Re: [qubes-users] Microphone Not Recording in Qubes R4 on Purism Librem v4

2020-05-23 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Fri, May 22, 2020 at 05:30:06PM +, 'Yiyi50' via qubes-users wrote:
> Dom0 picks up the Mic and I can attach it using the UI tool. But no
> one can hear me.

Please launch the PulseAudio Volume Control in dom0. Check the 'Input
Devices' tab. 

- - Is the correct Mic selected?
- - Is it maybe muted? (check mute button)
- - Can you see the indicator picking up sound?

/Sven

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-BEGIN PGP SIGNATURE-
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=WkK1
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200524050351.GB1492%40app-email-private.


Re: [qubes-users] Re: Qubes awarded MOSS Mission Partners grant!

2020-05-23 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Fri, May 22, 2020 at 09:47:21AM -0700, Foppe de Haan wrote:
> Nice, congratulations. to all involved :)

+1

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl7J/gcACgkQ2m4We49U
H7YzaBAAgWNYvdf8OrWkeq6g8QVcJoCQSeKY+xK7DaxPel2IXotl/uylxPyzDhET
GdwV72yNQvXHln/pZ4ma9uyVBQLnw27R47GXPJZh/kFWf6W6sIS6rg1LqYUh9oaL
HI76r91omvwivnc03SWN/CF9u/oqA/I2VhpFmhW8VklZpUw+nM+3MeiH+bZ8WPyx
93tIkUrlIMXdNyY7TxbJ43xwZtNStovDJSjfijMfa/zTBeJyRZYbtNHDHCMLe9nl
8C07917QHcR5HLro7A4z9Qk2EOOTp2n5WpmyjFKqqfmyCcvXr4AES5DxcrkrxaaF
hpp62E4JMGee1JfvGniBMmdR7sBrYrGwL4sxHEUcdZETpuKDD+tQMKpcDvLG9Slg
r5c76O9EDWCdOhFNJkm9zmL9PipbKTrFH5Nw60T/iD01CqtMcP9S0HNmm6NC/Ajn
Kmz/s92QJT1sZpGHsm3M8FBThmvC4pEAPgIomAUIkl0/XNQtW3lq1PpUNeidGjg3
40Ga4qzdHVoF5sUCF7TzIE2SWGKQ2/DHMSY7kO0P/ooXE/GAhBtJAbKEMZEMdh5H
3J1k48Vuf4Sd4ge2C9vnz5zAD6S8BZrSyTQeQIkfSHVnEhCBwWldX35oT15s5eqn
VJGW5yMRmphtfzFr4pSvuV1NF2lxmnBKUQJdiOotF86DkPgQ6Mk=
=DhiR
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200524045431.GA1492%40app-email-private.


[qubes-users] Re: Next update of Qubes?

2020-05-23 Thread brendan . hoar
On Saturday, May 23, 2020 at 11:32:31 AM UTC-4, Catacombs wrote:
>
> I see that Qubes does not announce planned new releases of Qubes, or state 
> what should trigger an update. 
>
> Just seems like it would be so much easier if we had an entire new version 
> of Qubes, which I could install.  At the same time, I am making sure any 
> Malware I might have picked up gets clobbered.   And leaving me with the 
> problem of re installing all of my personal files, my own personal fixes to 
> Template VMs.  Instead many are learning Salt.  
>
> This question also comes back to making Qubes easy for Human Rights 
> Activists and Journalists.   I do not think those two groups will go to the 
> trouble of learning how to install Salt.  I agree that since most of the 
> changes for Human Rights Activists/Journalists are made inside Template VMs 
> of (now usually Debian, or Fedora), that the folks who create Qubes for us, 
> should not concern themselves with those things.  
>
>  
Following along the work in all of the github repos and in qubes-issues, I 
would say definitely this calendar year.

4.1 is being tested (major changes: dom0 moving from fedora 26 to fedora 32 
; xen moving from 4.8 to 4.13 or potentially 4.14, depending on timing.).

Personally, I'm waiting for "finalization" of the work on the installer 
disk layout changes which move dom0 storage into a dedicated pool, with all 
the VMs in a separate pool (see here: 
https://github.com/QubesOS/qubes-anaconda-addon/pull/7 ). 

Once that occurs, I'll try another 4.1 testing ISO from 
https://openqa.qubes-os.org/  [I really only want to dive back into 4.1 
testing when I know it's close to or at the final disk layout and likely to 
end up in a similar state as if I'd installed once 4.1 is released.]

In addition ITL/Qubes is working with the Freedom of the Press foundation 
on some potential changes to make Qubes usage more straightforward 
(primarily UX) for all but also to support journalists / activists (that, 
in addition to FOTPF's fork that adds Secure Drop for that audience). See 
here: 
https://github.com/freedomofpress/securedrop-ux/wiki/Qubes-Journalist-Workstation
 
and follow along in the qubes-issues github repository for the UX work.

