Re: [qubes-users] Issue verifying media

2020-09-11 Thread 'awokd' via qubes-users
'src11' via qubes-users:
> Trying to install the most recent version of Qubes from USB on a Purism 
> Librem 15 laptop. When I click verify media I get two of these errors:
> 
> dracut-pre-udev[463]: rpc.idmapd: conf_reinit: open ("(null)", 0_RDONLY) 
> failed
> 
> What does that refer to and is it ok to proceed?
> 
Don't know if I've seen that, but seems harmless enough. Try ignoring
and proceeding.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/506c1df8-bcdd-0493-465e-9f35e0fbdb41%40danwin1210.me.


Re: [qubes-users] Adding a new SSD causes Qubes to go into dracut emergency shell

2020-09-11 Thread 'ktono' via qubes-users
Hi everyone,

I got around to swapping the two SSDs, and now it properly boots to the login 
screen! The only issue is that all the PCI numbers seem to have incremented by 
1, so I'll have to readjust my setup.

The whole thing was a really strange issue, but at least now I don't have think 
about a full reinstall.

Thanks to everyone for their input.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8271faeb-cbfe-454f-8abf-0fd781e6778co%40googlegroups.com.


Re: [qubes-users] Adding a new SSD causes Qubes to go into dracut emergency shell

2020-09-11 Thread 'ktono' via qubes-users
In the BIOS (it's an ASUS x570 one), it says that the first drive in the boot 
priority is set to my older SSD. Under storage information, it labels my new 
SSD as "M.2_1" and my old SSD as "M.2_2". Can't find any options to disable an 
M.2 port.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee68a8f1-dd33-40bc-b935-b76f164908efo%40googlegroups.com.


Re: [qubes-users] Multi Media update fails Qubes 4

2020-09-11 Thread unman
On Fri, Sep 11, 2020 at 04:40:08AM -0700, William Fisher wrote:
> I have the Multi Media VM installed including Chrome, Spotify, Musique, VLC 
> player, etc.  Qubes Updater keeps saying it needs updates but the updates 
> always fail. It always comes back with 1 changed 2 failed.
> 
> Error on updating t-multimedia: Command '['sudo', 'qubesctl', 
> '--skip-dom0', '--targets=t-multimedia', '-show-output', 'state.sls', 
> 'update.qubes-vm']' returned non-zero exit status 20
> 
>ID: dsa-4371-update
>  Function: cmd.script
> Result: True
> Comment: Nothing to do
>   
> 
>ID: update
>  Function: pkg.uptodate
> Result: False
> Comment: w:target Packages (main/binary-amd64/Packages) is configured 
> multiple times in /etc/apt/sources.list.d/google-chrome.list:3 
> and/etc/apt/sources.list.d/google.list:1
> 
> I have numerous other packages listed multiple times but I can't figure out 
> how to copy the text displayed in dom0 Updater to this VM.
> 
> Any ideas?  
> Is this a common problem?
> How can I get updates on multi-media, especially Chrome and VLC Media 
> Player? 
> 
I see no reason to copy the text to the VM.
I would try opening the template you are using and removing the
duplicate entries: the files to review are clear, and it shouldnt be
difficult for you to delete as necessary. (You'll need to do this as
root.)
I would then try an update in the template.
Then try the Qube Updater.

I'm not sure what you mean by "numerous other packages listed multiple
times" or why you would want to do this.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200911124821.GB12791%40thirdeyesecurity.org.


Re: [qubes-users] Adding a new SSD causes Qubes to go into dracut emergency shell

2020-09-11 Thread Mike Keehan

On 9/11/20 11:23 AM, 'ktono' via qubes-users wrote:


Hi,

I haven't tried switching. One of the slots is under some CPU cooler 
fans, and I don't have the stuff to remove/deal with that at the moment.


I believe I'm using direct EFI. The first SSD, where I have all my 
original data, under `fdisk -l` shows one of the devices

having the "EFI System" type.

My old drive has name nvme1n1, and it has a UUID with "c04b", which 
matches what is under "rd.luks.uuid" in xen.cfg under EFI/qubes when I 
mount the "EFI System" device.


