the instructions, removed ALL whonix stuff. > > To install new version, you run: > > sudo qubesctl state.sls qvm.anon-whonix > > All that did was re-install all of the whonix-14 stuff I just removed. Back > to where I started. Well, huh. Here's the merge to master that should have set it to pull -15 instead. Try updating that jinja file manually per Jon's suggestion? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ffb99288-0b12-625b-cbcb-76e4c82d5a0d%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Debian-10 Buster coming in 3 days? scheduled for July 6th
Just read an article, that says Buster is scheduled to be released this Saturday, July 6th. Any confirmation of this? https://itsfoss.com/debian-10-buster/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5213110a-4b13-47c7-9433-dbdbdff241c6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: sys-net does not start applications
"You need at least one network capable device in there. Try onboard ethernet if possible, that is usually problem free. Once sys-net starts up normally, there should be an icon in the top right to configure networking." -- I tried ethernet as a last resort. It did not work. Also, the icon at the top right did not show up. Occasionally, a white box would appear and disappear quickly. I also had other issues, and I had many errors while installing Qubes (probably because I am a noob and I fucked it up). I had downloaded Qubes on Friday (2019-06-28). I re-downloaded and reinstalled Qubes and have connected to the internet and updated :) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/Liu7QI6--3-1%40tutanota.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Whonix 15 has been released
On 7/3/19 8:33 PM, 'awokd' via qubes-users wrote: Jon deps: besides the script if you don't change the "jinja" file, you won't get -15 installed Well it's in his docs for New Install , added after the other elements were, apparently The version of mgmt-salt-dom0-virtual-machine I mentioned should cover that. re: removing old anon-whonix TBA-AppVMs I believe Patrick said: you can either remove sys-whonix (on my machine sys-whonix-14) before new install or just leave it (and presumably have it set to 'dummy template' -- not sure why can't just set it to any other template temporarily ) so presumably that goes for anon-whonix and its just like any other template upgrade , reassigning to the new upgraded Template Thanks, wasn't sure! He just made the remark re: sys-whonix so its just a presumption PS : how would I check I'm on the correct mgmt-salt-dom0-virtual-machine dom0: dnf list installed well this doesn't show the version all the other qubes-mgmt-salt show versions but Not qubes-mgmt-salt-dom0-virtual-machines.noarch dom0 ~]$ dnf list -v installed|grep mgmt qubes-mgmt-salt.noarch 4.0.18-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-admin-tools.noarch 4.0.18-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-base.noarch4.0.3-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-base-config.noarch 4.0.1-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-base-overrides.noarch 4.0.2-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-base-overrides-libs.noarch qubes-mgmt-salt-base-topd.noarch 4.0.1-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-config.noarch 4.0.18-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-dom0.noarch4.0.18-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-dom0-qvm.noarch4.0.8-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-dom0-update.noarch 4.0.8-1.fc25 @qubes-dom0-cached qubes-mgmt-salt-dom0-virtual-machines.noarch -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f9f16faa-640e-ba6d-2dc5-95aebf069743%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
On Wednesday, July 3, 2019 at 1:13:58 PM UTC-7, awokd wrote: > Daniil Travnikov: > > On Wednesday, July 3, 2019 at 6:52:03 PM UTC+3, dro...@gmail.com wrote: > >> On Wednesday, July 3, 2019 at 8:21:44 AM UTC-7, Daniil Travnikov wrote: > >>> On Wednesday, July 3, 2019 at 5:43:26 PM UTC+3, dro...@gmail.com wrote: > Unless you want to join the testing efforts, I would wait until Qubes > releases official whonix templates, before trying to install the new > version. > >>> > >>> What do you mean? I thought 15 version of Whonix already official in > >>> Qubes. Or I am missing something? > >> > >> No, it was officially released by WHONIX, not by Qubes. I'm sure the > >> Qubes engineers are working on an official template as we speak. > > > > Tell me please where did you find official Whonix template released by > > Qubes engineers? I mean for example if I have now the 13 version of Whonix, > > where could I get the 14 version from? > > > Please see https://www.whonix.org/wiki/Qubes/Install to upgrade your > Whonix qubes. 13 is out of date and unsupported. 15 is the new version. > > Whonix templates are developed and maintained by the Whonix team. They > are available from the Qubes "community" repo. Following the linked > procedure will result in them getting downloaded from there. Unless > there have been some recent developments, they are not technically Qubes > official templates- those are located in the templates-itl repo. > > In other words, Qubes-Whonix 15 is as official as it's going to get. :) > Looks like Qubes 4.0.2 is on the way which will include the updated > templates too, but it could be a couple months: > https://github.com/QubesOS/qubes-issues/issues/5108. Followed the instructions, removed ALL whonix stuff. To install new version, you run: sudo qubesctl state.sls qvm.anon-whonix All that did was re-install all of the whonix-14 stuff I just removed. Back to where I started. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cf116711-1031-4cb1-b2ab-f32440925cec%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: No vpn-handler-openvpn in service tab
Must be doing something wrong? Wanted to do the test stage and discovered no file called vpn-client-conf. There’s only Openvpn.ovpn; ca.crt; client.crt, and client.key that download from VPN provider. Help please. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5f65d229-2ef6-4ee9-a854-b3a929efb1bf%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] using static dispVM for sys-net
Jon deps: > https://www.qubes-os.org/doc/disposablevm-customization/#using-static-disposablevms-for-sys- > > > > I can't really understand what the differences would be with a static > dispvm (based on a dispvm-template) vs just a regular sys-net > > if nothing is disposed (static) isn't it just the same > "Static" there refers to the name and VM configuration, not the contents. You only have to set them up once, not every time. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/58389039-296c-42ef-9dce-11d6e0ba059d%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Fwd: Us congress hearing of maan alsaan Money laundry قضية الكونغجرس لغسيل الأموال للمليادير معن الصانع