My mental bandwidth (WF a very small H w/ partner and toddler) isn't 
available for getting up to speed to formalize configs with salt at the 
moment, esp. as Qubes is more of a hobby for me. I just keep notes about 
what I need to "sudo dnf install" and/or "sudo apt-get install" in various 
templates should I need to upgrade, and then throw all 
notes/downloads/scripts into a vault VM that I backup from time to time. 
But I only support myself.

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b09e1c0a-4622-4d9d-9c85-fb14e7efb8a0%40googlegroups.com.


Re: [qubes-users] "Failed to return clean data" in Debian-10 Template

2020-05-23 Thread Logan

On 5/23/20 3:23 PM, unman wrote:


On Sat, May 23, 2020 at 02:30:53PM +, Logan wrote:

On 5/23/20 1:25 PM, unman wrote:


On Sat, May 23, 2020 at 08:39:11AM +, Logan wrote:

Hi all,

I am having trouble understanding the error i'm getting from the Qubes
Updater. My Debian template is no longer executing updates successfully.
Other templates are still ok.

  From all my searching I can only determine that retcode 255 appears to be
salt related. Any hints? I've typed out the report from dom0.


Updating debian-10

Error on updating debian-10: command '['sudo', 'qubesctl', '--skip-dom0',
'--targets=debian-10', '--show-output', 'state.sls', 'update.qubes-vm']'
returned non-zero exit status 20

debian-10:
---
_error:
Failed to return clean data
retcode:
255
stderr:
stdout:


Thanks,
Logan



I cant reproduce this.
Can you try a dom0 update - also may be worth updating the template by
hnad and then seeing if that fixes the issue.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200523132559.GD32656%40thirdeyesecurity.org.


Manually updated appears to have resolved the update issue, but my personal
VM is now failing whereas other Debian based appVMs still work. Possibly an
awkward coincidence.

It boots and about 10 seconds later a system halt is called:

A few possible issues are in the guest-.log, but the one that
stands out most is:

switch_root: failed to mount moving /dev to /sysroot/dev: invalid argument

I'll include more log details after I run a diff between this and a fresh
VM.

Logan


Has it resolved the salt update issue? Not entirely clear.


Yes it has! Thank you.

On the other issue, you are taking right steps.
Your diff would be interesting - make sure you have a backup of the data in
your personal VM, just in case.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200523152346.GA905%40thirdeyesecurity.org.



I have identified the moment when all services start shutting down and 
the system halts: Appears to be I/O related. I should have enough disk 
space as I just increased Private storage to 10240mb and System storage 
is the same.


Here is the smoking gun, I think:

Debian GNU/Linux 10 Personal hvc0
login: [15.293110] fuse init (API version 7.27)

[31.774331] tun: Universal TUN/TAP device driver, 1.6 



 [23025.639734] blkfront: xvdd: empty flush op 
failed 
[23025.639751] blkfront: xvdd: barrier or flush: disabled; pe


Stopping .[0;1;39mRealtimeKit Scheduling Policy Serv

Stopping .[0;1;39mAvailability of block devices.[0m.
[.[0;32m  OK  .[0m] Stopped target .[0;1;39mTimers.[0m.
[.[0;32m  OK  .[0m] Stopped .[0;1;39mDaily man-db regeneratio

Stopping .[0;1;39mCUPS Scheduler.[0m...

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5748ea83-b262-0f29-67e6-dc937e32300c%40threatmodel.io.


publickey - logan@threatmodel.io.asc.pgp
Description: application/pgp-key


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Next update of Qubes?

2020-05-23 Thread Jarrah


> I see that Qubes does not announce planned new releases of Qubes, or state 
> what should trigger an update. 
Releases are announced when ready for testing. In addition, releases of
templateVMs are announced in the Qubes-users/devel mailinglists.
> I am between updating Qubes with Fedora 32, which also means creating 
> AppVMs, I am not sure how I would update the Work VM, as it is, I am 
> guessing, based on Fedora 32.  All this translates to my working with Salt, 
> which is shown a lot of in this forum.  Meaning I should learn Salt and 
> some other things.  
I can't comment on doing it through salt, but using the Qubes Template
Manager you can select which template a VM uses and mass change the
templates.
> Just seems like it would be so much easier if we had an entire new version 
> of Qubes, which I could install.  At the same time, I am making sure any 
> Malware I might have picked up gets clobbered.   And leaving me with the 
> problem of re installing all of my personal files, my own personal fixes to 
> Template VMs.  Instead many are learning Salt.  
I'm not sure that reinstalling the entire OS and adding all changes made
to it would be better for most people. Installing a new template with
`qubes-dom0-update qubes-template-fedora-32` and moving VMs over to it
took me 10 minutes. Installing Qubes and getting the OS customised can
take me a few hours.
> This question also comes back to making Qubes easy for Human Rights 
> Activists and Journalists.   I do not think those two groups will go to the 
> trouble of learning how to install Salt.  I agree that since most of the 
> changes for Human Rights Activists/Journalists are made inside Template VMs 
> of (now usually Debian, or Fedora), that the folks who create Qubes for us, 
> should not concern themselves with those things.  
>
> So, anyone here have a guess as to what new version of Qubes might be 
> nearly out?  Or should I start reading about how to work with Salt?  