The newer drive has name nvme0n1, and it has UUID with "fe3d". This 
newer disk shows up in the dracut shell when I do `blkid`, but the older 
one is missing

On Friday, 11 September 2020 at 01:43:02 UTC-7 donoban wrote:

On 2020-09-11 07:26, ktono via qubes-users wrote:
 > I have a Qubes 4.0.3 setup that uses an NVMe SSD for storage and
boots using UEFI. My motherboard has 2 NVMe slots, so I still had
one free slot. Everything worked fine on Qubes.
 >
 > Then, I decided to install a second NVMe SSD (the same model).
After doing that, booting Qubes only puts me into Dracut Emergency
Shell.
 >
 > The error messages I get:
 >
 > ```
 > So I think Qubes is trying to boot with the new, empty SSD or
something like that.
 >
Hi,

Have you tried switching the hard disks slots? Are you using direct EFI
or GRUB?


 > When I use a Qubes USB installer to get a shell, I can still find my
old SSD. When I do `cryptsetup open /dev/nvme<...>` on my old SSD, I
can
then `fdisk -l` to find the names of all my AppVMs, etc., so it's not
like the space was wiped.


What numbers has your old disk assigned? Theorically the boot hard disk
uuid is passed as kernel argument: "rd.luks.uuid=.." So a change
with major/minor numbers should not affect.



If you are using EFI to boot the system, check in the bios which disk 
that efi is defaulting to.  It is odd that your original disk has the

"1n1" numbering and the new disk is "0n1".  That may have confused the
efi boot ordering.

Mike.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90fd36e5-21dc-b034-5405-a400ea351c0c%40keehan.net.


[qubes-users] Multi Media update fails Qubes 4

2020-09-11 Thread William Fisher
I have the Multi Media VM installed including Chrome, Spotify, Musique, VLC 
player, etc.  Qubes Updater keeps saying it needs updates but the updates 
always fail. It always comes back with 1 changed 2 failed.

Error on updating t-multimedia: Command '['sudo', 'qubesctl', 
'--skip-dom0', '--targets=t-multimedia', '-show-output', 'state.sls', 
'update.qubes-vm']' returned non-zero exit status 20

   ID: dsa-4371-update
 Function: cmd.script
Result: True
Comment: Nothing to do
  

   ID: update
 Function: pkg.uptodate
Result: False
Comment: w:target Packages (main/binary-amd64/Packages) is configured 
multiple times in /etc/apt/sources.list.d/google-chrome.list:3 
and/etc/apt/sources.list.d/google.list:1

I have numerous other packages listed multiple times but I can't figure out 
how to copy the text displayed in dom0 Updater to this VM.

Any ideas?  
Is this a common problem?
How can I get updates on multi-media, especially Chrome and VLC Media 
Player? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/80675b32-050e-465e-8b40-601662fd2246o%40googlegroups.com.


Re: [qubes-users] Has anyone had a qube compromised?

2020-09-11 Thread taran1s


unman:
> On Tue, Sep 08, 2020 at 09:13:47PM +0200, Qubes wrote:
>> On 9/7/20 2:12 AM, unman wrote:
>>> On Sun, Sep 06, 2020 at 06:55:01PM +0200, Qubes wrote:
 On 9/6/20 5:32 PM, unman wrote:
> On Sun, Sep 06, 2020 at 11:12:31AM -0400, Demi M. Obenour wrote:
>> In all of my time using QubesOS, I have never had reason to believe
>> that a qube was compromised.  Has anyone here had a qube compromised?
>>
>> Sincerely,
>>
>> Demi
>>
>
> I have had occasion to set a honeypot and use Qubes as a classic
> Internet-inna-box - ideal for such use, and very instructive. But I
> guess that wasn't what you were interested in.
> In normal use, both myself and colleagues have seen compromised qubes.
>
 Hi Unman

 How did you know you're qube was compromised, can you give some details?

