[qubes-users] HCL - Dell Latitude 3330
Hey I did a fresh install and updated everything what was possible over the ''Qubes Update Widget''. After that i generated the HCL report over the terminal like it says on your website. I'm a complete newbie to qubes but all i saw and heard from it was awesome! You are really doing important work here! Thanks to all of you :) Best Phil -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/hQzzLcd0YNlcBbrNtHpyROxJz8AHA_3AXZmEFsdhWajG5f3kGBzy4xb35DYCdXyop6OERhoiH55zZLS8-d2Q5yv-2x7vhnMB0gpB-jusLzQ%3D%40protonmail.ch. Qubes-HCL-Dell_Inc_-Latitude_3330-20210219-205102.yml Description: application/yaml
[qubes-users] XSAs released on 2021-02-18
Dear Qubes Community, The Xen Project released one or more new Xen Security Advisories (XSAs) on 2021-02-18. The security of Qubes OS *is affected* by one or more of these XSAs. Therefore, *user action is required*. XSAs that affect the security of Qubes OS (user action required) The following XSAs *do affect* the security of Qubes OS: - XSA-366 Please see QSB-065 for the actions users must take in order to protect themselves, as well as further details about these XSAs: https://www.qubes-os.org/news/2021/02/19/qsb-065/ XSAs that do not affect the security of Qubes OS (no user action required) -- The following XSAs *do not affect* the security of Qubes OS, and no user action is necessary: - (None) Related links - - Qubes Security Pack (qubes-secpack): https://www.qubes-os.org/security/pack/ - Qubes Security Bulletins (QSBs): https://www.qubes-os.org/security/bulletins/ - XSA Tracker: https://www.qubes-os.org/security/xsa/ This announcement is also available on the Qubes website: https://www.qubes-os.org/news/2021/02/19/xsas-released-on-2021-02-18/ -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/15a1661a-aab6-693f-42c2-24dbd686e043%40qubes-os.org. OpenPGP_signature Description: OpenPGP digital signature
[qubes-users] QSB-065: Missed flush in XSA-321 backport (XSA-366)
Dear Qubes Community, We have just published Qubes Security Bulletin (QSB) 065: Missed flush in XSA-321 backport (XSA-366). The text of this QSB is reproduced below. This QSB and its accompanying signatures will always be available in the Qubes Security Pack (qubes-secpack). View QSB-065 in the qubes-secpack: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-065-2021.txt Learn about the qubes-secpack, including how to obtain, verify, and read it: https://www.qubes-os.org/security/pack/ View all past QSBs: https://www.qubes-os.org/security/bulletins/ View XSA-366 in the XSA Tracker: https://www.qubes-os.org/security/xsa/#366 ``` ---===[ Qubes Security Bulletin 065 ]===--- 2021-02-18 Missed flush in XSA-321 backport (XSA-366) User action required = Users must install the following specific packages in order to address the issues discussed in this bulletin: For Qubes 4.0: - Xen packages, versions 4.8.5-30 For Qubes 4.1: not affected The packages are to be installed in dom0 via the Qube Manager or via the qubes-dom0-update command as follows: For updates from the stable repository (not immediately available): $ sudo qubes-dom0-update For updates from the security-testing repository: $ sudo qubes-dom0-update --enablerepo=qubes-dom0-security-testing A system restart will be required afterwards. These packages will migrate from the security-testing repository to the current (stable) repository over the next two weeks after being tested by the community. If you use Anti Evil Maid, you will need to reseal your secret passphrase to new PCR values, as PCR18+19 will change due to the new Xen binaries. Summary On 2021-02-18, the Xen Security Team published the following Xen Security Advisory (XSA): XSA-366 [1] "missed flush in XSA-321 backport" | An oversight was made when backporting XSA-320, leading entries in the | IOMMU not being properly updated under certain circumstances. Impact === XSA-366, as described by the Xen Security Team: | A malicious guest may be able to retain read/write DMA access to | frames returned to Xen's free pool, and later reused for another | purpose. Host crashes (leading to a Denial of Service) and privilege | escalation cannot be ruled out. Credits See the original Xen Security Advisory. References === [1] https://xenbits.xen.org/xsa/advisory-366.html -- The Qubes Security Team https://www.qubes-os.org/security/ ``` This announcement is also available on the Qubes website: https://www.qubes-os.org/news/2021/02/19/qsb-065/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a4e5809c-8acd-77a7-54b7-060172ab3a04%40qubes-os.org. OpenPGP_signature Description: OpenPGP digital signature
[qubes-users] Re: I'm looking for a laptop with these requirements
100% free laptop? That would be hard to find. :D But with hardware switches, here it is: https://puri.sm/products/librem-14/ And it works with Qubes according to HCL. On Tuesday, February 9, 2021 at 11:22:37 AM UTC+3 qubes...@danwin1210.me wrote: > I'm looking for a laptop like this > > hardware kill switches > 100% free > Qubes works > > Do you know of any laptops like this one? > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/68701626-8dc6-4b81-ba15-bc46732e2816n%40googlegroups.com.
Re: [qubes-users] How to use USB Devices in Qubes?
Data Eight: *The usb mouse is working well after fresh install only. Afterwards, that is second time when the system is powered on, the usb mouse is not functioning. Only touchpad is working. *I have four usb port & all are getting power. *But when I connect any usb devices (both use mouse and usb blocked devices-external hard disks, they are not listed or prompted with their corresponding names under the connected-devices-widget.* I have tried installing OS with and without selecting sys-usb qube check box. That is separate qube for USB devices (sys-usb) and same qube for both net and usb devices (sys-net). The same problem exists in both of these ways . Check the file and settings mentioned in https://www.qubes-os.org/doc/usb-qubes/#auto-enabling-a-usb-mouse. -- - don't top post Mailing list etiquette: - trim quoted reply to only relevant portions - when possible, copy and paste text instead of screenshots -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/90d54f4a-18ba-d1b9-e8a0-5e10c39bd393%40danwin1210.me.
Re: [qubes-users] Re: dom0: no space left on device / Qubes partition size?
Tray G: hey , i need your help with qubes and installing partition on the usb to save files.. do you do it on the windows while you download Qubes in the terminal or once your first running qubes ? If you're talking about creating a USB drive to install Qubes, see https://www.qubes-os.org/doc/installation-guide/#copying-the-iso-onto-the-installation-medium. If you want to format a USB drive for use with Qubes once you have it installed, it will be most straightforward to format it from Qubes. There are some Microsoft FAT/NTFS formats Linux can work with out of the box, but you have to add support for others it does not, which you can avoid by formatting under Qubes/Linux in the first place. -- - don't top post Mailing list etiquette: - trim quoted reply to only relevant portions - when possible, copy and paste text instead of screenshots -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7ea700b6-9e0e-8020-ecaf-063e66b9121b%40danwin1210.me.
Re: [qubes-users] I'm looking for a laptop with these requirements
qubeslaptop via qubes-users: I'm looking for a laptop like this hardware kill switches 100% free Qubes works Do you know of any laptops like this one? I'm not aware of any laptops that meet all the criteria, and have looked as well. Closest I could get was flashing Coreboot to a Lenovo G505s, but you would have to hack in your own kill switches and the controller chip isn't 100% free. -- - don't top post Mailing list etiquette: - trim quoted reply to only relevant portions - when possible, copy and paste text instead of screenshots -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d1efcce3-cf12-fec6-6d2b-8b72e0e27512%40danwin1210.me.