The next version of Qubes (4.1) is well on it's way. You can see
progress in the following links:

https://github.com/QubesOS/qubes-issues/issues/5529

https://github.com/QubesOS/qubes-issues/issues/5763

https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.1%22


As for salt, it's always recommended to learn and use a configuration
management system. But it's not necessary. It entirely depends on
whether you need to be able to rebuild your system from scratch or
automate updates.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3843ce5-1017-8e38-764c-0fda02791586%40undef.tools.


Re: [qubes-users] question about Xen and thinkpad battery

2020-05-23 Thread Franz
On Sat, May 23, 2020 at 5:49 PM Mike Keehan  wrote:

> On 5/23/20 8:20 PM, dark wizard wrote:
> > Hello, Qubes Community
> > How does Xen manage laptop battery. Can in kill it quickly?
> > Is it compatible with laptop power management technologies and
> > drastically affect battery life?
>

Thinkpads have some battery managment utility that work under linux and
avoid charging battery at 100% and keeping it charged when power supply is
normally connected. Charging and descharging decreases battery life, but
also keeping the battery always at 100% decreases battery life.

These utilities work perfectly under arch-linux with a x230, but installing
them in Qubes is very complicated. There are some suggestions on this
mailing list, but it is too much difficult for me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBZ_znHrV%2B0HFoDJkaSHrzVQRT2OHVmEDLzcX2HRL6XMA%40mail.gmail.com.


[qubes-users] Re: Error: sys-net failed to start – cannot connect to qrexec agent

2020-05-23 Thread Dave
Made it back. All I had to do was switch the Template VM from the default 
Fedora-30 to the Fedora-30-clone that I setup for my VPN Proxy. Good time 
to install Fedora-31 and switch. At least now I can wait on Qubes R4.1 for 
a clean, new system install.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ce7a17eb-8f35-4a77-aa42-7998f1fa1686%40googlegroups.com.


[qubes-users] Re: salt - dependencies in scripts

2020-05-23 Thread liked2

On 2020-05-23 14:09, unman wrote:

On Sat, May 23, 2020 at 12:19:02AM +0100, liked2-mmb7mzph...@public.gmane.org 
wrote:

Hi!

As salt is the recommended way to manage the Appms and templates, I'm trying to 
do so.

I successfully managed to create a top-script:

base:
  dom0:
   - match: nodegroup
   - create-template
   - create-appvm-for-template

  'created-template':
- install-pkgs
- modify_config
- require: dom0

Unfortunately, the script fails on the first run, because step 2. requires step 1. done. 
"Require" seems not to work here. After the second run, everything is fine.

Any hints highly appreciated. :)

Best, P



A top file is used for *targeting* - it maps hosts/groups and
configurations/states that should apply.
`Requires` is a condition between states, so should be used in *state*
files. (I didn't even know it could be used in a top file)

Put the require statement in one of your state files. (Look how it's
treated in the whonix state files.)

unman



1. Ok, what's your suggestion to create templates and AppVMs both of them? 
Should I run multiple runs with targeting several top files? I thought the best 
point of salt is to run just 1 command to setup the whole environment?

2. I tried to find the whonix state files, but I find only some python files in 
/srv/salt/_grains/whonix.*

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1e82ff80-42a2-fb68-f44e-216609bf97b5%40gmx.de.


[qubes-users] salt - qvm.firewall

2020-05-23 Thread liked2

Hi!

I'm trying to setup some firewall rules on some AppVms. Unfortunately, I cannot 
find any documentation to do this with the salt stack. The only documentation I 
found is:
https://github.com/QubesOS/qubes-mgmt-salt-dom0-qvm

Any hints?

Thxs, P

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/75befd3d-dd76-5270-e749-60cba07b9c38%40gmx.de.


[qubes-users] rebuilding xorg-x11-drv-intel to fix graphics problem

2020-05-23 Thread Holger Levsen
hi,

so I think I'm experiencing https://bugs.freedesktop.org/show_bug.cgi?id=112296
when running Qubes 4.0 with a 4.19 kernel on a x230, that is, since the 
following
line appeared in Xorg.0.log:

==> /var/log/Xorg.0.log <==
[ 19271.994] (EE) intel(0): Failed to submit rendering commands (No such file 
or directory), disabling acceleration.

since then,  graphics is very slow / sluggish, eg opening new terminals
is quite very slow, despite the system itself is fine and not loaded.
I even can still watch videos...  but the system feels like it is 
running with a load of 20 while in reality it's almost idle.

