[qubes-users] Qubes 4.0.3 - after Configure System wil hang and not boot

2020-03-07 Thread Dennis Schneck
Hi,

have tryed to install 4.0.3 but the System will hang after configure.

After power off and power on got dracout error.

 

Please have a look at:  https://github.com/QubesOS/qubes-issues/issues/5710

 

Thanks

 



-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/trinity-143388cc-b88e-42e3-a547-fa8450a5726d-1583573558617%403c-app-webde-bs20.


Re: [qubes-users] Appvm freezes whole system on startup?!

2020-03-07 Thread Stumpy

On 2020-03-06 08:16, Stumpy wrote:
I shutdown an appvm then tried to start it back up, but now, when i try 
to start it up, my monitor goes white (with a very thin outline of the 
appvm that i started, and then nothing. I cant kill it, change 
workspaces, access menus, nada.


I have tried to open a few things on that appvm but no matter what it 
seems to crash whether its FF or xterm etc, all freeze my sys at which 
point i have to restart.


How can i recover from this? or at least salvage the data in this appvm?

I am running a fully updated ver of qubes, the appvm is deb10.




I have checked and confirmed that all my deb10 appvms freeze my system. 
While i can recover the data I really need to have working appvms as 
there are some things that are harder to run on fedora than deb.


Is anyone else having a similar problem?

I even tried to install a new template but got this:
@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-itl 
qubes-template-debian-10
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...

No Match for argument qubes-template-debian-10
Nothing to download


Any help on how to diagnose/resolve this would really be appreciated as 
i really dont know where to start.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3667afd-03b1-e26c-a3a0-4cb6ce882ae9%40posteo.net.


Re: [qubes-users] How to change the keys for secure copy and paste between VM’s ?

2020-03-07 Thread A E
tor. 27. feb. 2020 kl. 17.00 skrev A E :

> tir. 25. feb. 2020 kl. 18.31 skrev A :
>
>> How to change the keys for secure copy and paste between VM’s ?
>>
>> I have tried to change the keys in this file: etc/qubes/guid.conf to
>> Ctrl + Alt + C  and  Crtl + Alt + V  But that didn’t work. Maybe because it
>> isn’t possible to use the Alt key here as it isn’t listed as a “valid
>> modifier key name” according to the text in the file.
>>
>> As my dom0 both uses the Ctrl + Shift and Ctrl + Win combination to
>> something different, I need to change the combination for secure copy and
>> paste. How do I do that ?
>>
>> --
>> You received this message because you are subscribed to a topic in the
>> Google Groups "qubes-users" group.
>> To unsubscribe from this topic, visit
>> https://groups.google.com/d/topic/qubes-users/PjYgZxTiKT0/unsubscribe.
>> To unsubscribe from this group and all its topics, send an email to
>> qubes-users+unsubscr...@googlegroups.com.
>> To view this discussion on the web visit
>> https://groups.google.com/d/msgid/qubes-users/91285191-fef9-4032-8226-41dffd149ce0%40googlegroups.com
>> .
>>
>
>
> According to the following page, it should be possible to change the keys
> used for secure copy and paste text between different domains:
>
> https://www.qubes-os.org/doc/copy-paste/#shortcut-configuration
>
> But now I have tried to change the keys for secure copy and paste to
> “Shift-Mod4-C” and “Shift-Mod4-V”. And restart the pc afterwards. But that
> didn’t help either.
>
> So I still can’t copy and paste text between different domains.
>
> So it seems to be a bug that needs fixing...
>



Here (https://github.com/QubesOS/qubes-issues/issues/5707) I got told by
Andrew David Wong that it is needed to delete the “#” sign on the edited
lines to change their status from a comment to a script that is going to be
executed.

So here are the steps to change the key combination for secure copy and
paste:

   1. Write this in the dom0 terminal (you might have to use root access):
   nano etc/qubes/guid.conf
   2. Change “Ctrl-Shift-c” to for example “Shift-Mod4-c”  (Mod4 is the Win
   key)
   3. Change “Ctrl-Shift-v” to for example “Shift-Mod4-v”
   4. Delete the “#” sign in the beginning of this/these line(s) (to change
   there status to a executive script).
   5. Save the file by pressing Ctrl + X, press Y and then Enter.
   6. Restart the pc to begin using the new key combination for secure copy
   and paste.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABRRaUGh_ECL2op64f-Kw7A0Xi4VEU7uC8c%3D5yfKpO0Lc24RTg%40mail.gmail.com.


