Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-11 Thread list . wget
On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> On 7/10/19 2:02 AM,  wrote:
> > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> >> On 7/9/19 7:25 AM,  wrote:
> >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> >>>
> >>> $ sudo dnf install 
> >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> >>>
> >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> >>> running template I'm asked for a password when I try to sudo my way into 
> >>> apt-get update.
> >>>
> >>> Does anyone know the password for 'user'?
> >>>
> >>> Thanks.
> >>>
> >>
> >> If you can not sudo, you can always try running your command from Dom0
> >> as user root:
> >>
> >> $ qvm-run -a --user root  "apt-get update"
> > 
> > Thanks.
> > I not only want to update, I also want to run all other kinds of commands 
> > as sudo. Do you think I can run any command like this inside the qube from 
> > within dom0?
> 
> You can also run any other command as root, like "passwd user" to set 
> the password to a know value, or "gedit /etc/sudoers" and modify who can 
> sudo, add yourself to the wheel group, etc... I can't say why your 
> particular appvm prevents you from sudoing without testing the vm 
> myself, but whatever the problem is, you now have a way to get a root 
> shell to fix it.
> 
> hope this helps

It did, thanks for your help.
The funny thing is,

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user"

didn't work, even after

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

although 'user' was added to the sudo group as could be seen from

user@stretch-minimal:~$  cat /etc/group | grep sudo
sudo:x:27:user

so I had to edit the sudoers file directly, then restarted the sudo service:

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

and that worked, so I wrote a little script to more or less automate and 
explain the process: https://pastebin.com/UcJa0DvC

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0768f19-3a7c-46ac-8d1f-79f337195f84%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-11 Thread list . wget
On Friday, 12 July 2019 01:27:43 UTC, list...@gmail.com  wrote:
> On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> > On 7/10/19 2:02 AM,  wrote:
> > > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> > >> On 7/9/19 7:25 AM,  wrote:
> > >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org 
> > >>> using
> > >>>
> > >>> $ sudo dnf install 
> > >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> > >>>
> > >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > >>> running template I'm asked for a password when I try to sudo my way 
> > >>> into apt-get update.
> > >>>
> > >>> Does anyone know the password for 'user'?
> > >>>
> > >>> Thanks.
> > >>>
> > >>
> > >> If you can not sudo, you can always try running your command from Dom0
> > >> as user root:
> > >>
> > >> $ qvm-run -a --user root  "apt-get update"
> > > 
> > > Thanks.
> > > I not only want to update, I also want to run all other kinds of commands 
> > > as sudo. Do you think I can run any command like this inside the qube 
> > > from within dom0?
> > 
> > You can also run any other command as root, like "passwd user" to set 
> > the password to a know value, or "gedit /etc/sudoers" and modify who can 
> > sudo, add yourself to the wheel group, etc... I can't say why your 
> > particular appvm prevents you from sudoing without testing the vm 
> > myself, but whatever the problem is, you now have a way to get a root 
> > shell to fix it.
> > 
> > hope this helps
> 
> It did, thanks for your help.
> The funny thing is, 
> 
> [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo 
> user"
> 
> didn't work, even after 
> 
> [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> 
> although 'user' was added to the sudo group as could be seen from 
> 
> user@stretch-minimal:~$  cat /etc/group | grep sudo
> sudo:x:27:user
> 
> so I had to edit the sudoers file directly, then restarted the sudo service:
> 
> [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> [user@dom0 ~]$ 
> qvm-run -p --user stretch-minimal "service sudo restart"
> 
> and that worked, so I wrote a little script to more or less automate and 
> explain the process: https://pastebin.com/UcJa0DvC