So I would like to give try the patch from the above referred bug, which is
https://cgit.freedesktop.org/xorg/driver/xf86-video-intel/commit/?id=e628d22673dfa494230e6f79ceff7d178137c71a

So, what's running on dom0:

[user@dom0 ~]$ rpm -qa |grep xorg-x11-drv-intel
xorg-x11-drv-intel-2.99.917-32.20171025.fc25.x86_64

So I try to get the source like this:

[user@dom0 ~]$ sudo qubes-dom0-update --action=download  xorg-x11-drv-intel
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some 
time...
No such command: download. Please use /usr/bin/dnf --help
It could be a DNF plugin command, but loading of plugins is currently disabled.

hmmm. because:

[user@fedora-25 ~]$ dnf download --source xorg-x11-drv-intel
[...]
xorg-x11-drv-intel-2.99.917-26.20160929.fc25.src.rpm

So how/where can I download the source package for 
xorg-x11-drv-intel-2.99.917-32.20171025.fc25.x86_64
?

Also, I'm wondering if it's worth this excercise or whether we are really
close to Qubes 4.1 and thus I could try upgrading to that? But then I would
also really like to know how to rebuild patched rpms from dom0...


-- 
cheers,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200523214703.GA20761%40layer-acht.org.


signature.asc
Description: PGP signature


Re: [qubes-users] question about Xen and thinkpad battery

2020-05-23 Thread Mike Keehan

On 5/23/20 8:20 PM, dark wizard wrote:

Hello, Qubes Community
How does Xen manage laptop battery. Can in kill it quickly?
Is it compatible with laptop power management technologies and 
drastically affect battery life?


--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd11d452-73f0-4f3a-a16d-51a71ee43951%40googlegroups.com 
.


I've been using Qubes on my laptop for more than three years, and my
battery is fine.  Running on battery lasts six hours or more, which
is somewhat less than a normal Linux distribution, about 30% less I
think.

As there are more than 6 VMs running all at the same time, I think
battery power lasts very well under Qubes.

Mike.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c32a568d-3a03-a467-f009-2b8855e1ef3a%40keehan.net.


[qubes-users] question about Xen and thinkpad battery

2020-05-23 Thread dark wizard
Hello, Qubes Community
How does Xen manage laptop battery. Can in kill it quickly?
Is it compatible with laptop power management technologies and drastically 
affect battery life?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd11d452-73f0-4f3a-a16d-51a71ee43951%40googlegroups.com.


Re: [qubes-users] Window Manager - several missing UI features on bootup

2020-05-23 Thread JAVA BAK
Yes it's just xfce. I can look at WM now. I did not note the upgrade well 
so for reproducing, I cannot say the steps.


On Saturday, May 23, 2020 at 9:11:58 AM UTC-4, unman wrote:
>
> On Sat, May 23, 2020 at 12:48:49AM -0700, JAVA BAK wrote: 
> > Dual monitors. Tried removing second monitor but behavior is the same. 
> > 
> > I updated to Fedora 32 and updated some AppVMs. 
> > 
> > 
> > I noticed the following on bootup: 
> > 
> > dom0 settings panels open mostly or a bit off screen, never in 
> acceptable 
> > area. Not ever able to see window titlebar. 
> > 
> > dom0 windows such as terminal open alright but partially off screen as 
> > above. No titlebar or drag bar, although menu is draggable. 
> > 
> > Workspace is set to 1 workspace. It was 8. 
> > 
> > VM windows have no border at all or titlebar. 
> > 
> > If I open the Display panel and apply, all windows and workspace bar 
> > disappear. 
> > 
> > 
> > 
> > 
> > What happened? Can I fix that? 
> > 
>
> If you didnt update any other dom0 packages, it just sounds like a WM 
> glitch/bug - are you using Xfce? 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9ea5133b-29e3-4307-ad8f-2ef9ed0d0e69%40googlegroups.com.


Re: [qubes-users] Window Manager - several missing UI features on bootup

2020-05-23 Thread JAVA BAK
Yes I chose xfce.


On Saturday, May 23, 2020 at 9:11:58 AM UTC-4, unman wrote:
>
> On Sat, May 23, 2020 at 12:48:49AM -0700, JAVA BAK wrote: 
> > Dual monitors. Tried removing second monitor but behavior is the same. 
> > 
> > I updated to Fedora 32 and updated some AppVMs. 
> > 
> > 
> > I noticed the following on bootup: 
> > 
> > dom0 settings panels open mostly or a bit off screen, never in 
> acceptable 
> > area. Not ever able to see window titlebar. 
> > 
> > dom0 windows such as terminal open alright but partially off screen as 
> > above. No titlebar or drag bar, although menu is draggable. 
> > 
> > Workspace is set to 1 workspace. It was 8. 
> > 
> > VM windows have no border at all or titlebar. 
> > 
> > If I open the Display panel and apply, all windows and workspace bar 
> > disappear. 
> > 
> > 
> > 
> > 
> > What happened? Can I fix that? 
> > 
>
> If you didnt update any other dom0 packages, it just sounds like a WM 
> glitch/bug - are you using Xfce? 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a513e96b-a50e-44a5-9125-4b18f7f63d47%40googlegroups.com.


