[qubes-users] Re: How to install XFCE in dom0?
Andrew David Wong: > I noticed you started a thread on this last month, too: > > https://groups.google.com/d/topic/qubes-users/rgjQoi40XKY/discussion My question was regarding the eventual requirement for customization that is documented on that page. I didn't think that the installation instructions where outdated. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nkt89u%24vij%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to install XFCE in dom0?
How do I install XFCE in dom0? The instructions provided in the documentation[1] doesn't work. [1] https://www.qubes-os.org/doc/xfce/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nkrmst%246nq%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] [R3.2] Audio disappears
I've come across a possible bug there the audio disappears at random, and the only way to get back the sound is to reboot the system. I checked the system's and application's (VLC) volume control, and both showed about 100 percent volume. I only opened a new video file between the sound working and disappearing. The new file worked flawlessly after rebooting the computer. I don't know enough for making a issue on Github, so I'm wondering if you people have any suggestions on logs to check when I come across this problem again? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nkhmqc%243lm%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: debian firefox and whonix torbrowser can no longer play videos in fullscreen and freeze
Marek Marczykowski-Górecki: > I think it's unrelated to video at all. The same happens when you switch > to fullscreen firefox itself (by pressing F11). Chromium in Debian works flawless. It's something with Firefox. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nkemur%24f2d%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] [R3.2] Settings for displays missing
I've just installed R3.2-RC1 and I can't find the settings for displays in Plasma (KDE). *System Settings --> Display and Monitor* doesn't contain any settings for monitors, just the compositor. I'm using a Thinkpad T430 (laptop) and trying to connect my external monitors. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJ2gCdCbyjvujNW8%2BsTnfBKcvse1K4NzpOUi2FRX%2BCDwjShXNQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Why is qubes larger than windows?
boromirsbe...@sigaint.org: > I remember reading windows 7 had some 50 million lines of code, which is > understandable given windows one size fits all format and the sheer size > of the company. I looked up the debian 7 lines of code on wikipedia which > qubes includes (or is based on?) and it says it has 419 million source > line of code. > > I guess what im wondering is why is a platform like qubes which is > supposed to have as small an attack surface as possible have close to 10x > the size of windows which is known for being buggy most likely do to its > massive size? And how can the devs or anyone for that matter audit > something so gargantuan? Where is all this clutter coming from, tails runs > a full OS in just 2gb and yet qubes clocks in at over 17gb. > > https://en.wikipedia.org/wiki/Source_lines_of_code > You have to first understand that Qubes OS is and what it isn't. Qubes OS isn't a operative system (even if the name suggests that); it's more of a Xen distribution. I.e. it's the tool that runs operative systems. Normally you install a OS directly on the hardware, but with Qubes you have an extra layer between the hardware and the operative systems you have on your computer. This extra layer enables separate operative system installations ("qubes" or "appVM") to work together more seamlessly, but still be isolated from each other. Operative systems -- like Microsoft Windows 7 and Debian -- is installed and run _ON_ Qubes OS. The system is constructed under the assumption that you are, or will be, "hacked" and only try to minimize the costs of intrusion. To minimize the costs when one of the "qubes" (or "appvms") is compromised is to have it isolated, so that one infected system doesn't give the hackers access to other qubes. This is why you should compartmentalize you work between work domains (e.g. personal, work, random stuff, etc.). When we talk about "minimize the attack surface" we're talking about the surface between the systems that runs on qubes. That's Qubes only mission (or at least that we are focusing on). I've simplified this explanation for you to understand, because I assume that you don't know what virtualization is, etc. You'll find more (and the correct) info in the documentation.[1] Regarding the "Windows v.s. Debian security based on LOC" question I pass that to one that can explain that better than me. I don't know which Wikipedia article you got the number 419 million LOC from, I assume that includes all software in the repositories. Which make it a comparison between apples and elephants. Citing the English Wikipedia article you can read that "[a]s of 2016, Black Duck Open Hub estimates that the current codebase (74 million lines of code) [---]". I will point out that lines of code in an operative system doesn't correspond to the amount of exploitable vulnerabilities. Feel free to ask for more detailed explanations! [1] https://www.qubes-os.org/doc/architecture/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nk1sb2%24h0h%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to properly administer several templates?