Sorry, that last line should read:
[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d4ea0cbe-7af8-489b-9170-e1cc23ff4158%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-11 Thread list . wget
On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> On 7/10/19 2:02 AM,  wrote:
> > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> >> On 7/9/19 7:25 AM,  wrote:
> >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> >>>
> >>> $ sudo dnf install 
> >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> >>>
> >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> >>> running template I'm asked for a password when I try to sudo my way into 
> >>> apt-get update.
> >>>
> >>> Does anyone know the password for 'user'?
> >>>
> >>> Thanks.
> >>>
> >>
> >> If you can not sudo, you can always try running your command from Dom0
> >> as user root:
> >>
> >> $ qvm-run -a --user root  "apt-get update"
> > 
> > Thanks.
> > I not only want to update, I also want to run all other kinds of commands 
> > as sudo. Do you think I can run any command like this inside the qube from 
> > within dom0?
> 
> You can also run any other command as root, like "passwd user" to set 
> the password to a know value, or "gedit /etc/sudoers" and modify who can 
> sudo, add yourself to the wheel group, etc... I can't say why your 
> particular appvm prevents you from sudoing without testing the vm 
> myself, but whatever the problem is, you now have a way to get a root 
> shell to fix it.
> 
> hope this helps

It did, thanks for your help.
The funny thing is, 

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user"

didn't work, even after 

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

although 'user' was added to the sudo group as could be seen from 

user@stretch-minimal:~$  cat /etc/group | grep sudo
sudo:x:27:user

so I had to edit the sudoers file directly, then restarted the sudo service:

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
[user@dom0 ~]$ 
qvm-run -p --user stretch-minimal "service sudo restart"

and that worked, so I wrote a little script to more or less automate and 
explain the process: https://pastebin.com/UcJa0DvC

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f144ec75-8a24-40a3-8c3a-d8c4a4e0c4a1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: how to reinstall whonix-14 templates

2019-07-11 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 11/07/2019 4.47 PM, panina wrote:
> [...]
> 
> Not an answer to the follow-up question, but: I recently installed
> whonix-15 from scratch, and did it from instructions from whonix'
> webpage. They have qubes-specific instructions, including
> instructions referring to upgrading from 14 to 15. Anyway, I used
> the qubes salt command to install and set everything up, `sudo
> qubesctl state.sls qvm.anon-whonix`. It is quiet, and takes ages, 
> and says nothing, and may not be aborted.

FWIW, there is an issue open to address part of this:

https://github.com/QubesOS/qubes-issues/issues/4215

> This is annoying. But if it's allowed to run uninteruppted, it'll
> do the job. <3 /panina

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=RbIB
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/046a00f5-3dd9-98b6-db26-f9d8805221d5%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: how to reinstall whonix-14 templates

2019-07-11 Thread panina
On Mon, 2019-07-08 at 22:03 -0700, Claudio Chinicz wrote:
> > On Monday, 8 July 2019 11:37:35 UTC+3, Claudio Chinicz  wrote:
>> > > Hi,
>> > >
>> > > I've broken my whonix-gw-14 when trying to upgrade to whonix-15
>> and> > ended up removing both gw and ws templates for version 14.
>> > >
>> > > I'me trying to reinstall following instructions from > >
>> https://www.qubes-os.org/doc/templates/ but it does not work.
>> > >
>> > > Anyone can help with instructions to download whonix-14 from> >
>> scratch?
>> > >
>> > > Thanks in advance,
>> > > Claudio
Not an answer to the follow-up question, but:
I recently installed whonix-15 from scratch, and did it from
instructions from whonix' webpage. They have qubes-specific
instructions, including instructions referring to upgrading from 14 to 15.
Anyway, I used the qubes salt command to install and set everything up,
`sudo qubesctl state.sls qvm.anon-whonix`. It is quiet, and takes ages,
and says nothing, and may not be aborted. This is annoying. But if it's
allowed to run uninteruppted, it'll do the job.
<3
/panina
> > 
> > Hi Chris,
> > 
> > I tried on dom0 to issue the commands and I got a message "using sys-
> > firewall as UpdateVM to download updates for Dom0; this may take
> some> time..." but nothing happened.
> > 
> > Did I do something wrong? did I miss something?
> > 
> > Thanks
> > 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c974b541-3618-8103-0321-1b3fd24bcfbe%40nonbinary.me.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Re: Failed qubesd deamon connection