[qubes-users] Google Summer of Code & Season of Docs 2020

2020-05-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

We're pleased to announce that the Qubes OS Project will be
participating in both Google Summer of Code [1] and Google Season of
Docs [2] for 2020!

For Google Summer of Code this year, William Huang will be working on
Template Manager and Package Handling Improvements [3] under the
mentorship of Qubes project lead Marek Marczykowski-Górecki [4].
Specifically, William will be "designing a better mechanism for handling
template installation and creating a user-facing application to deal
with such mechanism and other template-related configuration,
consolidating the management of templates." For more information about
Google Summer of Code in relation to the Qubes OS project, please see
our information page [5].

Meanwhile, with Google Season of Docs, we're still in the technical
writer exploration phase [6], in which "interested technical writers
discuss project ideas with mentoring organizations." If you're
interested in participating in Google Season of Docs with Qubes [7],
the technical writer application period begins on June 9, 2020 at 18:00
UTC, and the deadline is July 9, 2020 at 18:00 UTC.


[1] https://summerofcode.withgoogle.com/
[2] https://developers.google.com/season-of-docs
[3] https://summerofcode.withgoogle.com/projects/#6190965460566016
[4] https://www.qubes-os.org/team/#marek-marczykowski-górecki
[5] https://www.qubes-os.org/gsoc/
[6] https://developers.google.com/season-of-docs/docs/timeline
[7] https://www.qubes-os.org/gsod/

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2020/05/23/google-summer-of-code-and-season-of-docs-2020/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=KTeM
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f6d3b8d9-4b9f-5233-61c2-410afabdb314%40qubes-os.org.


[qubes-users] Next update of Qubes?

2020-05-23 Thread Catacombs
I see that Qubes does not announce planned new releases of Qubes, or state 
what should trigger an update. 

I am between updating Qubes with Fedora 32, which also means creating 
AppVMs, I am not sure how I would update the Work VM, as it is, I am 
guessing, based on Fedora 32.  All this translates to my working with Salt, 
which is shown a lot of in this forum.  Meaning I should learn Salt and 
some other things.  

Just seems like it would be so much easier if we had an entire new version 
of Qubes, which I could install.  At the same time, I am making sure any 
Malware I might have picked up gets clobbered.   And leaving me with the 
problem of re installing all of my personal files, my own personal fixes to 
Template VMs.  Instead many are learning Salt.  

This question also comes back to making Qubes easy for Human Rights 
Activists and Journalists.   I do not think those two groups will go to the 
trouble of learning how to install Salt.  I agree that since most of the 
changes for Human Rights Activists/Journalists are made inside Template VMs 
of (now usually Debian, or Fedora), that the folks who create Qubes for us, 
should not concern themselves with those things.  

So, anyone here have a guess as to what new version of Qubes might be 
nearly out?  Or should I start reading about how to work with Salt?  


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4b95eb01-d12e-46ae-8bd4-0996f2b49a62%40googlegroups.com.


Re: [qubes-users] "Failed to return clean data" in Debian-10 Template

2020-05-23 Thread unman
On Sat, May 23, 2020 at 02:30:53PM +, Logan wrote:
> On 5/23/20 1:25 PM, unman wrote:
> > 
> > On Sat, May 23, 2020 at 08:39:11AM +, Logan wrote:
> > > Hi all,
> > > 
> > > I am having trouble understanding the error i'm getting from the Qubes
> > > Updater. My Debian template is no longer executing updates successfully.
> > > Other templates are still ok.
> > > 
> > >  From all my searching I can only determine that retcode 255 appears to be
> > > salt related. Any hints? I've typed out the report from dom0.
> > > 
> > > 
> > > Updating debian-10
> > > 
> > > Error on updating debian-10: command '['sudo', 'qubesctl', '--skip-dom0',
> > > '--targets=debian-10', '--show-output', 'state.sls', 'update.qubes-vm']'
> > > returned non-zero exit status 20
> > > 
> > > debian-10:
> > >   ---
> > >   _error:
> > >   Failed to return clean data
> > >   retcode:
> > >   255
> > >   stderr:
> > >   stdout:
> > > 
> > > 
> > > Thanks,
> > > Logan
> > > 
> > 
> > I cant reproduce this.
> > Can you try a dom0 update - also may be worth updating the template by
> > hnad and then seeing if that fixes the issue.
> > 
> > --
> > You received this message because you are subscribed to the Google Groups 
> > "qubes-users" group.
> > To unsubscribe from this group and stop receiving emails from it, send an 
> > email to qubes-users+unsubscr...@googlegroups.com.
> > To view this discussion on the web visit 
> > https://groups.google.com/d/msgid/qubes-users/20200523132559.GD32656%40thirdeyesecurity.org.
> > 
> Manually updated appears to have resolved the update issue, but my personal
> VM is now failing whereas other Debian based appVMs still work. Possibly an
> awkward coincidence.
> 
> It boots and about 10 seconds later a system halt is called:
> 
> A few possible issues are in the guest-.log, but the one that
> stands out most is:
> 
> switch_root: failed to mount moving /dev to /sysroot/dev: invalid argument
> 
> I'll include more log details after I run a diff between this and a fresh
> VM.
> 
> Logan

Has it resolved the salt update issue? Not entirely clear.
On the other issue, you are taking right steps.
Your diff would be interesting - make sure you have a backup of the data in
your personal VM, just in case.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200523152346.GA905%40thirdeyesecurity.org.


