[qubes-users] HCL : NitroPC 2 - MSI Z790-P Intel i9 14900K

2024-04-16 Thread code9n
HCL report  NitroPC 2  -  MSI Z790-P  Intel i9 14900K

This is Qubes certified, of course, but here's an HCL report anyway.
---
layout:
  'hcl'
type:
  'Desktop'
hvm:
  'yes'
iommu:
  'yes'
slat:
  'yes'
tpm:
  'unknown'
remap:
  'yes'
brand: |
  Micro-Star International Co., Ltd.
model: |
  MS-7E06
bios: |
  Dasharo (coreboot+UEFI) v0.9.1
cpu: |
  Intel(R) Core(TM) i9-14900K
cpu-short: |
  FIXME
chipset: |
  Intel Corporation Device [8086:a700] (rev 01)
chipset-short: |
  FIXME
gpu: |
  Intel Corporation Raptor Lake-S GT1 [UHD Graphics 770] [8086:a780] (rev 
04) (prog-if 00 [VGA controller])
 
gpu-short: |
  FIXME
network: |
  Intel Corporation Ethernet Controller I225-V [8086:15f3] (rev 03)
memory: |
  65376
scsi: |

usb: |
  1
certified:
  'no'
versions:
  - works:
  'yes'
qubes: |
  R4.2.1
xen: |
  4.17.3
kernel: |
  6.6.21-1
remark: |
  No problems noticed.  Qubes certified.  Very Fast.
credit: |
  code9n
link: |
  FIXLINK

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/54d6b847-4390-45c1-ac7a-b35347d76713n%40googlegroups.com.


[qubes-users] HCL Purism Librem mini V2 with Qubes 4.2

2024-01-21 Thread code9n via qubes-users
Hi,

HCL:

---
layout:
'hcl'
type:
'Desktop'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'no'
remap:
'yes'
brand: |
Purism
model: |
librem_mini_v2
bios: |
PureBoot-Release-20
cpu: |
Intel(R) Core(TM) i7-10510U CPU @ 1.80GHz
cpu-short: |
FIXME
chipset: |
Intel Corporation Comet Lake-U v1 4c Host Bridge/DRAM Controller [8086:9b61] 
(rev 0c)
chipset-short: |
FIXME
gpu: |
Intel Corporation CometLake-U GT2 [UHD Graphics] [8086:9b41] (rev 02) (prog-if 
00 [VGA controller])

gpu-short: |
FIXME
network: |
Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet 
Controller [10ec:8168] (rev 07)

memory: |
65410
scsi: |
Samsung SSD 870 Rev: 1B6Q
usb: |
1
certified:
'no'
versions:
- works:
'yes'
qubes: |
R4.2.0
xen: |
4.17.2
kernel: |
6.1.62-1
remark: |
Everything seems fine
credit: |
code9n
link: | FIXLINK

.cpio attached.

Thanks for 4.2
On Sunday, January 21st, 2024 at 09:45, qubes-users@googlegroups.com 
 wrote:

> [qubes-users@googlegroups.com](https://groups.google.com/forum/#!forum/qubes-users/topics)
> [Google Groups](https://groups.google.com/forum/#!overview) 
> https://groups.google.com/forum/#!overview
> [Today's topic summary]
> [View all topics](https://groups.google.com/forum/#!forum/qubes-users/topics)
>
> -  [problem with 4.2 rc5 installation source](#group_thread_0) - 1 Update
> []
> [problem with 4.2 rc5 installation 
> source](http://groups.google.com/group/qubes-users/t/2d918d15d2aebc4e)
> Kai : Jan 20 02:26PM -0800
>
> Thank you to everyone who has helped me in the last mails.
>
> I have finally decided to buy a NovaCustomes Laptop that is Qubes certified
> and as expected, that works very well with Qubes 4.2.
> [...more](http://groups.google.com/group/qubes-users/msg/1949463a81fdf)
>
> [Back to top](#digest_top)
>
> You received this digest because you're subscribed to updates for this group. 
> You can change your settings on the [group membership 
> page](https://groups.google.com/forum/#!forum/qubes-users/join).
> To unsubscribe from this group and stop receiving emails from it send an 
> email to qubes-users+unsubscr...@googlegroups.com.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fD3uWIfDS2n70LKl7Fs9ECBCdjM1bf2gFtuqgn6TjFXN9jCajii2IL0iL4Qiw0qU9DYlHJoxp1j1wG2REIGn4PCumbrxgDriDBnjm8vHJHQ%3D%40protonmail.com.