2019-07-11 Thread cammumtar
On Wednesday, 10 July 2019 18:46:11 UTC+3, awokd  wrote:
> r...@gmail.com:
> > On Tuesday, 9 July 2019 04:43:14 UTC+3, awokd  wrote:
> >>> On Monday, 8 July 2019 23:42:36 UTC+3, camm...@gmail.com  wrote:
>  I have tried everything on the internet to solve my problem it says 
>  Start-limit-hit. I try you post in another chat nano 
>  var/lib/qubes/qubes.xml.resut no directory exist.
>  I try everything else I find on the web withe no solution. I have photos 
>  I don't want to lost and work stuff I need.
>  Please help me.
> >>>
> >>> https://postimg.cc/2bPYyHMW
> >>> https://postimg.cc/YjGq7FZg
> >>>
> >>> More details of my problem.
> >>>
> >> Provide text log file of "sudo journalctl -b" output. Note you may want 
> >> to edit out hardware serial #s, etc.
> > 
> > https://ibb.co/9h1ftRV
> > https://ibb.co/BPkP5xh
> > https://ibb.co/Jjfw788
> > https://ibb.co/pZfmbhw
> > https://ibb.co/r7bG2Tt
> > https://ibb.co/Yj855pZ
> > https://ibb.co/318v99W
> > https://ibb.co/RjSB7qJ
> > https://ibb.co/W6SJZQm
> > https://ibb.co/tY7mnbv
> > https://ibb.co/wz7TCTm
> > https://ibb.co/BtYyw8y
> > https://ibb.co/wpq7gts
> > https://ibb.co/KD8qZ1V
> > https://ibb.co/WvDKkZS
> > https://ibb.co/276gsbw
> > https://ibb.co/4gXZ3Rc
> > https://ibb.co/QfgJjmP
> > https://ibb.co/c27y82v
> > https://ibb.co/kcCLfT8
> > https://ibb.co/L87KrZs
> > 
> > These are links to images I take. 
> > I can make for you a video and send if you want. It is about 3500 lines 
> > total.
> > 
> > I really appreciate your help. Thank you very much. I really like qubes no 
> > problems until I put USB to transfer photos. Then after this problem 
> > occurs. I use same USB everything nothing new. Only one computer and 1 
> > camera that's it.
> > 
> > Thank you very much. 
> > 
> Appreciate the time it took to make all those pictures, but I was
> looking for a text file instead? You should be able to mount a USB drive
> from the command line and copy it out.

I have no experience in doing this. Can you give me order and I will make it now

I wait for you. Thank you thank you very much friend. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/71753c8e-3b11-45ed-b6fc-269350c44927%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Setting up wasabi

2019-07-11 Thread 27casanova27
Hi, Im trying to install Wasabi on Qubes.

Downloading works fin. Then I klick on the downloaded file and a new folder 
apears (I guse the files has bin un packed or something). Theres a bunch of 
files in there. And I have no ideer what to do from there on.

This might be more of general qustion about instaltions on qubes. Sould I juse 
some particular program to install?

I have instald it on macos by the way so im not a compleat moron.

By the way Im seting up a regular vm that is not directed trough whonix. Becous 
wasabi is allredy configurated trough Tor. For that reason theres no point 
runing wasabi in a vm that is directed trough whonix, right?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4eb11668-85ad-41b6-bc80-fa578cc9374b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-11 Thread drokmed
> Nope.  I created a templatebasedappvm, started it, tried to install something 
> temporarily (forgot to add to original template vm, and didn't want to go 
> thru the long process of shutting down current, starting template, installing 
> app, stopping template, restarting vm, resuming work).
> 
> Gets the same error.  Have to apply temp fix to any vm created from template. 
>  Not a big deal, but annoying enough for me to replace Debian-10.