Re: [qubes-users] qubes-mirage-firewall 0.7

2020-05-23 Thread 'qubeslover' via qubes-users
Sent with [ProtonMail](https://protonmail.com) Secure Email.

‐‐‐ Original Message ‐‐‐
On Tuesday, May 19, 2020 3:11 PM,  wrote:

> I'm pleased to announce the release of qubes-mirage-firewall 0.7:
>
> [ 
> https://github.com/mirage/qubes-mirage-firewall/releases/tag/v0.7](https://github.com/mirage/qubes-mirage-firewall/releases/tag/v0.7)
>
> This is a unikernel that can run as a QubesOS ProxyVM, replacing 
> sys-firewall. It may be useful if you want something smaller or 
> faster-to-start than the Linux-based sys-firewall. It requires around 64MB of 
> RAM when running and requires "0.0s" of CPU time to boot, according to "xl 
> list". It does not need or use a hard-disk, and does not persist any state 
> between reboots.

Excellent!

Built it in a Debian VM, copied the mirage-firewall kernel to Dom0, created a 
dedicated standalone VM (only 32Mb) and works great! (I am testing it as main 
firewall and so far no problem).

Is there any plan to create a package for Qubes Dom0 repo for the future?

Cheers.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2GoCgPKzAj2UK9VRXtej4f7NRtYn5od5gD-LC0LhspPQ18r2UJhRtxP829noXMBw104u_MynuuCqvRdtXs-Baug3gQXpmKeTO_OGabWsiNQ%3D%40protonmail.com.


[qubes-users] How to use pass with split gpg ?

2020-05-23 Thread Christophe
Hi all, 

Does anyone know how to use pass with split gpg ? 

I found this, but I could not get it working.
https://github.com/kulinacs/pass-qubes/blob/master/qubes.bash

I also tried to replace gpg by qubes-gpg-client-wrapper in /usr/bin/pass
but without success, I get an error 

gpg: decrypt_message failed: Unknown system error

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200523150905.oa6ibrnole4ifrud%40disp6806.


signature.asc
Description: PGP signature


Re: [qubes-users] "Failed to return clean data" in Debian-10 Template

2020-05-23 Thread Logan

On 5/23/20 1:25 PM, unman wrote:


On Sat, May 23, 2020 at 08:39:11AM +, Logan wrote:

Hi all,

I am having trouble understanding the error i'm getting from the Qubes
Updater. My Debian template is no longer executing updates successfully.
Other templates are still ok.

 From all my searching I can only determine that retcode 255 appears to be
salt related. Any hints? I've typed out the report from dom0.


Updating debian-10

Error on updating debian-10: command '['sudo', 'qubesctl', '--skip-dom0',
'--targets=debian-10', '--show-output', 'state.sls', 'update.qubes-vm']'
returned non-zero exit status 20

debian-10:
---
_error:
Failed to return clean data
retcode:
255
stderr:
stdout:


Thanks,
Logan



I cant reproduce this.
Can you try a dom0 update - also may be worth updating the template by
hnad and then seeing if that fixes the issue.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200523132559.GD32656%40thirdeyesecurity.org.

Manually updated appears to have resolved the update issue, but my 
personal VM is now failing whereas other Debian based appVMs still work. 
Possibly an awkward coincidence.


It boots and about 10 seconds later a system halt is called:

A few possible issues are in the guest-.log, but the one that 
stands out most is:


switch_root: failed to mount moving /dev to /sysroot/dev: invalid argument

I'll include more log details after I run a diff between this and a 
fresh VM.


Logan

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/be2038f7-211b-e194-b3ee-e9b8647d84a4%40threatmodel.io.


publickey - logan@threatmodel.io.asc.pgp
Description: application/pgp-key


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] "Failed to return clean data" in Debian-10 Template

2020-05-23 Thread unman
On Sat, May 23, 2020 at 08:39:11AM +, Logan wrote:
> Hi all,
> 
> I am having trouble understanding the error i'm getting from the Qubes
> Updater. My Debian template is no longer executing updates successfully.
> Other templates are still ok.
> 
> From all my searching I can only determine that retcode 255 appears to be
> salt related. Any hints? I've typed out the report from dom0.
> 
> 
> Updating debian-10
> 
> Error on updating debian-10: command '['sudo', 'qubesctl', '--skip-dom0',
> '--targets=debian-10', '--show-output', 'state.sls', 'update.qubes-vm']'
> returned non-zero exit status 20
> 
> debian-10:
>   ---
>   _error:
>   Failed to return clean data
>   retcode:
>   255
>   stderr:
>   stdout:
> 
> 
> Thanks,
> Logan
> 

I cant reproduce this.
Can you try a dom0 update - also may be worth updating the template by
hnad and then seeing if that fixes the issue.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200523132559.GD32656%40thirdeyesecurity.org.