J. Eppler: > if some of the templates have the same functionality with a subset/superset > of applications > you could combine them in a new template and reassign the VM's which are > based on the other templates. The problem is that some software I have installed on one template shouldn't be installed in the other. E.g. I've a template dedicated to development with Docker's own repo added. This adds to the attack surface (not much, but still) and I don't want to risk my general Debian template. > You could use the salt management stack or bash to update/upgrade > vm's. I guessed that. I haven't yet read up on SaltStack, but should the salt "scrips" be in dom0, or another secure appvm? Maintaining the salt recipes in a git repo would make it easier when reinstalling Qubes (e.g. when upgrading). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/njq2g8%2461a%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes on a Shoestring in a Hurry
Drew White: > Min 256 for a ProxyVM (depending on how many firewall rules it will have to > handle.) I haven't done it myself, but wouldn't MirageOS for the firewall be a good option here?[1] It's experimental, but Uncubed seems to be in a desperate situation where this is could be considered a good option. Leonard has got it running, and the Firewall only needs 20MB compared to the minimum 256MB that the Fedora based firewall need. This would give Uncubed around thirty percent more memory that can be used by qubes. You can find the ongoing discussion about implementing MirageOS in Qubes on this mailing list.[2] [1] http://roscidus.com/blog/blog/2016/01/01/a-unikernel-firewall-for-qubesos/ [2] https://groups.google.com/forum/#!topic/qubes-devel/ZnGQkOU-Odc -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/njbjds%24oki%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to install clean template?
Andrew David Wong: > You can simply clone one of the default templates. If you've already > modified the default template you want to use, you can clone it, then > reinstall it from the repo. So it isn't possible to install and name the template in the same command? Little easier and simpler to just do that instead of renaming templates before and after downloading a new template. Is it considered god practice to only use copies of the default templates? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/njb4nq%24ck5%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to install clean template?
How should I go about to install a clean template? When setting up a template for a specific domain, e.g. software development, it could be useful to have a clean slate. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nj9lmj%24lag%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to add GPG key in template?
donoban: > On 07/06/16 20:19, Albin Otterhäll wrote: >> I'm currently setting up a development template, and need docker. >> Because the version in Debian's repositories (even in backports) >> is horrible outdated I need to add and fetch Docker from the >> official repository. > >> But I've problems with adding the GPG key. The template VM doesn't >> want to connect and download the keyfile. According to Marek the >> Fedora template is only allowed to connect to DNF repositories. I >> assume it's the same for Debian, but APT instead? How do I download >> and add the keyfile to my (copy-of) Debian template? > > > Download it on some AppVM, check it (sha256, pgp, etc...) and them > move it to the TemplateVM... > > Seems to be the easiest solution to the problem. For future readers: DON'T FORGET TO DOWNLOAD THE GPG KEY IN AN DISPOSABLE VM! You don't want you template infected. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nj74mh%24bq%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to add GPG key in template?
I'm currently setting up a development template, and need docker. Because the version in Debian's repositories (even in backports) is horrible outdated I need to add and fetch Docker from the official repository. But I've problems with adding the GPG key. The template VM doesn't want to connect and download the keyfile. According to Marek the Fedora template is only allowed to connect to DNF repositories. I assume it's the same for Debian, but APT instead? How do I download and add the keyfile to my (copy-of) Debian template? [1] https://groups.google.com/forum/#!searchin/qubes-users/gpg$20key/qubes-users/EyVIQMOnqWE/pN4Is3mSW70J -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nj7387%24ak3%241%40ger.gmane.org. For more options, visit https://groups.google.com/d/optout.