Re: [qubes-users] Obtaining genuine Qubos installer

2020-03-07 Thread tetrahedra via qubes-users

On Thu, Mar 05, 2020 at 06:33:38PM +, Mark Fernandes wrote:
By the way, I consider that I am being completely reasonable with my 
threat

model, whilst also employing critical thinking. How hard is it to go to a
large PC store, and pick at random one Linux distribution, to take home, to
better ensure you have system integrity?


Sounds like the solution is pretty easy: go to a large PC store, buy a 
PC and pick a random Linux distribution off the shelf, then use all that 
to do your verifying.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200307145241.GA1104%40danwin1210.me.


[qubes-users] Re: Win7 Qubes windows-tools v3.2. attaching any device failsf

2020-03-07 Thread xyzo
Quick update

I updated the pv drivers to 8.2.2 and now win 7 is running a lot smoother. 
If I attach the audio pci controller under devices in Qubes device manager. 
The audio will work and is recognized in win 7. That's great but Is there 
anyway I can get the audio to work with out attaching audio controller to 
only win 7? I'd like to have audio running in other appvms in parallel to 
hvm.

Also, attaching the USB controller pci to win7 will stop win 7 from 
booting. It will say "no bootable device was found" when I run it.  And if 
I try attaching  any USB device  through dom0 "qvm-usb attach Win7 
sys-usb:2-7" I get "exception failed. Device failed to attach" I'm lost 
with this one. any help is appreciated thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4d0b7eb-f0da-49a3-81f5-ff55af9d35b9%40googlegroups.com.


Re: [qubes-users] Appvm freezes whole system on startup?!

2020-03-07 Thread donovang



- On Mar 7, 2020, at 5:15 AM, Stumpy stu...@posteo.net wrote:

> On 2020-03-06 08:16, Stumpy wrote:
>> I shutdown an appvm then tried to start it back up, but now, when i try
>> to start it up, my monitor goes white (with a very thin outline of the
>> appvm that i started, and then nothing. I cant kill it, change
>> workspaces, access menus, nada.
>> 
>> I have tried to open a few things on that appvm but no matter what it
>> seems to crash whether its FF or xterm etc, all freeze my sys at which
>> point i have to restart.
>> 
>> How can i recover from this? or at least salvage the data in this appvm?
>> 
>> I am running a fully updated ver of qubes, the appvm is deb10.
>> 
> 
> 
> I have checked and confirmed that all my deb10 appvms freeze my system.
> While i can recover the data I really need to have working appvms as
> there are some things that are harder to run on fedora than deb.
> 
> Is anyone else having a similar problem?
> 
> I even tried to install a new template but got this:
> @dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-itl
> qubes-template-debian-10
> Using sys-whonix as UpdateVM to download updates for Dom0; this may take
> some time...
> No Match for argument qubes-template-debian-10
> Nothing to download
> 
> 
> Any help on how to diagnose/resolve this would really be appreciated as
> i really dont know where to start.
> 
> --
I had a similar issue re-installing the deb template and I had success using 
"sudo qubes-dom0-update --action=reinstall qubes-template-debian-10".

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1443149593.109320.1583598865160.JavaMail.zimbra%40unseen.is.


Re: [qubes-users] Secure Boot on Dell 5590 UEFI - failed signature verification

2020-03-07 Thread Claudio Chinicz
Hi, thanks for answering.

I had read that post before and understood it is possible and in the plans for 
the future (by then) and decided to give it a try and see if someone made 
progress.

Regarding Anti Evil Made I think it is not necessary because I set my boot 
config to boot from disk only and the setup is password protected.

In the event someone removes the disk and tampers with the boot partition I'd 
like to rely on Secure Boot to check on it's integrity before proceeding.

I'm not a high profile or a targeted individual. All I am is a curious person, 
another Joe.

Cheers

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1ad316a1-8e4a-46c4-a149-da4ca98e9191%40googlegroups.com.


Re: [qubes-users] Appvm freezes whole system on startup?!

2020-03-07 Thread Stumpy

On 2020-03-07 11:34, donov...@unseen.is wrote:



- On Mar 7, 2020, at 5:15 AM, Stumpy stu...@posteo.net wrote:


On 2020-03-06 08:16, Stumpy wrote:

I shutdown an appvm then tried to start it back up, but now, when i try
to start it up, my monitor goes white (with a very thin outline of the
appvm that i started, and then nothing. I cant kill it, change
workspaces, access menus, nada.