Re: [qubes-users] Window Manager - several missing UI features on bootup

2020-05-23 Thread unman
On Sat, May 23, 2020 at 12:48:49AM -0700, JAVA BAK wrote:
> Dual monitors. Tried removing second monitor but behavior is the same.
> 
> I updated to Fedora 32 and updated some AppVMs.
> 
> 
> I noticed the following on bootup:
> 
> dom0 settings panels open mostly or a bit off screen, never in acceptable 
> area. Not ever able to see window titlebar.
> 
> dom0 windows such as terminal open alright but partially off screen as 
> above. No titlebar or drag bar, although menu is draggable.
> 
> Workspace is set to 1 workspace. It was 8.
> 
> VM windows have no border at all or titlebar.
> 
> If I open the Display panel and apply, all windows and workspace bar 
> disappear.
> 
> 
> 
> 
> What happened? Can I fix that?
> 

If you didnt update any other dom0 packages, it just sounds like a WM
glitch/bug - are you using Xfce?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200523131155.GB32656%40thirdeyesecurity.org.


Re: [qubes-users] salt - dependencies in scripts

2020-05-23 Thread unman
On Sat, May 23, 2020 at 12:19:02AM +0100, lik...@gmx.de wrote:
> Hi!
> 
> As salt is the recommended way to manage the Appms and templates, I'm trying 
> to do so.
> 
> I successfully managed to create a top-script:
> 
> base:
>  dom0:
>   - match: nodegroup
>   - create-template
>   - create-appvm-for-template
> 
>  'created-template':
>- install-pkgs
>- modify_config
>- require: dom0
> 
> Unfortunately, the script fails on the first run, because step 2. requires 
> step 1. done. "Require" seems not to work here. After the second run, 
> everything is fine.
> 
> Any hints highly appreciated. :)
> 
> Best, P
> 

A top file is used for *targeting* - it maps hosts/groups and
configurations/states that should apply.
`Requires` is a condition between states, so should be used in *state*
files. (I didn't even know it could be used in a top file)

Put the require statement in one of your state files. (Look how it's
treated in the whonix state files.)

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200523130955.GA32656%40thirdeyesecurity.org.


[qubes-users] Survey on Change Management

2020-05-23 Thread Change Management

This email newsletter was sent to you in graphical HTML format.
If you're seeing this version, your email program prefers plain text emails.
You can read the original version online:
https://ymlptr9.net/zxMlt3



Greetings

Many organizations fail to respond to external and internal
environment which in turn affect the well-being of the organization
and may cause total shutdown and loss of business such as Nokia case.
Other organizations are considering the Marketing Mix along with the
change best practices to insure continued prosperity and revenues.The
study will also conclude the best leadership style that should be
associated with a change. This research is done to investigates the
best practices of organizational change and the best leadership theory
that could be used to implement change. It aims at helping
organizations in implementing a successful change, as well as the
marketing and leadership strategies of change adopted to insure
successful implantation of the change. This study seeks to identify
the most recurrent factors that drives organizational change, and to
illustrate methodologies for an effective change.

We kindly ask you to complete this quick 12 Questons Suervy in this
regard.

https://www.smartsurvey.co.uk/s/ChangeManagementleadershipstyle/

Many Thanks

_
Unsubscribe / Change Profile: https://ymlptr9.net/ugwhmwyqgsguqhjjsugessyggeewmb
Powered by YourMailingListProvider

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5eefd02e61d5c043585e22086ae40f0%40smtp35.ymlpsvr.com.


[qubes-users] "Failed to return clean data" in Debian-10 Template

2020-05-23 Thread Logan

Hi all,

I am having trouble understanding the error i'm getting from the Qubes 
Updater. My Debian template is no longer executing updates successfully. 
Other templates are still ok.


From all my searching I can only determine that retcode 255 appears to 
be salt related. Any hints? I've typed out the report from dom0.



Updating debian-10

Error on updating debian-10: command '['sudo', 'qubesctl', 
'--skip-dom0', '--targets=debian-10', '--show-output', 'state.sls', 
'update.qubes-vm']' returned non-zero exit status 20


debian-10:
---
_error:
Failed to return clean data
retcode:
255
stderr:
stdout:


Thanks,
Logan

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7699ba94-c9d2-4305-c7cb-9e51e6788d98%40threatmodel.io.


publickey - logan@threatmodel.io.asc.pgp
Description: application/pgp-key


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Qubes-vpn-support Tor Browser not working

2020-05-23 Thread Logan

On 5/20/20 11:29 AM, Anhangá wrote:

Thanks Daniil. I'll try that.