YouTube videos of U.S. Congress money laundering hearing of Saudi Billionaire " Maan Al sanea" with *bank of America* and The owner of Saad Hospital and Schools in the Eastern Province in *Saudi Arabia* and the Chairman of the Board of Directors of Awal Bank in *Bahrain* With Arabic Subtitles *موقع اليوتيوب الذي عرض جلسة استماع الكونجرس الأمريكي * * لمتابعة نشاطات غسل الأموال ونشاطات* *السعودي معن عبدالواحد الصانع* *مالك مستشفى وشركة سعد ومدارس سعد بالمنطقة الشرقية بالسعودية ورئيس مجلس ادارة بنك اوال البحريني* *مترجم باللغة العربية* http://www.youtube.com/watch?v=mIBNnQvhU8s -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CANaYHjwQ2RBEwfVhgVrn0JKX0ZtgPLka-6EG4CL-STJd%2B8q8DA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Disabling qubes-netvm
Am Mittwoch, 3. Juli 2019 22:31:16 UTC+2 schrieb awokd: > That's too bad; Broadcom wifi adapters are notorious for Linux > unfriendliness. What's the model #? It's possible someone else figured > out how to get it working, or I suppose it's possible there's no fix. > I was going to suggest using Ethernet, but then I remembered you said "a > modern Macbook"... Yes. Actualy I just hope to get compiz working as I am dependant onb a good working screen zoom as on OSX. Then I am sure to use it as a daily driver, when getting some Lenovo gear. Matthias -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9ce09ca2-5c85-4a45-a0b3-dda7b2549f21%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Whonix 15 has been released
Jon deps: > besides the script if you don't change the "jinja" file, you won't get > -15 installed The version of mgmt-salt-dom0-virtual-machine I mentioned should cover that. > re: removing old anon-whonix TBA-AppVMs > I believe Patrick said: you can either remove sys-whonix (on my machine > sys-whonix-14) before new install or just leave it (and presumably > have it set to 'dummy template' -- not sure why can't just set it to any > other template temporarily ) > > so presumably that goes for anon-whonix and its just like any other > template upgrade , reassigning to the new upgraded Template Thanks, wasn't sure! > PS : how would I check I'm on the correct mgmt-salt-dom0-virtual-machine dom0: dnf list installed -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/11d66501-7891-9ad1-da22-575dbb77e493%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Disabling qubes-netvm
Matthias Brumm: > Am Mittwoch, 3. Juli 2019 09:17:02 UTC+2 schrieb Matthias Brumm: > >> That was a very good idea. After editing the xml file I got to the stage 2 >> and I think Qubes had to do some last steps. Then Qubes OS booted. When I >> have the time, I can now look into enabling network etc. >> >> When I am done, I try to make a short section for the macbook >> troubleshooting information. > > I don't know, if Qubes is possible on a modern Macbook. I have tried several > ways to attach the Broadcom wifi to sys-net, but either it is not shown in > the machine or the system freezes. > > And this struggles before trying to get the keyboard and touchpad running > (still using USB keyboard and mouse. > > Apple seems to do a great work in locking their system up. > > Perhaps I can get a new laptop for my work in some months or so. That's too bad; Broadcom wifi adapters are notorious for Linux unfriendliness. What's the model #? It's possible someone else figured out how to get it working, or I suppose it's possible there's no fix. I was going to suggest using Ethernet, but then I remembered you said "a modern Macbook"... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a9b9802c-c4cd-64b9-2392-81993c683b51%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
[qubes-users] using static dispVM for sys-net
am curious if anyone actually does this , and how or would it make any sense instead to use a static sys-firewall , if I just have the default sys-firewall (which might be easier because there would not be a need for the PCI setup ?each time) https://www.qubes-os.org/doc/disposablevm-customization/#using-static-disposablevms-for-sys- I can't really understand what the differences would be with a static dispvm (based on a dispvm-template) vs just a regular sys-net if nothing is disposed (static) isn't it just the same -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a18a7bec-e905-4fb6-e4fa-75810f52709d%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Whonix 15 has been released
On 7/3/19 6:54 PM, 'awokd' via qubes-users wrote: Daniil Travnikov: On Wednesday, July 3, 2019 at 4:24:01 AM UTC+3, haaber wrote: The "instructions" on the whonix webpage are more than confusing. There are 3 alternative "ways" suggested. Which one is best /advised? I got the impression that a complete reinstall requires (a) a fedora appvm (I have none), (b) does *not* work over TOR, since the AppVM's based on whonix must be removed (or set to dummy template) before removing the whonix-14-templates. Then sys-whonix is gone, right? That seems awkward asprocedure. Can someone explain, please? Why can't I install whonix-gw-15 and whonix-ws-15 via dnf in dom0 and THEN remove the *-14-* ones? Cheers, Bernhard Thank you for your post, I thought that I am alone, but I think the same. I don't understand why in Qubes we can't install Whonix Templates of any version from Dom0 like we usually do when we want to install Fedora, for example: sudo qubes-dom0-update qubes-template-fedora-XX I don't see why you couldn't, but you should possibly recreate sys-whonix and anon-whonix. Not sure it's safe to re-use them. You should try to use the Salt commands to do this, once you have the -15 templates installed and the -14 and sys/anon-whonix removed. Make sure you're on mgmt-salt-dom0-virtual-machines v4.0.16 or higher. If you are doing it manually, you should review everything the scripts do to make sure you've run the appropriate qvm-features commands, etc. Not following all the same steps as the Salt scripts could result in unexpected traffic disclosures. Haven't upgraded these myself yet; I'll let the early adopters work out the bugs first. ;) See https://github.com/QubesOS/qubes-issues/issues/3765 and https://github.com/QubesOS/qubes-issues/issues/3447 for a longer discussion of why the upgrade procedure is the way it is. If you can write smarter Salt scripts, I suspect the Whonix team would be appreciative. besides the script if you don't change the "jinja" file, you won't get -15 installed re: removing old anon-whonix TBA-AppVMs I believe Patrick said: you can either remove sys-whonix (on my machine sys-whonix-14) before new install or just leave it (and presumably have it set to 'dummy template' -- not sure why can't just set it to any other template temporarily ) so presumably that goes for anon-whonix and its just like any other template upgrade , reassigning to the new upgraded Template PS : how would I check I'm on the correct mgmt-salt-dom0-virtual-machine -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b74540b3-e231-48ac-1509-e68d379ec7cf%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How do I install programs in Windows 7 Qube?