Okay now it's not doing it.  Pretty sure I stopped/restarted everything the 
first time around.  Glad it's okay now.  I'll test this some more.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a1dd98f1-d4ab-43b1-8548-3df0329c4c14%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] My Qubes 4.02-rc1 install notes: (with fixes, customizations)

2019-07-11 Thread drokmed
My Qubes 4.02-rc1 install notes: (with fixes, customizations)

d/l ISO from qubes website
burned to usb flash drive
boot usb flash drive
tried media test, it crashed after a few seconds and rebooted pc
install qubes
accept most defaults
change time zone
use full hd/ssd (reclaim all space)
assign user name
install finishes, reboot and continue setup
create default system qubes (net, fw, dvm)
do not create default apps, I'll make my own
create whonix gw and ws vm's, should stop doing this, I create my own
do not enable updating whonix over tor
no usb cube, I use usb keyboard and usb mouse
(note to self: try the advanced option some day, to see what it does)
click on finish configuration
wait a minute before login, let background processes finish
login
watch hard disk light, and upper right screen for messages
wait a few minutes, let background stuff run, watching hard disk light
INSTALLATION COMPLETE

Custom configure my Qubes installation:

fix clock, right click->properties, change format
noticed hard disk light still going, wait a few minutes, go get some coffee 
(qubes is looking for template updates)

Update Qubes templates:
NOTE:  Do NOT reboot before updating Qubes templates, or system may hang during 
shutdown

start Qube Manager:
click on right blue Q->open qube manager
note: you will see TWO qubes auto-start: sys-net and sys-firewall (we haven't 
configured sys-whonix yet)

update dom0:
right click dom0->update qube, install any updates, wait for it to finish (got 
progress screen but no finish screen, it should say no updates are available)

update Debian-10 template:
start Debian-10 template, then update qube, install any updates, wait for finish
note: debian-10 gives repository errors, press ctrl-C to close window (don't 
shutdown template)
click on right blue Q, debian-10, run terminal
in terminal:  sudo apt-get --allow-releaseinfo-change update (gets error 
messages)
run it again:  sudo apt-get --allow-releaseinfo-change update (no error 
messages)
close terminal
right click debian-10->update qube, install any updates (continue=Y), OK on 
grub-pc prompt (right arrow then enter), don't install grub not needed in 
template (tab then enter), yes continue without grub, when done enter to 
shutdown

update Fedora-30 template:
start Fedora-30 template, update qube, install any updates (Y), wait for 
finish, enter to shutdown

update whonix templates:
note: updating whonix templates requires sys-whonix to be running (in current 
configuration)
start sys-whonix, popup window select Connect click next, summary screen click 
next, wait for bootstrap to finish (hit back arrow if it stalls too long and do 
again), click finish
wait a few minutes, will get popup connected to tor, then whonixcheck will run, 
wait for finish, should get popup info: whonix APT reposity enabled
note: if whonixcheck failed, wait a minute, run it again: LEFT blue Q->Service: 
sys-whonix->WhonixCheck (this must succeed before updating templates)

start whonix-gw-15 template, update qube, install any updates (Y), wait for 
finish, enter to shutdown
start whonix-ws-15 template, update qube, install any updates (Y), wait for 
finish, enter to shutdown

UPDATES DONE!
We can now safely shutdown or reboot.  Do that now.
Far right upper button (your user name) click on name, shutdown
While pc is off, you can safely remove the USB flash drive now, if not already

Boot computer
at login wait a minute to let background stuff run (watch hd light), then login
note: i've noticed if you wait a minute before login, as soon as you login, 
qubes will immediately connect to tor (no wait period)

Start Qubes Manager:
note: you will see there are now THREE qubes auto-starting: sys-net, 
sys-firewall, sys-whonix (we configured it)

>From this point, the rest is custom configuration.  Your preferences will be 
>different from mine.  I'll list some of my tweaks.

Change colors:
note: I frikken HATE the default red network icon, it looks like it's shouting 
ERROR! to me ugh
note: we have to stop sys-net to change the color, but must also stop 
sys-firewall and sys-whonix first
stop sys-whonix
stop sys-firewall
stop sys-net

sys-net->Qube settings->change color->BLACK, apply, ok (I like black because 
it's now same color as other icons on bar)
sys-firewall->Qube settings->change color->RED, apply, ok (I like red because 
any VM connecting directly is going out clearnet)

Get rid of dvm's: (do we really need all these?)
note: I create a new default-dvm, set all vm/template/system to it, then delete 
the others

create a new cube:
either click on 'create a new cube' button or Qube->Create new cube
name: default-dvm, color: black, template: Debian-10, networking: NONE! (don't 
want this thing accessing anything)
default-dvm->Qube settings->Advanced->turn on 'Allow starting DisposableVMs 
from this qube'
System->Global settings->Default DispVM->default-dvm
note: while in this screen, change default template too
System->Global settings->Default 

