Re: [qubes-users] qvm-create-windows-qube 2.0

2020-01-16 Thread scallyob
Thanks Elliot for posting this. I'm trying this now. I saw the note 
saying you could download a different version of Windows in the 
qvm-create-windows-qube.sh. But I didn't see how that was done. Seems 
like you can just reference an already downloaded iso, which is what I 
did. I already had a Windows 10 iso. So I set it to use that iso and to 
use the answer file provided for win10x64-enterprise-eval.xml, but ran 
into the problem below. But maybe it is because of the iso i'm using?


On 13.01.2020 10:48, 'Elliot Killick' via qubes-users wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

  * Hardcoding trial product key in answer files (or anywhere) is no
longer necessary, Windows will use embedded trial key without any
user interaction by default


This doesn't seem to be the case.
I'm getting the following:
on "Commencing first part of Windows installation process..." in the 
install.sh script
I get a popup from "Windows Setup" that says Windows cannot read the 
 setting from the unattend answer file." I click "OK" and it 
reboots to a black screen from SeaBIOS that ends with  "No bootable 
device."



  * windows-mgmt is air gapped



What is this qube used for? Is it just for the setup? Can I delete it 
after done?


Thanks.


-END PGP SIGNATURE-


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/36e24de4971693d221cc8edaf5ca312b%40posteo.net.


[qubes-users] Re: Qubes installing issue

2020-01-16 Thread Ana Z
Hi,

Similar issue here, although long ago: 
https://groups.google.com/forum/m/#!topic/qubes-users/jBiBtUXgwzs

You should try both UEFI and Legacy mode.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/256885d1-834a-4cfa-b070-b34176055b88%40googlegroups.com.


[qubes-users] Qubes installing issue

2020-01-16 Thread kotia01026
I have an issue with installing Qubes 4.01. It is stuck on the  "installing 
boot loader"  and nothing happening!

My working station is HP ZBook 14 G2

   - CPU: 2.6GHz Intel Core i7-5600U (dual-core, 4MB cache, up to 3.2GHz 
   with Turbo Boost)
   - Graphics: AMD FirePro M4150 (1GB GDDR5)
   - RAM: 16GB DDR3L (1,600MHz)

I would very appreciate if someone helps me to solve this problem. 

I am looking forward 

Best wishes Hanna

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/db3d3b53-0c0a-43de-885b-89b0e8a27647%40googlegroups.com.


Re: [qubes-users] Qubes OS 4.0.3-rc1 has been released!

2020-01-16 Thread David Hobach

On 1/15/20 12:59 PM, Andrew David Wong wrote:

Shortly after the announcement of 4.0.2 [1], a bug [2] was discovered in
the dom0 kernel included in that release. Since the bug would have
presented installation problems for the majority of users. That bug has
now been fixed, along with a few installer fixes, resulting in
4.0.3-rc1.




What should I do?
=

If you installed Qubes 4.0, 4.0.1, or 4.0.2 and have fully updated [4],
then your system is already equivalent to a Qubes 4.0.3 installation. No
further action is required.


I didn't get any dom0 or template update.
Kernel is 4.19.84-1, qubes-core-dom0 is at 4.0.48-1, 
qubes-core-dom0-linux at 4.0.21.1.


I also didn't get the updates for QSB #56 on the stable repo yet.

Can someone confirm that?

Thanks in advance!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/31eb75c9-9066-4551-a847-6a4db98eb69c%40hackingthe.net.


smime.p7s
Description: S/MIME Cryptographic Signature


[qubes-users] Qubes vulnerable to new Intel gpu vulnerability?

2020-01-16 Thread Lorenzo Lamas
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html
Not much details there, but from the description it seems it might be possible 
for a compromised AppVM to gather information from other VMs.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/97dd36e9-5399-4253-8364-7fc7460929c5%40googlegroups.com.


[qubes-users] Re: LibreOffice presentation mode with QubesOS

2020-01-16 Thread brendan . hoar
Alt-space fullscreen doesn’t work?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c9b529be-4eb5-4df1-9ca8-8fb89286a7cc%40googlegroups.com.


[qubes-users] Re: LibreOffice presentation mode with QubesOS

2020-01-16 Thread fabio . germann
Am Mittwoch, 13. November 2019 09:30:08 UTC+1 schrieb Lorenzo Lamas:
>
>
>
> On Monday, November 4, 2019 at 7:42:26 PM UTC+1, Germann Fabio wrote:
>>
>> Hi qubes-users,
>>
>> Recently I tried to present a presentation using LibreOffice on qubes. 
>> I'm not able to get into the presentation mode where I got the fullscreen 
>> presentation on the HDMI display and the presentation mode screen (current 
>> slide, next slide and comments) on the internal display.
>>
>> I assume this is because in the AppVM there is only one screen. Is there 
>> any way around this?
>> Has anyone been able to get this working?
>>
>> Cheers,
>> Fabio
>>
>
> AppVM's by default don't have fullscreen access, have you enabled it first?
> https://www.qubes-os.org/doc/full-screen-mode/
>

Hi Lorenzo,

I did not have this enabled. But also after turning it on (and rebooting) 
the presentation mode does not work correctly.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a8c5d067-6e48-41a8-9735-66ac028544c0%40googlegroups.com.