I have tried to open a few things on that appvm but no matter what it
seems to crash whether its FF or xterm etc, all freeze my sys at which
point i have to restart.

How can i recover from this? or at least salvage the data in this appvm?

I am running a fully updated ver of qubes, the appvm is deb10.




I have checked and confirmed that all my deb10 appvms freeze my system.
While i can recover the data I really need to have working appvms as
there are some things that are harder to run on fedora than deb.

Is anyone else having a similar problem?

I even tried to install a new template but got this:
@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-itl
qubes-template-debian-10
Using sys-whonix as UpdateVM to download updates for Dom0; this may take
some time...
No Match for argument qubes-template-debian-10
Nothing to download


Any help on how to diagnose/resolve this would really be appreciated as
i really dont know where to start.

--

I had a similar issue re-installing the deb template and I had success using "sudo 
qubes-dom0-update --action=reinstall qubes-template-debian-10".



Thanks for that. Just to check though, would that remove my current 
template? or keep the current and install a new one?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a0d51de-0c22-f401-f37c-6b114f21e970%40posteo.net.


Re: [qubes-users] Appvm freezes whole system on startup?!

2020-03-07 Thread Sven Semmler
On Sat, Mar 07, 2020 at 06:15:11AM -0500, Stumpy wrote:
> On 2020-03-06 08:16, Stumpy wrote:
> > I shutdown an appvm then tried to start it back up, but now, when i try
> > to start it up, my monitor goes white (with a very thin outline of the
> > appvm that i started, and then nothing. I cant kill it, change
> > workspaces, access menus, nada.
> 
> Is anyone else having a similar problem?

I had a simlilar issue months ago when I installed 'gnome' as in the
whole desktop environment. I suggest when doing so one can damage the
GUI integration with Qubes.

When installing packages or trying things out I've never done before I
always do so in an AppVM, no the TemplateVM. The advantage being, if I
mess things up all my changes to the VM are gone once I restart it.

Only after testing changes successfully in an AppVM do I then install
them in the TemplateVM (with the obvious exception of things I've
installed before or that couldn't conceivably mess things up).

/Sven

-- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200307173638.GA1166%40app-email-private.


signature.asc
Description: PGP signature


Re: [qubes-users] Appvm freezes whole system on startup?!

2020-03-07 Thread donovang



- On Mar 7, 2020, at 11:32 AM, Stumpy stu...@posteo.net wrote:

> On 2020-03-07 11:34, donov...@unseen.is wrote:
>> 
>> 
>> - On Mar 7, 2020, at 5:15 AM, Stumpy stu...@posteo.net wrote:
>> 
>>> On 2020-03-06 08:16, Stumpy wrote:
 I shutdown an appvm then tried to start it back up, but now, when i try
 to start it up, my monitor goes white (with a very thin outline of the
 appvm that i started, and then nothing. I cant kill it, change
 workspaces, access menus, nada.

 I have tried to open a few things on that appvm but no matter what it
 seems to crash whether its FF or xterm etc, all freeze my sys at which
 point i have to restart.

 How can i recover from this? or at least salvage the data in this appvm?

 I am running a fully updated ver of qubes, the appvm is deb10.

>>>
>>>
>>> I have checked and confirmed that all my deb10 appvms freeze my system.
>>> While i can recover the data I really need to have working appvms as
>>> there are some things that are harder to run on fedora than deb.
>>>
>>> Is anyone else having a similar problem?
>>>
>>> I even tried to install a new template but got this:
>>> @dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-itl
>>> qubes-template-debian-10
>>> Using sys-whonix as UpdateVM to download updates for Dom0; this may take
>>> some time...
>>> No Match for argument qubes-template-debian-10
>>> Nothing to download
>>>
>>>
>>> Any help on how to diagnose/resolve this would really be appreciated as
>>> i really dont know where to start.
>>>
>>> --
>> I had a similar issue re-installing the deb template and I had success using
>> "sudo qubes-dom0-update --action=reinstall qubes-template-debian-10".
>> 
> 
> Thanks for that. Just to check though, would that remove my current
> template? or keep the current and install a new one?
> 
> --
I do not know as I had deleted my deb template to make space on my primary 
drive. You might clone your existing (to be safe if you need anything from it) 
and see if it does delete the original on reinstall. I do know my install 
squawked because it detected that there was not an existing deb template 
domain. However, the install ran anyway, so it may in fact delete the existing 
domain.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/784499623.111887.1583603471430.JavaMail.zimbra%40unseen.is.