Qubes-HCL-Purism-librem_mini_v2-20240121-180500.cpio.gz
Description: application/gzip


[qubes-users] Re: Qubes 4.2: qubes-tunnel not working after upgrade (cannot resolve hostname)

2024-01-06 Thread code9n
Hi,
  This is on the Forum:

https://forum.qubes-os.org/t/wireguard-vpn-setup/19141

cheers,

On Saturday 6 January 2024 at 00:16:40 UTC r.wie...@web.de wrote:

> Hi there,
>
> vpnVM and netVM both in-place upgrades from Q4.1 (and worked fine
> there). Template is fedora 38.
> NetVM is online, ping of vpn server hostname is fine within netVM.
> Ping and dig do not work within vpnVM, but afair that is intended (leak
> prevention of qubes-tunnel)
>
> I tried to restart qubes-tunnel servcie, tried to restart vpnVM. tried
> to disconnect and reconnect. I tried to reboot QubesOS.
>
> Did something change between 4.1 and 4.2 regarding DNS handling? Do I
> need to configure a policy file or something?
>
> Thanks
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d4f11ed1-dcfe-45ef-b318-49b7416a6801n%40googlegroups.com.


Re: [qubes-users] 4.1 rc1 'start automatically on boot' saving abnormality

2021-11-05 Thread code9n
Hi,

  Qubes manager version:  qubes-manager-4.1.19-1.fc32.noarch  .

Start qube automatically on boot:
On a normal default app qube based on a template, either fedora or debian, 
either running or not running.
Steps:
  1)  Highlight the qube I want to get to open automatically on boot in the 
Qubes manager.
  2)  Click on the 'Qube Settings' cog button and the manager opens to the 
'Basic' page.
  3)  Click to check the 'start qube automatically on boot' box, the check 
mark appears.
  4)  Click on 'Apply'.  The system working icon appears, the change looks 
to be working but then the check mark disappears.
  5)  Click on 'OK' and the manager window closes,  the desired change has 
not happened.

  However if I click on just the 'OK' button the change is saved correctly.

  Or, if I don't give up so easily and try checking the 'start qube 
automatically on boot' again, then clicking 'Apply' again, then 'OK', the 
change is saved.

  I have done this many times in writing this and the behaviour seems to 
continue with the 'start qube automatically on boot', action.  However the 
same thing was happening with saving a networking selection but that has 
mostly corrected itself:

Networking:
  The networking selection - as above but changing a qube's networking 
choice, from, eg.  'sys-vpn' to 'firewall' - was doing the same behaviour 
as above.
  But now it looks like the action will not be saved - I make a selection,  
the 'networking' menu shows the 'sys-vpn (current)', option.
  I choose 'firewall', and click 'Apply'.
  The 'system-working' icon appears.
  The 'system-working' icon disappears and the selection I made - 
'firewall', reverts to 'sys-vpn'.  So it appears my action failed.
  But when I click, 'OK', the change has successfully happened.

  Thank you, and I'm loving 4.1.