[qubes-users] Resizing template vm works, but doesn't fix running out of space -- because updates use something called disp-mgmt

2020-01-16 Thread billollib


I got a ping saying there was an update for my fedora-30 template VM,  So, 
I started the Qubes updater.  I then get the error that it needs an 
additional 34 MB to install the kernel image.  No problem, I think.  So I 
go to the documentation and look up how to increase the size of the 
template VMs.  Easy peasy -- I increase the size of the Fedora-30 template 
by a couple of gigs, and reboot-- and the new space shows up.  Great I 
think.  I start the updater and get the same error.  I then watch it 
happen, and when I start the updater, it opens something called the  
"disp-mgmt-fedora-30" vm, which I didn't even know existed.  Obviously, 
changing the size of the fedora template vm didn't change the size of this.

How do I change the size of the "disp-mgmt-fedora-30" vm -- and is it safe 
to to?  I assume it's hidden from me for a reason...

Thanks!

billo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee3c6080-4761-4512-a8b4-8a7e85ba9582%40googlegroups.com.


Re: [qubes-users] Why does Qubes with XFCE use Gnome programs?

2020-01-16 Thread shroobi
> > I've a question about the Qubes default desktop setup. Basically, the
> > latest Qubes is running XFCE desktop environment, but I've noticed
> > certain default programs are actually from Gnome. 
> >   
> Dom0 uses xfce but the templates use Gnome.
Qubes offers a fedora xfce template. Whonix-15 also uses xfce.

$ sudo qubes-dom0-update qubes-template-fedora-30-xfce

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47zDPB344cz6tmD%40submission01.posteo.de.


[qubes-users] Should I chose a TemplateVM or a StandaloneVM for a Windows 10 VM ?

2020-01-16 Thread M
I read about a TemplateVM and a StandaloneVM in the “Glossary of Qubes 
Terminology”. But I’m still not sure about which kind of VM to choose for a 
Windows 10 VM.

Can someone please tell me more clearly when to chose these kinds of VM’s, and 
which you would recommend for a Windows 10 VM and why ? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fdce17d0-c675-4526-98ad-89f647caf461%40googlegroups.com.


[qubes-users] Need a help : Trying to attach sys-usb to AppVm consistently

2020-01-16 Thread Taehwan Kim
Hi~
I am trying to attach usb device in sys-usb to my appvm consistently.
I tried

qvm-usb attach appVm  sys-usb:1-1 --persistent

But on every reboot sys-usb:number is changing. sometimes it is sys-usb:1-1 
or sys-usb-2-1
So AppVm won't start because of failed attached.
Is there any way to work around this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b75bab7c-e1f1-488b-99fa-72d904024f00%40googlegroups.com.


Re: [qubes-users] PCI passthrough issues

2020-01-16 Thread 'awokd' via qubes-users
Ana Z:
> Hi awokd,
> 
> I tried both combinations beforehand, neither of them helped.
> 
> I'm not really sure whether I've added xen-pciback.hide to the right place, 
> but I added it to the */etc/default/grub under *GRUB_CMDLINE_XEN_DEFAULT 
> and commit the change. If that's the thing I should've done, sadly, it 
> still doesn't work.
> 
> Dana srijeda, 15. siječnja 2020. u 19:36:28 UTC, korisnik awokd napisao je:
>>
>> Ana Z: 
>>> Hi, 
>>>
>>> I tried to passthrough my old PCI USB controller (chipset NEC 
>> 0720100AGM) 
>>> to Windows 7 HVM but I ran into some problems. 
>>
>>> dom0:01_05.0  USB controller: NEC Corporation OHCI USB 
>>> Controller 
>>> win7-z (permissive=true, no-strict-reset=true) 
>>> dom0:01_05.1  USB controller: NEC Corporation OHCI USB 
>>> Controller 
>>> win7-z (permissive=true, no-strict-reset=true) 
>>> dom0:01_05.2  USB controller: NEC Corporation uPD72010x USB 2.0 
>>> Controller win7-z 
>>> (permissive=true, no-strict-reset=true) 
>>
>> If you haven't, try attaching these with one or both options set to 
>> false. If it still doesn't help, see if 
>> xen-pciback.hide=(01:05.0)(01:05.1)(01:05.2) in xen.cfg helps. 