oak2...@gmail.com: > On Monday, July 1, 2019 at 7:32:32 PM UTC-4, awokd wrote: > >>> Installer programs I believe need to be run from the windows os, so not >>> sure how to copy it to the desktop of the os to run it. >>> >> >> If you have the windows tools properly installed, you should be able to >> copy to it from a different VM with qvm-copy. > > Great, now I can't install Windows Tools. When I type in the command from > Qubes website it says: > > Cannot retrieve repository metadata (respond.xml) for repository: > Qubes-dom0-current. > A repo is temporarily unavailable. Try again tomorrow. In the meantime, it would probably be a good idea to shutdown your win7 VM and make a clone. Installing those Windows Tools can often result in a broken VM if you miss a step, so you want to have a good copy. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c90f6c42-fb05-05ca-e8e7-ffba5403d985%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Disabling qubes-netvm
Am Mittwoch, 3. Juli 2019 09:17:02 UTC+2 schrieb Matthias Brumm: > That was a very good idea. After editing the xml file I got to the stage 2 > and I think Qubes had to do some last steps. Then Qubes OS booted. When I > have the time, I can now look into enabling network etc. > > When I am done, I try to make a short section for the macbook troubleshooting > information. I don't know, if Qubes is possible on a modern Macbook. I have tried several ways to attach the Broadcom wifi to sys-net, but either it is not shown in the machine or the system freezes. And this struggles before trying to get the keyboard and touchpad running (still using USB keyboard and mouse. Apple seems to do a great work in locking their system up. Perhaps I can get a new laptop for my work in some months or so. Matthias -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d6fa8bba-ce93-4291-a63b-49c8095f4ee7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
Daniil Travnikov: > On Wednesday, July 3, 2019 at 6:52:03 PM UTC+3, dro...@gmail.com wrote: >> On Wednesday, July 3, 2019 at 8:21:44 AM UTC-7, Daniil Travnikov wrote: >>> On Wednesday, July 3, 2019 at 5:43:26 PM UTC+3, dro...@gmail.com wrote: Unless you want to join the testing efforts, I would wait until Qubes releases official whonix templates, before trying to install the new version. >>> >>> What do you mean? I thought 15 version of Whonix already official in Qubes. >>> Or I am missing something? >> >> No, it was officially released by WHONIX, not by Qubes. I'm sure the Qubes >> engineers are working on an official template as we speak. > > Tell me please where did you find official Whonix template released by Qubes > engineers? I mean for example if I have now the 13 version of Whonix, where > could I get the 14 version from? > Please see https://www.whonix.org/wiki/Qubes/Install to upgrade your Whonix qubes. 13 is out of date and unsupported. 15 is the new version. Whonix templates are developed and maintained by the Whonix team. They are available from the Qubes "community" repo. Following the linked procedure will result in them getting downloaded from there. Unless there have been some recent developments, they are not technically Qubes official templates- those are located in the templates-itl repo. In other words, Qubes-Whonix 15 is as official as it's going to get. :) Looks like Qubes 4.0.2 is on the way which will include the updated templates too, but it could be a couple months: https://github.com/QubesOS/qubes-issues/issues/5108. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f7a4ee24-10bd-8e24-bf3a-cad7c7b5736d%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How do I install programs in Windows 7 Qube?
On Monday, July 1, 2019 at 7:32:32 PM UTC-4, awokd wrote: > > Installer programs I believe need to be run from the windows os, so not > > sure how to copy it to the desktop of the os to run it. > > > > If you have the windows tools properly installed, you should be able to > copy to it from a different VM with qvm-copy. Great, now I can't install Windows Tools. When I type in the command from Qubes website it says: Cannot retrieve repository metadata (respond.xml) for repository: Qubes-dom0-current. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/177edb7d-f354-4585-918e-dfc36517c0d5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Dns-over-TLS in sys-vpn. Is it possible? How?
Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On Wednesday, July 3, 2019 5:24 AM, Sphere wrote: > You're welcome and good luck! > In any case, I was reminded that any sort of communication between > non-interconnected qubes are not allowed. So even if both of your AppVM qubes > and sys-dns qube are connected to sys-firewall then they won't be able to > communicate with each other by default. Additional iptables rules must be > added to allow it according to what's written here: > https://www.qubes-os.org/doc/firewall/#enabling-networking-between-two-qubes Hello! Here I am again as promised. In summary: I managed to create a sys-dns qube running DoT. Long story short, it is far from usable. Here are the steps I followed. 0. qvm-clone debian-10-minimal d10-minimal-dns. 1. Create a sys-dns qube which provides network and is based on d10-minimal-dns. This qube is behind sys-firewall. 2. qvm-run -u root d10-minimal-dns 'apt install qubes-core-agent-networking stubby' 3. In d10-minimal-dns 'nano /etc/stubby/stubby.yml' and add the following option > listen_addresses: - 127.0.0.1 - 0::1 - 10.137.0.xx # this is sys-dns IP address. 4. In d10-minimal-dns 'nano /etc/resolv.conf > nameserver 127.0.0.1 namerserver ::1 5. qvm-shutdown d10-minimal-dns 6. qvm-start sys-dns 7. In sys-dns 'nano /rw/config/rc.local' > iptables -I INPUT -p udp --dport 53 -j ACCEPT iptables -I INPUT -p tcp --dport 53 -j ACCEPT 8. qvm-shutdown sys-dns 9. Set sys-dns as the network qube of a random app qubes (i.e. 'firefox') firefox => sys-dns => sys-firewall => sys-net 10. In firefox 'nano /etc/resolv.conf' > nameserver 10.137.xx # this is sys-dns IP address. Check with dnsleaktest.com: DoT is working fine and firefox is resolving with the standard stubby provider. Until step 9 every step is easily doable. However step 10 is kind of issue. Without step 10, the qube behind sys-dns is using the DNS of my Internet provider in order to resolv any address. I can't change resolv.conf everytime I open a qube, nor I think is a good idea to change resolv.conf in the template. Thanks for any suggestions. I am just trying to find a suitable way to run DoT on Qubes. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/HEvBH8L79wZgaorSx0TzJlWmFmgRfoh6cA7OM7rlQjxtktzcN9n2XFY3t-b05WHZa8eak4r1SwbxniI56h1zpXzjPLBjK5Q9g7p6LJz91VU%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Software market not working. Can’t update qubes and can’t download large files
shamaarmarti...@gmail.com: > For the the software app I get the error: cannot update repo > ‘qubes-vm-r4.0-current’: cannot download repomd.xml:cannot download > reposts/repomd.xml current error(28) Don't use it. Use dnf or apt from within your Fedora or Debian (respectively) template to install packages. > I updated fedora 29 fine but I left whonix to update all night and one failed > and the other was still updating. One of the repos appears to be having trouble. Try again tomorrow. > I can download small files fine but when I try to download AppVMs and iso OS > they fail with no error code. Increase your AppVM's private storage space. See the Qubes docs for howto details if needed. > Is there any possible way to make my system less buggy and run more smooth? I > use run in debug mode but that honestly doesn’t do anything Apart from the repo having trouble, none of these are bugs- they are just the way Qubes works. You're right, debug mode won't really help for that. It might help if you read through the documentation to get a better understanding of what Qubes is doing, and why. Also, searching this mailing list and/or qubes-issues can often provide resolutions to commonly encountered difficulties. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fa7a4e15-b8db-4ff4-0b65-07af7864a224%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
Daniil Travnikov: > On Wednesday, July 3, 2019 at 4:24:01 AM UTC+3, haaber wrote: >> The "instructions" on the whonix webpage are more than confusing. There >> are 3 alternative "ways" suggested. Which one is best /advised? >> >> I got the impression that a complete reinstall requires (a) a fedora >> appvm (I have none), (b) does *not* work over TOR, since the AppVM's >> based on whonix must be removed (or set to dummy template) before >> removing the whonix-14-templates. Then sys-whonix is gone, right? >> That seems awkward asprocedure. Can someone explain, please? Why can't I >> install whonix-gw-15 and whonix-ws-15 via dnf in dom0 and THEN remove >> the *-14-* ones? Cheers, Bernhard > Thank you for your post, I thought that I am alone, but I think the same. > > I don't understand why in Qubes we can't install Whonix Templates of any > version from Dom0 like we usually do when we want to install Fedora, > for example: > > sudo qubes-dom0-update qubes-template-fedora-XX > I don't see why you couldn't, but you should possibly recreate sys-whonix and anon-whonix. Not sure it's safe to re-use them. You should try to use the Salt commands to do this, once you have the -15 templates installed and the -14 and sys/anon-whonix removed. Make sure you're on mgmt-salt-dom0-virtual-machines v4.0.16 or higher. If you are doing it manually, you should review everything the scripts do to make sure you've run the appropriate qvm-features commands, etc. Not following all the same steps as the Salt scripts could result in unexpected traffic disclosures. Haven't upgraded these myself yet; I'll let the early adopters work out the bugs first. ;) See https://github.com/QubesOS/qubes-issues/issues/3765 and https://github.com/QubesOS/qubes-issues/issues/3447 for a longer discussion of why the upgrade procedure is the way it is. If you can write smarter Salt scripts, I suspect the Whonix team would be appreciative. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aac70674-6139-a353-9dc3-18d02378cde0%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Software market not working. Can’t update qubes and can’t download large files
For the the software app I get the error: cannot update repo ‘qubes-vm-r4.0-current’: cannot download repomd.xml:cannot download reposts/repomd.xml current error(28) I updated fedora 29 fine but I left whonix to update all night and one failed and the other was still updating. I can download small files fine but when I try to download AppVMs and iso OS they fail with no error code. Is there any possible way to make my system less buggy and run more smooth? I use run in debug mode but that honestly doesn’t do anything -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/21467a57-0d57-49b6-aaff-49056ee05401%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
On Wednesday, July 3, 2019 at 6:52:03 PM UTC+3, dro...@gmail.com wrote: > On Wednesday, July 3, 2019 at 8:21:44 AM UTC-7, Daniil Travnikov wrote: > > On Wednesday, July 3, 2019 at 5:43:26 PM UTC+3, dro...@gmail.com wrote: > > > Unless you want to join the testing efforts, I would wait until Qubes > > > releases official whonix templates, before trying to install the new > > > version. > > > > What do you mean? I thought 15 version of Whonix already official in Qubes. > > Or I am missing something? > > No, it was officially released by WHONIX, not by Qubes. I'm sure the Qubes > engineers are working on an official template as we speak. Tell me please where did you find official Whonix template released by Qubes engineers? I mean for example if I have now the 13 version of Whonix, where could I get the 14 version from? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d619f601-ac92-4685-a62e-346bac49dcfb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
On Wednesday, July 3, 2019 at 8:21:44 AM UTC-7, Daniil Travnikov wrote: > On Wednesday, July 3, 2019 at 5:43:26 PM UTC+3, dro...@gmail.com wrote: > > Unless you want to join the testing efforts, I would wait until Qubes > > releases official whonix templates, before trying to install the new > > version. > > What do you mean? I thought 15 version of Whonix already official in Qubes. > Or I am missing something? No, it was officially released by WHONIX, not by Qubes. I'm sure the Qubes engineers are working on an official template as we speak. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f4a23f0f-7565-4935-849c-4da66547b5e7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qubes update servers down?