Re: [qubes-users] Re: Win7 Qubes windows-tools v3.2. attaching any device failsf

2020-03-07 Thread Sven Semmler
On Sat, Mar 07, 2020 at 07:42:06AM -0800, xyzo wrote:
> I updated the pv drivers to 8.2.2 and now win 7 is running a lot smoother. 
> If I attach the audio pci controller under devices in Qubes device manager. 
> The audio will work and is recognized in win 7. That's great but Is there 
> anyway I can get the audio to work with out attaching audio controller to 
> only win 7? I'd like to have audio running in other appvms in parallel to 
> hvm.

I use a little USB audio in/out adapter [1] for $9.99 

> Also, attaching the USB controller pci to win7 will stop win 7 from 
> booting. It will say "no bootable device was found" when I run it.  And if 

I get this error if there is any storage media connected on USB when I
boot the Windows VM. Maybe try again and make sure nothing is connected
when you boot.

Also: for some strange reason I need to limit my VMs memory to 2048MB
when attaching the USB controller. Otherwise it'll crash. Your millage
might differ.

> I try attaching  any USB device  through dom0 "qvm-usb attach Win7 
> sys-usb:2-7" I get "exception failed. Device failed to attach" I'm lost 
> with this one. any help is appreciated thanks

It's my understanding that this functionality is simply not implemented
in the Qubes Windows drivers. The way this is implemented in Qubes is
using USBIP but instead of a network IP connection it uses the XEN
qrexec mechanism: https://github.com/QubesOS/qubes-app-linux-usb-proxy

So I tried to run USBIP in Windows and run an unchanged USPIP host in
sys-usb a couple years back and that worked for simple devices /
protocols (e.g. USB-to-serial interface but not more complex USB devices
like RealICE debuggger). So I gave up on that and instead have dom0
scripts to easily switch the controller between sys-usb, app-dev and
app-win.

/Sven

[1] TROND External USB Audio Adapter Sound Card with One 3.5mm Aux 
TRRS Jack for Integrated Audio Out & Microphone in
https://www.amazon.com/gp/product/B07L56C28R/

-- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200307175240.GB1166%40app-email-private.


signature.asc
Description: PGP signature


Re: [qubes-users] How to change the keys for secure copy and paste between VM’s ?

2020-03-07 Thread A E
lør. 7. mar. 2020 kl. 15.30 skrev A E :

> tor. 27. feb. 2020 kl. 17.00 skrev A E :
>
>> tir. 25. feb. 2020 kl. 18.31 skrev A :
>>
>>> How to change the keys for secure copy and paste between VM’s ?
>>>
>>> I have tried to change the keys in this file: etc/qubes/guid.conf to
>>> Ctrl + Alt + C  and  Crtl + Alt + V  But that didn’t work. Maybe because it
>>> isn’t possible to use the Alt key here as it isn’t listed as a “valid
>>> modifier key name” according to the text in the file.
>>>
>>> As my dom0 both uses the Ctrl + Shift and Ctrl + Win combination to
>>> something different, I need to change the combination for secure copy and
>>> paste. How do I do that ?
>>>
>>> --
>>> You received this message because you are subscribed to a topic in the
>>> Google Groups "qubes-users" group.
>>> To unsubscribe from this topic, visit
>>> https://groups.google.com/d/topic/qubes-users/PjYgZxTiKT0/unsubscribe.
>>> To unsubscribe from this group and all its topics, send an email to
>>> qubes-users+unsubscr...@googlegroups.com.
>>> To view this discussion on the web visit
>>> https://groups.google.com/d/msgid/qubes-users/91285191-fef9-4032-8226-41dffd149ce0%40googlegroups.com
>>> .
>>>
>>
>>
>> According to the following page, it should be possible to change the keys
>> used for secure copy and paste text between different domains:
>>
>> https://www.qubes-os.org/doc/copy-paste/#shortcut-configuration
>>
>> But now I have tried to change the keys for secure copy and paste to
>> “Shift-Mod4-C” and “Shift-Mod4-V”. And restart the pc afterwards. But that
>> didn’t help either.
>>
>> So I still can’t copy and paste text between different domains.
>>
>> So it seems to be a bug that needs fixing...
>>
>
>
>
> Here (https://github.com/QubesOS/qubes-issues/issues/5707) I got told by
> Andrew David Wong that it is needed to delete the “#” sign on the edited
> lines to change their status from a comment to a script that is going to be
> executed.
>
> So here are the steps to change the key combination for secure copy and
> paste:
>
>1. Write this in the dom0 terminal (you might have to use root
>access): nano etc/qubes/guid.conf
>2. Change “Ctrl-Shift-c” to for example “Shift-Mod4-c”  (Mod4 is the
>Win key)
>3. Change “Ctrl-Shift-v” to for example “Shift-Mod4-v”
>4. Delete the “#” sign in the beginning of this/these line(s) (to
>change there status to a executive script).
>5. Save the file by pressing Ctrl + X, press Y and then Enter.
>6. Restart the pc to begin using the new key combination for secure
>copy and paste.
>
>
It worked.