Yes, that's the right place. Didn't catch it was PCI at first, vs. PCIe.
It's possible that support for PCI has degraded. Might be worth trying a
PCIe USB controller (but search this list for a known good model).

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b16e1bf6-c3d6-3a1e-3e1b-f8580c77b570%40danwin1210.me.


Re: [qubes-users] Fedora kernel for VM

2020-01-16 Thread 'awokd' via qubes-users
Abel Luck:
> 'awokd' via qubes-users:

>> https://www.qubes-os.org/doc/managing-vm-kernel/#using-kernel-installed-in-the-vm
>>
> I've tried this against debian-10-minimal template vm, and it doesn't
> seem to work.
> 
> Any idea if there's something special needed to turn a debian-10-minimal
> into an HVM vm that can boot its own kernel?

Think you'd need a package called something like
qubes-kernel-vm-support, a Debian kernel package, and grub. DKMS used to
be necessary- see if that qubes package pulls it in or try without first.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1e4ffbe5-62af-a287-52cf-90516511bf51%40danwin1210.me.


Re: [qubes-users] Qubes booting in machine with Windows and Linux

2020-01-16 Thread Rafael Reis
Exactly!

I called my Qubes entry in UEFI bootloader “Recovery”

That way if someone checks for other boot sources they will only see
Windows and Recovery. I keep a windows install in a secondary disk for
decoy purposes. It’s the default boot if I press nothing after powering up
the system. A little stealth is always welcome.

Em qui, 16 de jan de 2020 às 06:27,  escreveu:

> Rafael and trueriver, you mean boot into BIOS each time to choose the OS?
> That's the way I have it now. I hit f1 upon turning the computer on to go
> into BIOS, and then I have the choice between Qubes or Debian (which is
> done through Grub, which also gives me the option to choose Windows). Or if
> I don't boot into BIOS with f1, it goes directly to Grub. Is that what you
> guys mean?
>
> As I mentioned in my first post, it seems that there might be a security
> benefit having it this way. Like trueriver said, people can potentially
> miss the fact that you have Qubes. And I think if the OSes aren't linked or
> don't know about each other, it's better for security.
>
> --
> You received this message because you are subscribed to a topic in the
> Google Groups "qubes-users" group.
> To unsubscribe from this topic, visit
> https://groups.google.com/d/topic/qubes-users/S-a9mrCjO2g/unsubscribe.
> To unsubscribe from this group and all its topics, send an email to
> qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/7128ce7e-98ee-4221-a663-43def84432d1%40googlegroups.com
> 
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAFZrRhF8%3DtnFNc%3DJN3P9TfUXT_focxcGb85YDYQ0OiDMsv9p0A%40mail.gmail.com.


[qubes-users] “Help! Qubes problems" : McAfee ENS not not installing on debian-10 Template vm

2020-01-16 Thread Arshad Ali
Hi guys,

I am new in Qubes OS, I need help regarding installation of McAfee on 
debian VM,

I have installed McAfee Agent on debian-10 Template vm, When I am trying to 
push ENS package from McAfee server to debian-10 Template VM its getting 
fail.

>From McAfee server I can only see sys-net connectivity with McAfee, where 
as McAfee agent is installed on debian vm,  
I am not sure where the problem is actually exist. Do I need to do any port 
forwarding on sys net and sys firewall (If It is  how it can be, ). 
As I didnot make any rules in Firewall which is by default allowing all and 
internet is running on debian vm. 


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bfa7f911-e014-49b7-aadc-514afb738418%40googlegroups.com.


Re: [qubes-users] Qubes booting in machine with Windows and Linux

2020-01-16 Thread robertlehamn
Rafael and trueriver, you mean boot into BIOS each time to choose the OS? 
That's the way I have it now. I hit f1 upon turning the computer on to go 
into BIOS, and then I have the choice between Qubes or Debian (which is 
done through Grub, which also gives me the option to choose Windows). Or if 
I don't boot into BIOS with f1, it goes directly to Grub. Is that what you 
guys mean?

As I mentioned in my first post, it seems that there might be a security 
benefit having it this way. Like trueriver said, people can potentially 
miss the fact that you have Qubes. And I think if the OSes aren't linked or 
don't know about each other, it's better for security. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7128ce7e-98ee-4221-a663-43def84432d1%40googlegroups.com.


[qubes-users] XSA-312 does not affect the security of Qubes OS

2020-01-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

The Xen Project has published Xen Security Advisory 312 (XSA-312).
This XSA does *not* affect the security of Qubes OS, and no user
action is necessary.

This XSA has been added to the XSA Tracker:

https://www.qubes-os.org/security/xsa/#312

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2020/01/15/xsa-312-qubes-not-affected/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=5jWI
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/378dffaa-2664-9355-0aff-c0e22858806c%40qubes-os.org.