On Friday, 5 November 2021 at 00:46:42 UTC marm...@invisiblethingslab.com 
wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Thu, Nov 04, 2021 at 03:16:22PM -0700, code9n wrote:
> > Note: Made a Tasket Qubes vpn support networking qube on Qubes 4.1 rc1 
> > which works efficiently as always but when I check the 'start qube 
> > automatically on boot' box in Qube Settings / manager gui it won't save 
> if 
> > I click on 'apply' first.
> > But it will save if I just check the box then click directly on 'OK'.
>
> Can you provide exact steps you've done? Which buttons and in which
> order you clicked? I just tried and clicking 'apply' just after
> selecting 'start qube automatically on boot' does save the setting for
> me.
>
> What qubes-manager package version you have, you can check it with 
> `rpm -q qubes-manager` command.
>
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> -BEGIN PGP SIGNATURE-
>
> iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmGEfuoACgkQ24/THMrX
> 1yxljQf9EVaX9aJGRaY7KPp8Zl+d4V01MSdoKLM0BsG0I1jiY++yLdBn+SlGCI6p
> OjklXd0RmhRfTF+wQ/PZ0UTF3UkccClgd8DQ4pIncQYQIfH190ZhRbsp2Fl5qGnZ
> O7NUZXJk/iH6/MZYu+rV9ydtaQd1yhhDgCI78p5HdrQkAjoOPy0xemEoQks1jHTY
> 3+UrKuC3qdWiNBNmfxNd88wvppbki9uDW8HRnCHcgYFdaYhYmHhnVpzY5IMTjVqs
> p+k+uiBnJ22KG2PqI7hgYJQdEThyLJdX3iNJbwscRGFNoxPlIY8qQSOCrnC1GARB
> M7535Ox00MkLtbTMjuncw9H76hSD8w==
> =YTsL
> -END PGP SIGNATURE-
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/93ac8e99-6591-4682-a4aa-651d2cabdb53n%40googlegroups.com.


Re: [qubes-users] 4.1 rc1 UK keyboard reverted to US layout

2021-11-05 Thread code9n
Thanks,
  For what it's worth this can be solved by going into the System tools - 
Settings manager - Keyboard - Layout  where it is set to 'English UK' 
already.  Click on edit, the existing 'English UK' option comes up on the 
pop up menu, then just leave it on that and click on 'OK'.  Now it actually 
does use the English UK layout.
 Apologies if I should have answered this in a different place.

On Friday, 5 November 2021 at 00:42:54 UTC marm...@invisiblethingslab.com 
wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Thu, Nov 04, 2021 at 03:10:20PM -0700, code9n wrote:
> > 
> > Note: I carefully made sure the GB / UK keyboard option was selected 
> > during install but have the US set up on my UK keyboard Lenovo T430.
>
> Looks like this issue: https://github.com/QubesOS/qubes-issues/issues/6814
>
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> -BEGIN PGP SIGNATURE-
>
> iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmGEfgYACgkQ24/THMrX
> 1yxdAgf+LBOJK4Sp2hv5FS2zz/8XRN+QktbnvXh4MeOrJ7iGEAC+5i6+wvEjEUN7
> IFk+KNtCoknHwwtQXd/9PZwdcx3kO9KfS0BrQ8HNjSK/sh/rM+qC5vRRdU6UyxFK
> goK7r0W7R9lWJwdxfQ0gzZZa3UlidwVTuG2s9hecpsh7Fdxd1OKx2DzVZU3jPacN
> S6ea+t5I8MaLnOA6X0OaQBXMLRJNOId9glzAOrKtfsL7nQ8IZ5kzZV2ClJvbMe91
> fEaaVVnSwssrYDt95k1/Xb/flclFydRwkZuLMUd90COOAEENxt12qGNVWin9sk3Z
> RwOAc9zf0P1nGq0tN/qfkOfZZUfpew==
> =D5Xk
> -END PGP SIGNATURE-
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84b95e77-0c35-49da-a9cc-aa4a88dcdb95n%40googlegroups.com.


[qubes-users] 4.1 rc1 'start automatically on boot' saving abnormality

2021-11-04 Thread code9n
Note:  Made a Tasket Qubes vpn support networking qube on Qubes 4.1 rc1 
which works efficiently as always but when I check the 'start qube 
automatically on boot' box in Qube Settings / manager gui it won't save if 
I click on 'apply' first.
  But it will save if I just check the box then click directly on 'OK'.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0dd4fe08-91c6-4242-b5b9-e541357c6bd5n%40googlegroups.com.


[qubes-users] 4.1 rc1 UK keyboard reverted to US layout

2021-11-04 Thread code9n

Note:  I carefully made sure the GB / UK keyboard option was selected 
during install but have the US set up on my UK keyboard Lenovo T430.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/18ea5ac6-047a-46cd-94d4-2ff8e29a6188n%40googlegroups.com.


Re: [qubes-users] HCL Intel core i7-6700K in desktop machine (not laptop)

2021-08-09 Thread code9n
Amendment:  I forgot, there was one installation problem - I couldn't get 
sys-USB to work, had to do it after install.   Sorry about that.