On Saturday, June 29, 2019 at 3:38:00 AM UTC+3, Marek Marczykowski-Górecki wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Sat, Jun 29, 2019 at 12:45:51AM +0200, Marek Marczykowski-Górecki wrote: > > On Fri, Jun 28, 2019 at 09:43:19PM +, mossy wrote: > > > Hi, > > > > > > Updating my qubes templates (debian-9, fedora-29/-30, whonix-14) have > > > been failing all day with `Failed to synchronize cache for repo > > > 'qubes-vm-r4.0-current'` > > > > > > There's also this bug report: > > > https://github.com/QubesOS/qubes-issues/issues/5130 > > > > > > Any updates? > > > > Indeed there is some problem. Working on it, should be back in few > > minutes (hopefully). > > Took more than few minutes, but it's back online. > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > > iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAl0Wst0ACgkQ24/THMrX > 1yzgeAgAhuKNpNEVUnRHqjlikyunb8imNWOWGyGVtli9v4XKDLCqSUt0BP+TVy+D > ARg/Q6xMXKkDO7Gyn65bvjhogsqb/W6cupgRVroupu0Vjlxqo7slI6T7KyW58170 > d9ej1vE9HFY594Ge77iA9xu+Ty02g49tLTYTbWgy1wZqp4fAR3ocBqFaY+y5+ZrK > 3S34c1vNXrAuwfPLT/mxQBo8wkFR8WmS1zth0/zQ/XQ3EOaMHqFnihmYg8USdiik > efXXpayG1wo90IlUmvKe8j+eLz7M/5oSurt5ioZlqt6AjZUUAwXQN7nuBGuQnroX > SbXwFbsZvY/eD7IsnW6h6OHdJtEnmg== > =M6XH > -END PGP SIGNATURE- Do you still have this problem today? Because I can't update my both Whonix templates and my 29-30 Fedora's and Debian-9. Fedora-29 from system Dom0 tray error message: Updating fedora-29 Error on updating fedora-29: Command '['sudo', 'qubesctl', '--skip-dom0', '--targets=fedora-29', '--show-output', 'state.sls', 'update.qubes-vm']' returned non-zero exit status 20 b'fedora-29:\n --\nID: dnf list updates --refresh >/dev/null\n Function: cmd.run\nResult: False\n Comment: Command "dnf list updates --refresh >/dev/null" run\n Started: 18:14:55.741878\n Duration: 37231.142 ms\n Changes: \n --\npid:\n1159\n retcode:\n1\nstderr:\n Failed to synchronize cache for repo \'qubes-vm-r4.0-current\'\n Error: Failed to synchronize cache for repo \'qubes-vm-r4.0-current\'\n stdout:\n --\nID: update\n Function: pkg.uptodate\nResult: True\n Comment: System is already up-to-date\n Started: 18:15:34.881227\n Duration: 3.189 ms\n Changes: \n \n Summary for fedora-29\n \n Succeeded: 1 (changed=1)\n Failed:1\n \n Total states run: 2\n Total run time: 72.786 s\n' >From Fedora-29 terminal: [user@fedora-29 ~]$ sudo dnf update Qubes OS Repository for VM (updates)0.0 B/s | 0 B 00:30 Failed to synchronize cache for repo 'qubes-vm-r4.0-current' Error: Failed to synchronize cache for repo 'qubes-vm-r4.0-current' >From Fedora-30 terminal: [user@fedora-30 ~]$ sudo dnf update Qubes OS Repository for VM (updates)0.0 B/s | 0 B 00:30 Failed to synchronize cache for repo 'qubes-vm-r4.0-current' Error: Failed to synchronize cache for repo 'qubes-vm-r4.0-current' >From Debian-9 terminal: user@debian-9:~$ sudo apt-get update Hit:1 http://ftp.debian.org/debian stretch-backports InRelease Ign:2 https://cdn-aws.deb.debian.org/debian stretch InRelease Hit:3 https://cdn-aws.deb.debian.org/debian-security stretch/updates InRelease Hit:4 https://cdn-aws.deb.debian.org/debian stretch Release Err:6 https://deb.qubes-os.org/r4.0/vm stretch InRelease Operation timed out after 12 milliseconds with 0 out of 0 bytes received Reading package lists... Done W: Failed to fetch https://deb.qubes-os.org/r4.0/vm/dists/stretch/InRelease Operation timed out after 12 milliseconds with 0 out of 0 bytes received W: Some index files failed to download. They have been ignored, or old ones used instead. And like I already said the same problem with Whonix both templates. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0716dba6-4387-4036-969f-fa88aa924b01%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
> > Dear Qubes Community, > > The Whonix Project [1] announced the release of Whonix 15 today. [2] > > Project lead Patrick Schleizer [3] wrote: > > > > > After approximately one year of development, the Whonix Project is > > > proud to announce the release of Whonix 15. > > > Please note that, according to the Whonix Support Schedule [4], Whonix > > 14 will reach end-of-life (EOL) in one month. > > Therefore, all current Whonix users are urged to upgrade from Whonix > > 14 to Whonix 15 [5] within the next month. > > The "instructions" on the whonix webpage are more than confusing. There > are 3 alternative "ways" suggested. Which one is best /advised? > > I got the impression that a complete reinstall requires (a) a fedora > appvm (I have none), (b) does not work over TOR, since the AppVM's > based on whonix must be removed (or set to dummy template) before > removing the whonix-14-templates. Then sys-whonix is gone, right? > That seems awkward asprocedure. Can someone explain, please? Why can't I > install whonix-gw-15 and whonix-ws-15 via dnf in dom0 and THEN remove > the -14- ones? Cheers, Bernhard After botching the whonix-14 template with an unsuccessful upgrade attempt I reinstalled it by entering sudo qubes-dom0-update --enablerepo=qubes-templates-community --action=reinstall qubes-template-whonix-gw-14 as explained at https://www.whonix.org/wiki/Qubes/Reinstall Because this page gives 'sudo qubesctl state.sls qvm.anon-whonix' as a mandatory step I executed that after the reinstall. This installed 2 new templates whonix-gw-15, whonix-ws-15 and a whonix-ws-15-dvm, with all the old stuff still present. I deleted the Whonix 14 templates with dnf and all seems fine now. So, apparently just entering sudo qubesctl state.sls qvm.anon-whonix is the easiest way to install new Whonix 15 templates. I didn't create a special update VM for this. Probably it is best to remove the old ones first even though it also works if you don't, apparently. If you need to *upgrade* for some reason (instead of simply replacing the templates with new ones) then you should *NOT* follow this procedure, of course. Also see: https://www.whonix.org/wiki/Qubes/Install I find it pretty confusing too ... Maybe an expert can give some additional info :) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/B_UyorL4NoRukSg2gLYUGpARK1xb3fNy_6SH0ClubqGOD0hLCKK2aJ2E6Mbr8d2ILnmA3i5W7C-zWHYpZre0N1m3VufxO-NPACmFNW7S8Dw%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: https://deb.qubes-os.org/r4.0/vm stretch Release <- no longer works for whonix updates