And it’s also possible to use the Alt key instead in the key combination
for secure copy and paste. Just write “Alt” instead of one of the other
keys.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABRRaUHoaMbt29qU-OjOwVA4A0ZJ%2BKLE9OQP9CWzXv-uefi9Wg%40mail.gmail.com.


[qubes-users] Is it possible to get an app like WinAuth for Linux or what do you use for 2 step verification ?

2020-03-07 Thread A
Is it possible to get an app like WinAuth for Linux or what do you use for 2 
step verification ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d4e0644f-73e9-4ae9-9f90-17d86e3d3481%40googlegroups.com.


[qubes-users] Is it possible to see how long it will take for Qubes OS to download and implement a certain update before and after the update has begun, and if so how ?

2020-03-07 Thread A
Is it possible to see how long it will take for Qubes OS to download and 
implement a certain update before and after the update has begun, and if so how 
?

If not, I’ll suggest that it will be implemented as it doesn’t seem to be 
possible to use the associated VM’s on the same time and that an update 
sometimes can take several hours.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9fb1fc73-814b-4d92-8b57-c891ba7c8e81%40googlegroups.com.


Re: [qubes-users] Is it possible to get an app like WinAuth for Linux or what do you use for 2 step verification ?

2020-03-07 Thread dhorf-hfref . 4a288f10
On Sat, Mar 07, 2020 at 03:08:13PM -0800, A wrote:
> Is it possible to get an app like WinAuth for Linux or what do you use
> for 2 step verification ?

https://www.qubes-os.org/doc/multifactor-authentication/



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200307235845.GV8973%40priv-mua.


[qubes-users] HCL - Lenovo ideapad 110-15ISK 80UD laptop

2020-03-07 Thread 'Connor Westman' via qubes-users
I have 4.0 installed and it is fully updated to the latest versions.

Its BIOS is updated to a official Lenovo version not originally supplied
with the laptop.

I could only install Qubes in BIOS legacy. I'm not sure what or if any
other BIOS settings need to be changed from their defaults since I had
changed them before Qubes.

The microphone is attached to dom0 whenever it is not attached to a vm.
Does that mean it is not a USB device? Is this a security threat?

The TPM is unusable.

Sometimes sys-net needs to be restarted after sleeping if a lot of ram
is used when the laptop is going to sleep. Other than that, sleep works.

Not a Qubes compatibility problem but it is important to mention;
Sometimes the wifi has problems connecting which persist until sys-net
is restarted.

Wifi works out of the box with the default Fedora template. Debian needs
a firmware package installed.

The camera and microphone work out of the box with Debian. Fedora and
Whonix untested.

USB 2 and 3 work out of the box with Fedora, Debian, and Whonix.

The DVD drive worked to read CDs. It is physically broken now so I can't
test it now. I didn't test DVDs or burning disks. I can't remember what
template this was used with.

Ethernet and Bluetooth are untested but they might need a firmware
package installed.

Sorry if I might have not included all of the information needed. The
legend qubes-os.org/doc/hcl mentions is not there. Hopefully anything
missed will show up in the HCL files.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7c17871a-52fc-81ee-f503-10263f42d7c2%40danwin1210.me.


Qubes-HCL-LENOVO-80UD-20200307-175720.yml
Description: application/yaml


Qubes-HCL-LENOVO-80UD-20200307-175720.cpio.gz
Description: application/gzip


signature.asc
Description: OpenPGP digital signature