Em terça-feira, 19 de maio de 2020 08:53:09 UTC-3, Daniil Travnikov 
escreveu:


Try this on your browser:


About:config

network.proxy.socks_remote_dns  >> Choose >>  false
preferences  --advancednetoworksettings   >> Choose
 >>   No Proxy
network.proxy.type    >> Choose >>    0
network.http.sendRefererHeader    >> Choose >>    0
network.cookie.cookieBehavior    >> Choose >>    2



On Sunday, April 19, 2020 at 12:06:06 AM UTC+3, Anhangá wrote:



Em sábado, 18 de abril de 2020 16:24:22 UTC-3, Chris Laprise
escreveu:

On 4/18/20 9:26 AM, Anhangá wrote:
 > But is it possible to somehow make TOR Browser to access
clearnet using
 > a VPN connection after the TOR routing? Do I have to do
some special
 > config in the TOR Browser to allow that?
 >
 > Em sábado, 18 de abril de 2020 10:07:16 UTC-3, Jarrah
escreveu:
 >
 >      > My goal is connect to my VPN after the TOR routing
(Bypass the
 >      > tor censorpship in some websites).
 >     This somewhat defeats the purpose of using TOR. You
now have an
 >     identifiable address due to having a (hopefully paid)
vpn. They can
 >     track you. Any anonymity provided by TOR is taken
away by the VPN.
 >      > The problem is, when I set mt whonix-workstation
to connect to
 >     sys-VPN over
 >      > whonix-gw, My Tor Browser do not work anymore. If
I disconnect
 >     the VPN
 >      > inside sys-VPN, the Tor Browser start working as
usual, but when
 >     my VPN is
 >      > connected, it stops.
 >
 >     This is by design. TOR browser assumes it can speak
TOR protocols and
 >     connect to .onion addresses (etc). However, the VPN
will come out onto
 >     the clearnet, rather than TOR's network. TOR browser
cannot lookup TOR
 >     addresses, nor can it connect to anything relying on
TOR.
 >
 >     If you want to do this to access clearnet sites,
you'd have to use a
 >     standard browser. The VPN should work just fine, so
long as you're not
 >     trying to connect to TOR specific services through
it. Though, please
 >     see above warning about doing so.
 >
 >     The only reason I can think of to do this is if you
live in a location
 >     that blocks VPNs, but is fine with TOR. Otherwise,
you have exactly the
 >     same security model as just using the VPN, plus the
overhead and attack
 >     surface of TOR/Whonix.

Someone on the Whonix forums might know the definitive
answer to your
question. But I'd guess there is little or no advantage to
using
Torbrowser over Firefox when it can't speak to the Tor router.

Note that Firefox has recently incorporated some Torbrowser
features, so
you could use it with Tracking Protection set to Strict, and
'privacy.firstparty.isolate' set to True,
'privacy.resistFingerprinting'
set to True, in addition to using the User-Agent Switcher
extension. I
think these are a good idea whether or not you use a tunnel
or proxy.

-- 
Chris Laprise, tas...@posteo.net

https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886


Thank you for the answer Chris.

I'm not planning to use Firefox over a TOR connection. I just
want to use the TOR browser but, in the tor end node, route my
traffic to a VPN and then to the Internet.

I set the ProxyVM as you said in the qubes-vpn-support and it
worked just fine. LINK IS UP and running. But if my ProxyVM is
running my VPN connection, TOR browser in the Whonix-WS do not
work. If I disconnect the VPN inside my ProxyVM, TOR browser
also works just fine. The problem is only when I'm trying to use
TOR Browser with VPN link UP. So, I'm guessing that is some
config that I have to do inside TOR Browser to use my VPN

The newest firefox has some really good anti-fingerprint
features, but nothing compares to TOR Browser, like in-depth
fingerprinting combining settings as Screen Resolution and
viewport...

--
You received this message 

[qubes-users] Window Manager - several missing UI features on bootup

2020-05-23 Thread JAVA BAK
Dual monitors. Tried removing second monitor but behavior is the same.

I updated to Fedora 32 and updated some AppVMs.


I noticed the following on bootup:

dom0 settings panels open mostly or a bit off screen, never in acceptable 
area. Not ever able to see window titlebar.

dom0 windows such as terminal open alright but partially off screen as 
above. No titlebar or drag bar, although menu is draggable.

Workspace is set to 1 workspace. It was 8.

VM windows have no border at all or titlebar.

If I open the Display panel and apply, all windows and workspace bar 
disappear.




What happened? Can I fix that?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/49f7ed54-ef3b-4b76-8cb9-9a1fdfb34bf9%40googlegroups.com.