On Wednesday, July 3, 2019 at 5:37:32 PM UTC+3, dro...@gmail.com wrote: > Updating whonix-ws-14: > > E: The repository 'https://deb.qubes-os.org/r4.0/vm stretch Release' does no > loner have a Release file. > > I take it this is because whonix-15 has been released, but we don't have a > new template to install yet. I guess I'll have that update icon stuck on for > a while. I have the same problem with: Whonix-gw-14: Hit:2 tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion stretch InRelease Hit:4 https://deb.whonix.org stretch InRelease Get:1 https://cdn-aws.deb.debian.org/debian-security stretch/updates InRelease [93.6 kB] Hit:1 https://cdn-aws.deb.debian.org/debian-security stretch/updates InRelease Ign:3 https://cdn-aws.deb.debian.org/debian stretch InRelease Hit:5 https://cdn-aws.deb.debian.org/debian stretch Release Ign:7 https://deb.qubes-os.org/r4.0/vm stretch InRelease Err:8 https://deb.qubes-os.org/r4.0/vm stretch Release gnutls_handshake() failed: The TLS connection was non-properly terminated. Reading package lists... Done E: The repository 'https://deb.qubes-os.org/r4.0/vm stretch Release' does no longer have a Release file. N: Updating from such a repository can't be done securely, and is therefore disabled by default. N: See apt-secure(8) manpage for repository creation and user configuration details. Whonix-ws-14: Hit:1 tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion stretch InRelease Hit:2 https://deb.whonix.org stretch InRelease Hit:3 https://cdn-aws.deb.debian.org/debian-security stretch/updates InRelease Ign:4 https://cdn-aws.deb.debian.org/debian stretch InRelease Hit:5 https://cdn-aws.deb.debian.org/debian stretch Release Ign:7 https://deb.qubes-os.org/r4.0/vm stretch InRelease Err:8 https://deb.qubes-os.org/r4.0/vm stretch Release gnutls_handshake() failed: The TLS connection was non-properly terminated. Reading package lists... Done E: The repository 'https://deb.qubes-os.org/r4.0/vm stretch Release' does no longer have a Release file. N: Updating from such a repository can't be done securely, and is therefore disabled by default. N: See apt-secure(8) manpage for repository creation and user configuration details. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/de6035ee-0b80-46ad-830e-8046ea8236f1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
On Wednesday, July 3, 2019 at 4:24:01 AM UTC+3, haaber wrote: > The "instructions" on the whonix webpage are more than confusing. There > are 3 alternative "ways" suggested. Which one is best /advised? > > I got the impression that a complete reinstall requires (a) a fedora > appvm (I have none), (b) does *not* work over TOR, since the AppVM's > based on whonix must be removed (or set to dummy template) before > removing the whonix-14-templates. Then sys-whonix is gone, right? > That seems awkward asprocedure. Can someone explain, please? Why can't I > install whonix-gw-15 and whonix-ws-15 via dnf in dom0 and THEN remove > the *-14-* ones? Cheers, Bernhard Thank you for your post, I thought that I am alone, but I think the same. I don't understand why in Qubes we can't install Whonix Templates of any version from Dom0 like we usually do when we want to install Fedora, for example: sudo qubes-dom0-update qubes-template-fedora-XX -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20f53eaa-83da-45a4-9203-415be72bfa3d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
On Wednesday, July 3, 2019 at 5:43:26 PM UTC+3, dro...@gmail.com wrote: > Unless you want to join the testing efforts, I would wait until Qubes > releases official whonix templates, before trying to install the new version. What do you mean? I thought 15 version of Whonix already official in Qubes. Or I am missing something? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/93c17455-da33-4d13-860c-44f8a51c74da%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Whonix 15 has been released
On Tuesday, July 2, 2019 at 6:24:01 PM UTC-7, haaber wrote: > > Dear Qubes Community, > > > > The Whonix Project [1] announced the release of Whonix 15 today. [2] > > Project lead Patrick Schleizer [3] wrote: > > > >> After approximately one year of development, the Whonix Project is > >> proud to announce the release of Whonix 15. > > > > Please note that, according to the Whonix Support Schedule [4], Whonix > > 14 will reach end-of-life (EOL) in one month. > > Therefore, all current Whonix users are urged to upgrade from Whonix > > 14 to Whonix 15 [5] within the next month. > > The "instructions" on the whonix webpage are more than confusing. There > are 3 alternative "ways" suggested. Which one is best /advised? > > I got the impression that a complete reinstall requires (a) a fedora > appvm (I have none), (b) does *not* work over TOR, since the AppVM's > based on whonix must be removed (or set to dummy template) before > removing the whonix-14-templates. Then sys-whonix is gone, right? > That seems awkward asprocedure. Can someone explain, please? Why can't I > install whonix-gw-15 and whonix-ws-15 via dnf in dom0 and THEN remove > the *-14-* ones? Cheers, Bernhard Honestly, I'm surprised whonix went ahead and released a major upgrade, on a new Debian version that is still frozen, and hasn't been released yet. Maybe they jumped the gun. I would have waited. Unless you want to join the testing efforts, I would wait until Qubes releases official whonix templates, before trying to install the new version. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4e7cbd54-2582-419d-aab9-0275089972da%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] https://deb.qubes-os.org/r4.0/vm stretch Release <- no longer works for whonix updates