Re: [qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-11 Thread drokmed
On Thursday, July 11, 2019 at 9:16:36 AM UTC-7, unman wrote:
> On Thu, Jul 11, 2019 at 06:28:39AM -0700, drok...@gmail.com wrote:
> > > Users should be aware that the newer Debian template might not be able 
> > > to update without first running a command manually:
> > > 
> > > https://github.com/QubesOS/qubes-issues/issues/5149
> > 
> > Sadly, this isn't going to work.  Sure, you can add the command to the 
> > template, and then the template updates okay, but after that, every time 
> > you create a new VM from the template, each VM has the problem again.  The 
> > template needs to be fixed, and I'm sure they will.
> > 
> 
> This doesnt seem to be true for debian-10. Once the repository
> definition is fixed in the template, by running `apt update`,
> it's fixed in TemplateBasedAppVMs.  (naturally).

Nope.  I created a templatebasedappvm, started it, tried to install something 
temporarily (forgot to add to original template vm, and didn't want to go thru 
the long process of shutting down current, starting template, installing app, 
stopping template, restarting vm, resuming work).

Gets the same error.  Have to apply temp fix to any vm created from template.  
Not a big deal, but annoying enough for me to replace Debian-10.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/933501a4-3339-49e4-b61f-11937657d2b0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-11 Thread unman
On Thu, Jul 11, 2019 at 06:28:39AM -0700, drok...@gmail.com wrote:
> > Users should be aware that the newer Debian template might not be able 
> > to update without first running a command manually:
> > 
> > https://github.com/QubesOS/qubes-issues/issues/5149
> 
> Sadly, this isn't going to work.  Sure, you can add the command to the 
> template, and then the template updates okay, but after that, every time you 
> create a new VM from the template, each VM has the problem again.  The 
> template needs to be fixed, and I'm sure they will.
> 

This doesnt seem to be true for debian-10. Once the repository
definition is fixed in the template, by running `apt update`,
it's fixed in TemplateBasedAppVMs.  (naturally).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190711161634.462ctfspx4s2fylm%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 404 from qubes-dom0-update for https://yum.qubes.org/r25-5/current/dom0/fc25/repodata/......

2019-07-11 Thread unman
On Thu, Jul 11, 2019 at 03:12:53PM +0200, Kristian Elof S?rensen wrote:
> Hi
> 
> > Sorry, that was not a question, but musing on my part.
> > I havent seen this bug in some time - can you try updating with
> > qubes-dom0-update passing in the --releasever=4.0 option?
> 
> sudo qubes-dom0-update --releasever=4.0 runs without errors and does
> update a number of packages.
> 
> Upon reboot, sudo qubes-dom0-update without the releasever parameter,
> now runs without errors, but of course has no updates pending this time
> around, so not a full test.
> 
>   Kristian
> 

I'm pretty sure that update will fix it for you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190711161327.upwkecmvrv5kbslf%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Raid 5 failure

2019-07-11 Thread Frédéric Pierret
Hi,

It's not Qubes related. I encourage you to look at usual manual of
mdadm. Normally, after managing to repair your array, you should do
something like:

    1) Backup /etc/mdadm/mdadm.conf

    2) sudo mdadm --detail --scan --verbose > /etc/mdadm/mdadm.conf

    3) Reboot to check

Best,

Frédéric

On 7/10/19 10:23 PM, 'Whenow' via qubes-users wrote:
> I have a RAID 5 configuration that has failed. I physically removed
> the failed disk, inserted a new one of the same nominal capacity. Then
> in dom0 I used mdadm to add the new disk to the array and the new disk
> was successfully added in to the array. Upon every reboot now the disk
> is not automatically added to the RAID. I need to create the device
> node for the new hard drive's RAID partition and then manually enter
> "sudo mdadm --manage /dev/md127 --add /dev/sdc1" to complete the RAID
> setup. What do I need to do to make this setup automatic?
> -- 
> You received this message because you are subscribed to the Google
> Groups "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to qubes-users+unsubscr...@googlegroups.com
> .
> To post to this group, send email to qubes-users@googlegroups.com
> .
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/xyv3lRaE14w1yGqVz_mM0rVTgcGVUtjsihNjdYiALRZUHl9G7ClttjBn3gBgNaf9-jOq5eqPTyQTTipPqFUAk9370b7xWn3Zvn11jZvbH9Q%3D%40protonmail.com
> .
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4dc1c070-883c-5f6d-cf02-98394d3b31ff%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] Re: Audio in Win7 HVM with Qubes OS 4.0 via PCMCIA USB-Card and Bluetooth?

2019-07-11 Thread oak2572
On Sunday, July 1, 2018 at 8:31:16 AM UTC-4, 799 wrote:
> Hello,
> 
> 
> I like to get sound working under Qubes 4.0 and had the idea to buy a 
> USB3-PCMCIA Adapter which I pass over to the Windows HVM. Then plug in a 
> Mini- Bluetooth USB Dongle and try to get sound working through Bluetooth.
> 
> 
> Question:
> Will this work or is the whole "Audio-Card" controller missing in Qubes and I 
> should use an audio USB card?
> 
> 
> [799]

Did you get this figured out?  I'm trying to use headphones and external mic in 
windows 7 qube and can't get them to show up in windows.  I may have to do 
something under settings, but I don't know what.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4fef131f-8d0f-4725-9e40-5af584697992%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-11 Thread drokmed
> Users should be aware that the newer Debian template might not be able 
> to update without first running a command manually:
> 
> https://github.com/QubesOS/qubes-issues/issues/5149

Sadly, this isn't going to work.  Sure, you can add the command to the 
template, and then the template updates okay, but after that, every time you 
create a new VM from the template, each VM has the problem again.  The template 
needs to be fixed, and I'm sure they will.

In the mean time, I will delete Debian-10, install Debian-9 template, clone to 
Debian-10, and do a manual update.  That will give a better fix for now.

Still testing.  Whonix gw/ws appear to be fine, but I haven't done much with 
those yet.  More to come.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bd8dbab0-846e-40b7-8100-3c07be1ad76b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 404 from qubes-dom0-update for https://yum.qubes.org/r25-5/current/dom0/fc25/repodata/......

2019-07-11 Thread Kristian Elof Sørensen
Hi

> Sorry, that was not a question, but musing on my part.
> I havent seen this bug in some time - can you try updating with
> qubes-dom0-update passing in the --releasever=4.0 option?

sudo qubes-dom0-update --releasever=4.0 runs without errors and does
update a number of packages.

Upon reboot, sudo qubes-dom0-update without the releasever parameter,
now runs without errors, but of course has no updates pending this time
around, so not a full test.

Kristian


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5f67dc70b7996b02be2ef39f917f0636b7b36e4e.camel%40elof.dk.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-11 Thread Chris Laprise

On 7/11/19 6:39 AM, unman wrote:

On Thu, Jul 11, 2019 at 12:11:24PM +0200, David Hobach wrote:

On 7/10/19 3:52 AM, Andrew David Wong wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

We're pleased to announce the first release candidate for Qubes 4.0.2!

Features:
?? - All 4.0 dom0 updates to date
?? - Fedora 30 TemplateVM
?? - Debian 10 TemplateVM
?? - Whonix 15 Gateway and Workstation TemplateVMs
?? - Linux kernel 4.19 by default

Qubes 4.0.2-rc1 is available on the Downloads page. [1]


I just checked

sudo qubes-dom0-update --action=search qubes-template

and found

debian-8
debian-9
fedora-30
fedora-25-minimal
fedora-28-minimal

No debian-10 however. Did I miss something?


We haven't released a Debian-10 template as yet, except in testing.
The version in testing shows this behaviour, so it may be better to wait
until we have a template build *after* buster was released.

That rc includes a Debian-10 - it's a testing release of 4.0.2, and
includes the Debian-10 template from testing.  Obviously the final
release of 4.0.2 wont have a Debian-10 that shows this behaviour.