>>>
>>> snort and tripwire.
>>>
>>> Other IDS are available.
>>>
>> Hi Unman
>>
>> What I mean is what made you suspicious to use a tripwire and snort?
> 
> I run them on most of my Qubes installs, almost out of habit.
> Because I salt my qubes, its relatively easy to run tripwire against
> network connected qubes
> But the way in which Qubes allows one to separate out activities really
> does minimise risk. Example: read email in mutt in offline qube with
> minimal template - any attachments are opened in offline disposableVM.
> Anything I want to keep is transferred to an offline storage qube ,
> again with no significant programs installed. In this sense, it doesn't
> matter if attachments have malware  because the infection risk is
> minimised.
> 

This is interesting. Can you be more specific in regards of settings you
use? How do you set the tripwire for to run against network connected
qubes? You also mentioned using mutt in an offline qube. Can you
elaborate more on this too please? Is the mutt PGP friendly and more
safer option than Thunderbird?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ba27d2bc-2660-6308-d5d6-754fca5fda6d%40mailbox.org.


0xA664B90BD3BE59B3.asc
Description: application/pgp-keys


Re: [qubes-users] Adding a new SSD causes Qubes to go into dracut emergency shell

2020-09-11 Thread 'ktono' via qubes-users

Hi,

I haven't tried switching. One of the slots is under some CPU cooler fans, 
and I don't have the stuff to remove/deal with that at the moment.

I believe I'm using direct EFI. The first SSD, where I have all my original 
data, under `fdisk -l` shows one of the devices
having the "EFI System" type.

My old drive has name nvme1n1, and it has a UUID with "c04b", which matches 
what is under "rd.luks.uuid" in xen.cfg under EFI/qubes when I mount the 
"EFI System" device.

The newer drive has name nvme0n1, and it has UUID with "fe3d". This newer 
disk shows up in the dracut shell when I do `blkid`, but the older one is 
missing
On Friday, 11 September 2020 at 01:43:02 UTC-7 donoban wrote:

> On 2020-09-11 07:26, ktono via qubes-users wrote:
> > I have a Qubes 4.0.3 setup that uses an NVMe SSD for storage and boots 
> using UEFI. My motherboard has 2 NVMe slots, so I still had one free slot. 
> Everything worked fine on Qubes.
> > 
> > Then, I decided to install a second NVMe SSD (the same model). After 
> doing that, booting Qubes only puts me into Dracut Emergency Shell.
> > 
> > The error messages I get:
> > 
> > ```
> > So I think Qubes is trying to boot with the new, empty SSD or something 
> like that.
> > 
> Hi,
>
> Have you tried switching the hard disks slots? Are you using direct EFI
> or GRUB?
>
>
> > When I use a Qubes USB installer to get a shell, I can still find my
> old SSD. When I do `cryptsetup open /dev/nvme<...>` on my old SSD, I can
> then `fdisk -l` to find the names of all my AppVMs, etc., so it's not
> like the space was wiped.
>
>
> What numbers has your old disk assigned? Theorically the boot hard disk
> uuid is passed as kernel argument: "rd.luks.uuid=.." So a change
> with major/minor numbers should not affect.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c79bb344-5967-4db5-a402-2e71744a3a1bn%40googlegroups.com.


Re: [qubes-users] Adding a new SSD causes Qubes to go into dracut emergency shell

2020-09-11 Thread donoban
On 2020-09-11 07:26, ktono via qubes-users wrote:
> I have a Qubes 4.0.3 setup that uses an NVMe SSD for storage and boots using 
> UEFI. My motherboard has 2 NVMe slots, so I still had one free slot. 
> Everything worked fine on Qubes.
> 
> Then, I decided to install a second NVMe SSD (the same model). After doing 
> that, booting Qubes only puts me into Dracut Emergency Shell.
> 
> The error messages I get:
> 
> ```
> So I think Qubes is trying to boot with the new, empty SSD or something like 
> that.
> 
Hi,

Have you tried switching the hard disks slots? Are you using direct EFI
or GRUB?


> When I use a Qubes USB installer to get a shell, I can still find my
old SSD. When I do `cryptsetup open /dev/nvme<...>` on my old SSD, I can
then `fdisk -l` to find the names of all my AppVMs, etc., so it's not
like the space was wiped.


What numbers has your old disk assigned? Theorically the boot hard disk
uuid is passed as kernel argument: "rd.luks.uuid=.." So a change
with major/minor numbers should not affect.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8610fd70-df72-a0a8-3cad-30360f08a81a%40riseup.net.