Updating whonix-ws-14: E: The repository 'https://deb.qubes-os.org/r4.0/vm stretch Release' does no loner have a Release file. I take it this is because whonix-15 has been released, but we don't have a new template to install yet. I guess I'll have that update icon stuck on for a while. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/31b4bcb8-ef42-4c9b-90f5-eaa804053c08%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 4.0+ Windows 10
Hello Franziska, I just found the post from Black Beard and your answer. Since I have the same problem, I have some questions and would be verry happy, if you could send me your How-to. Am Mittwoch, 21. November 2018 00:03:23 UTC+1 schrieb 799: > > I made the decisions that I can live with this risk, still I wanted to try as > reasonable secure as possible which included: We made the same decisions for our needs and did some tries to. We are now at a place, where we want to enable bitlocker and luks encryption for Win10 and Qubes. But moving Grub to a Qubes Partition didn't work yet. I found some description (https://www.andysblog.de/dualboot-mit-windows-8-bitlocker-und-debian-wheezy) and was able to follow the steps. But after that the windows bootmanager workes fine and qubes failed booting... > > > 1) having my windows partition Bitlocker encrypted > 2) run Coreboot > 3) Beeing able to Multiboot and launch windows without entering the Bitlocker > Recovery key > Sounds very good and seems to be perfect for our needs. But what is core boot? > I spent lots (!!) of time getting this accomplished, but it worked. > I can send you my How-to if you are interested. Your How-to would be a great help for us. Thanks in advance an greetings, Stefan -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2d695635-c65b-4f2a-9f58-64d897c0c5ff%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Problem downloading files
Small files download fine but when I try to download an appimage or an iso file it failed and only downloads the name of the files without an error code. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/adb88d8e-698c-4c56-ae62-fcf3cce4e75f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] New with Qubes
27casanov...@gmail.com: Any links on this explaining it in depth and showing how to sett it up? I looked in to Qubes site but dident find it. You should be fine without doing any packet capture. As long as you install and use the whonix VM and leave most everything as default, you shouldn't have to worry much about leaks. It's quite a reliable setup, as long as you don't do anything unusual when installing/configuring. awokd is right in that your upstream will just see Tor traffic. Much like if you use a VPN, they will see VPN traffic. Tor traffic is designed to look (superficially) like generic HTTPS traffic. However, if someone knows what they're looking for, it's not hard to recognize Tor traffic based on its characteristics. If this is a problem for you, you can try using pluggable transports[1] and/or bridge nodes. The 'meek' transport, for example, makes Tor traffic look like regular traffic going to Google App Engine. Someone might be able to help you better on one of the Tor mailing lists: https://lists.torproject.org/ [1] https://2019.www.torproject.org/docs/pluggable-transports.html.en - This free account was provided by VFEmail.net - report spam to ab...@vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7243ca94-3897-d64d-7109-973b6f5894dd%40vfemail.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes integration for xmonad
El lunes, 1 de julio de 2019, 16:21:42 (UTC+2), nesto...@gmail.com escribió: > El lunes, 1 de julio de 2019, 16:08:19 (UTC+2), nesto...@gmail.com escribió: > > El domingo, 1 de noviembre de 2015, 14:47:00 (UTC+1), Alex escribió: > > > -BEGIN PGP SIGNED MESSAGE- > > > Hash: SHA256 > > > > > > On 11/01/2015 01:59 PM, Daniel Schoepe wrote: > > > > On Sat, 31 Oct 2015 21:31 +0100, Alex wrote: > > > > > > > > Here are some screenshots. It basically looks the same as a normal > > > > xmonad installation with the addition of the colored window > > > > decorations. I don't use the spiral layout, but it should be > > > > sufficient get an idea of how it will look anyway. [...] > > > Thank you very much, I like your results a lot - I will be trying > > > xmonad as soon as I have a little spare time... > > > > > > - -- > > > Alex > > > -BEGIN PGP SIGNATURE- > > > Version: GnuPG v2 > > > > > > iQIcBAEBCAAGBQJWNhfRAAoJENNOJZnNP8uDOX8QAJIarNCaxRa9GulRN/d7D+HA > > > lgg5WEaa6XUm0ygX9kYrpwS+Iq8Fb83xTMR0TRaAEc6luky1qeG+CprHf22qLjNY > > > lf2VBR7uU6pq5xKdGPUVBG97hflHmm54JE76rFXY2BmXgXgTvY9iWLICO5Wcrcwh > > > C3Cb8z7u/aDTE3PlC5VSiz/1QcN0UZE4q6sM7iIz5VGtOzjSJU7CT774qnDmo4ga > > > mkf0JkHPwEJnSmjV5OxV13/iG4G4pNsXrZd+Pl92E2ELT8nvJIFmuMVTLTG+NMXG > > > fr/yDXbJ2FdgPhepovTETiQIgxz4oVZyEHe5nTeCdCGRldKpkmVPeSjzRWCSeFux > > > Md4DK8Tc+dLXTx7QMBDlaV8ymEBLBJjA+XQQzaNNRVPQp3QFaEUknPmdhyIzU8ud > > > S0ueLvz9kyVds6Tm0SjGlfgnTlGXW6TnuHfUZkDOuZLDxRknojpULCABzSZqA5+y > > > f56n68RZNXumzW5g8G/xcalO2RxNCsNflrpyFToMkseLSmT8md7Brl4u8TS5vA0O > > > OLLBegp8O07pWC/LbjIigbMzaoS6zQDHkJ/+SBTancTKoPiY+sJbqEXzD+QDBhKm > > > wJ8GPfLVxpDLvCn8luZnen7bmIBjTS+aBx5eOmEDQwlrrXUO9nFGhlTWmHp1SwPX > > > 3kcVWHg1wbKfTjc32xbg > > > =jElg > > > -END PGP SIGNATURE- > > > > Hi Daniel, I am trying to build your xmonad version but I have problems > > with some unbuildable library, but I don't know how I would look for that > > library. > > > > Could you help me with this? > > Thanks. > > > > Resolving dependencies... > > Configuring xmonad-0.12... > > Failed to install xmonad-0.12 > > Build log ( > > /home/user/.cabal/logs/ghc-8.2.2/xmonad-0.12-FUpDXVryp86B9yS3zn4k4c.log ): > > cabal: Entering directory '.' > > Configuring xmonad-0.12... > > Error: Dependency on unbuildable library from xmonad > > cabal: Leaving directory '.' > > cabal: Error: some packages failed to install: > > xmonad-0.12-FUpDXVryp86B9yS3zn4k4c failed during the configure step. The > > exception was: > > ExitFailure 1 > > Ok, I have changed X11 library maximum version in xmonad.cabal and it's > worked. I have been able to build qubes-xmonad, but now I have problems with qubes-xmonad-contrib When I try to build it I get next error message: 1. WindowAttributes parameter: In your version you have only 7 parameter but that function need 9 parameter. I only add the parameters, only 2 and It's continue builing. 2. Now I Have problem with Helpers.hs file (Layout/Groups), but I can to continue, I don't now what the problem is, sorry. Could you help with this? thanks. cabal: Entering directory '.' Configuring xmonad-contrib-0.12... Preprocessing library for xmonad-contrib-0.12.. Building library for xmonad-contrib-0.12.. [119 of 248] Compiling XMonad.Util.DebugWindow ( XMonad/Util/DebugWindow.hs, dist/build/XMonad/Util/DebugWindow.o ) XMonad/Util/DebugWindow.hs:44:42: warning: [-Wunused-matches] Defined but not used: ‘color’ | 44 | Just (WindowAttributes x y wid ht bw color m1 m o) -> do | ^ XMonad/Util/DebugWindow.hs:44:48: warning: [-Wunused-matches] Defined but not used: ‘m1’ | 44 | Just (WindowAttributes x y wid ht bw color m1 m o) -> do |^^ [123 of 248] Compiling XMonad.Layout.Groups.Helpers ( XMonad/Layout/Groups/Helpers.hs, dist/build/XMonad/Layout/Groups/Helpers.o ) XMonad/Layout/Groups/Helpers.hs:181:8: error: Couldn't match type ‘G.WithID l0 Window -> XMonad.Util.Stack.Zipper (G.Group l0 Window) -> XMonad.Util.Stack.Zipper (G.Group l0 Window)’ with ‘forall (l :: * -> *). G.WithID l Window -> XMonad.Util.Stack.Zipper (G.Group l Window) -> XMonad.Util.Stack.Zipper (G.Group l Window)’ Expected type: G.ModifySpec Actual type: G.WithID l0 Window -> XMonad.Util.Stack.Zipper (G.Group l0 Window) -> XMonad.Util.Stack.Zipper (G.Group l0 Window) In the expression: sendMessage . G.Modify In an equation for ‘wrap’: wrap = sendMessage . G.Modify | 181 | wrap = sendMessage . G.Modify |^^ cabal: Leaving directory '.' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it,
[qubes-users] Locale settings after update of template VM
Hello, During installation of Qubes 4.0.1 I selected en_GB, but after update of template VM's, which I made after installation all locales were changed to en_US. How I could revert the settings of locale for the template, that all VM will inherit it? Now Thunderbird is unusable for, because I can't change locale by init.d/S00Locale.sh (doesn't work) and even "Application locale" in preferences is ignored. Why default locale for Qubes is en_US, when Qubes is made in Europe? Maybe it will be better to ship it with en_GB? I don't know where is larger user base, but if in Europe, then it should make users like much easier. Thanks Veronica -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7f952b52-36a3-4a39-8919-4f726528ec23%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Quick question please, need help!
I'm not particularly knowledgeable about the verification process being done by dnf on the signature of packages so the question still lies on me: Is downloading packages from plaintext http susceptible to MITM? Even if that is not the case, I believe we can't be for sure that there's no exploitable vulnerability on dnf involving packages poisoned either from the source itself or in transit through plaintext http. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/689626e9-dad6-4efa-a615-57add8280147%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Disabling qubes-netvm
Am Mittwoch, 3. Juli 2019 00:31:16 UTC+2 schrieb awokd: > Matthias Brumm: > > Am Dienstag, 2. Juli 2019 16:14:52 UTC+2 schrieb awokd: > >> Look for the section of XML that contains >> name="name">sys-net. > >> > > Thank you for your help. I disabled all three autostart vms to hopefully > > get the system to start, but no luck. I think I surrender for now to get > > this installed on a Macbook. > > Didn't think of it earlier, but you could also remove the devices > assigned to sys-net in that same section of XML. Look for lines like > and delete them. If > that still doesn't let you boot Qubes, it's some other issue besides > sys-net. > That was a very good idea. After editing the xml file I got to the stage 2 and I think Qubes had to do some last steps. Then Qubes OS booted. When I have the time, I can now look into enabling network etc. When I am done, I try to make a short section for the macbook troubleshooting information. Matthias -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/75c53a31-25fd-4b40-b876-a9ba689af96f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.