Good to hear the template will be refreshed. But this isn't obvious, as 
release candidates can become the actual release.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/35e20ecc-3853-3c10-c8f9-86907d51f7b0%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 404 from qubes-dom0-update for https://yum.qubes.org/r25-5/current/dom0/fc25/repodata/......

2019-07-11 Thread unman
On Tue, Jul 09, 2019 at 07:25:38PM +0200, Kristian Elof S?rensen wrote:
> 
> > Where is that r25-5 coming from?
> > Have you edited your repo definitions in
> > /etc/yum.repos.d/qubes-dom0.repo ?
> 
> It appears to originate form the "metalink" field
> in /etc/yum.repos.d/qubes-dom0.repo
> 
> And no, I haven't (knowledgedly) tinkered with the configuration.
> 
> 
> [username@dom0 ~]$ cat /etc/yum.repos.d/qubes-dom0.repo 
> [qubes-dom0-current]
> name = Qubes Dom0 Repository (updates)
> #baseurl = https://yum.qubes-os.org/r$releasever/current/dom0/fc25
> #baseurl = 
> http://yum.sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/r$releasever/current/dom0/fc25
> metalink = 
> https://yum.qubes-os.org/r$releasever/current/dom0/fc25/repodata/repomd.xml.metalink
> enabled = 1
> .

Sorry, that was not a question, but musing on my part.
I havent seen this bug in some time - can you try updating with
qubes-dom0-update passing in the --releasever=4.0 option?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190711104335.asnebopmwo37ervp%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-11 Thread unman
On Thu, Jul 11, 2019 at 12:11:24PM +0200, David Hobach wrote:
> On 7/10/19 3:52 AM, Andrew David Wong wrote:
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA512
> > > 
> > > Dear Qubes Community,
> > > 
> > > We're pleased to announce the first release candidate for Qubes 4.0.2!
> > > 
> > > Features:
> > > ?? - All 4.0 dom0 updates to date
> > > ?? - Fedora 30 TemplateVM
> > > ?? - Debian 10 TemplateVM
> > > ?? - Whonix 15 Gateway and Workstation TemplateVMs
> > > ?? - Linux kernel 4.19 by default
> > > 
> > > Qubes 4.0.2-rc1 is available on the Downloads page. [1]
> 
> I just checked
> 
> sudo qubes-dom0-update --action=search qubes-template
> 
> and found
> 
> debian-8
> debian-9
> fedora-30
> fedora-25-minimal
> fedora-28-minimal
> 
> No debian-10 however. Did I miss something?

We haven't released a Debian-10 template as yet, except in testing.
The version in testing shows this behaviour, so it may be better to wait
until we have a template build *after* buster was released.

That rc includes a Debian-10 - it's a testing release of 4.0.2, and
includes the Debian-10 template from testing.  Obviously the final
release of 4.0.2 wont have a Debian-10 that shows this behaviour.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190711103905.x43zjtxx2ezghgru%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] are system hangs normal?

2019-07-11 Thread unman
On Wed, Jul 10, 2019 at 10:19:53AM -0700, acunal.hamad...@gmail.com wrote:
> Unman: About how old would you say your Coreboot flash is?
> 

Not new. I cant remember exactly, but at least a year. Maybe more, I'm
ashamed to say.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190711103457.kfxvfvrr426bt7ct%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-11 Thread David Hobach

On 7/10/19 3:52 AM, Andrew David Wong wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

We're pleased to announce the first release candidate for Qubes 4.0.2!

Features:
  - All 4.0 dom0 updates to date
  - Fedora 30 TemplateVM
  - Debian 10 TemplateVM
  - Whonix 15 Gateway and Workstation TemplateVMs
  - Linux kernel 4.19 by default

Qubes 4.0.2-rc1 is available on the Downloads page. [1]


I just checked

sudo qubes-dom0-update --action=search qubes-template

and found

debian-8
debian-9
fedora-30
fedora-25-minimal
fedora-28-minimal

No debian-10 however. Did I miss something?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1835a537-5946-5bd4-4ee7-afbff76c7023%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.


smime.p7s
Description: S/MIME Cryptographic Signature