On Sunday, 8 August 2021 at 02:21:23 UTC+1 sv...@svensemmler.org wrote:

> Thank you code9n for your HCL report, which is now part of [this pull 
> request](https://github.com/QubesOS/qubes-hcl/pull/87) and will be 
> visible on the website soon!
>
> As soon as there is a second report for this machine we can add it to 
> the "just works" list. Your having explicitly mentioned that your 
> machine fulfills the requirements makes this very easy. Thank you again!
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ab3cd061-f15e-467e-9deb-d4477719b44cn%40googlegroups.com.


[qubes-users] HCL Intel core i7-6700K in desktop machine (not laptop)

2021-08-07 Thread code9n
Machine made with Qubes 4.0 in mind by Think Penguin - around a year before 
Qubes 3.2 reached EOL.

Hope this is helpful.  Thanks to all involved in Qubes OS.

If your machine fulfills these criteria: 

* Qubes OS R4.0.4 installs without any workarounds   - YES
* Graphics, networking & audio work without troubleshooting   -  YES
* Recommended 16 GB RAM are possible  - 32 GB RAM


---
layout:
  'hcl'
type:
  'desktop'
hvm:
  'yes'
iommu:
  'yes'
slat:
  'yes'
tpm:
  'unknown'
remap:
  'yes'
brand: |
  MSI
model: |
  MS-7994
bios: |
  5.80
cpu: |
  Intel(R) Core(TM) i7-6700K CPU @ 4.00GHz
cpu-short: |
  FIXME
chipset: |
  Intel Corporation Xeon E3-1200 v5/E3-1500 v5/6th Gen Core Processor Host 
Bridge/DRAM Registers [8086:191f] (rev 07)
chipset-short: |
  FIXME
gpu: |
  Intel Corporation HD Graphics 530 [8086:1912] (rev 06) (prog-if 00 [VGA 
controller])
gpu-short: |
  FIXME
network: |
  Intel Corporation Ethernet Connection (2) I219-V (rev 31)
  Qualcomm Atheros AR928X Wireless Network Adapter (PCI-Express) (rev 01)
memory: |
  32654
scsi: |
  WDC WDS500G1B0A- Rev: 10WD
  ST2000LM015-2E81 Rev: SDM1
  iHAS124   F  Rev: CL9M
usb: |
  3
versions:

- works:
'FIXME:yes|no|partial'
  qubes: |
R4.0
  xen: |
4.8.5-34.fc25
  kernel: |
5.4.129-1
  remark: |
FIXME
  credit: |
FIXAUTHOR
  link: |
FIXLINK

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17ff41df-9bf5-4037-8d67-06a474a3e562n%40googlegroups.com.


Re: [qubes-users] Re: my dom0 is not updating since before 4.01

2019-12-08 Thread code9n
Having this same (old now) problem.  

Tried adding --releasever=4.0 to sudo qubes-dom0-update and I get most of 
the update to download but not all of it.

Unman suggested :  "you could manually 
download it, copy it to dom0, check signature in dom0 with rpm -K, and 
then install." 

Which apparently worked but how do I go about that?  What package am I 
looking for and where do I look for it?  If you could suggest commands to 
be used that'd be great?  Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ac70d5b-c29d-457f-bffe-2e3553ea0c95%40googlegroups.com.


Re: [qubes-users] Fedora 28 has no audio on Qubes!

2018-10-16 Thread code9n
  The pulseaudio issue was fixed in August?  I've been waiting for that since 
the upgrade to fedora 27.  Looked out for it in every fedora update and never 
saw it.  (Now using fedora 28 - still no sound) - All updates completed that I 
know of.

  Do you need to have the Qubes 4 developers repository enabled?  

  Or is there some way to install the fix another way?  Complete re-install of 
the fedora 28 template?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7a51e91a-730f-47f5-9431-35446b564df6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] setting up vpn issue

2018-09-04 Thread code9n
Hi Nick,

  In case it's any use to you;

  I had a couple of vpns working on Q3.2 until about a week ago (moved to 4.0) 
and one of them was Expressvpn.
 
  What I did to set it up: 

   Make a clone of my up to date fedora template ( or use Debian or whatever 
you like).

  Allow network access in that template.

  Then put firefox in the template's applications (and set up it's privacy to 
your liking) - you need only go to the Expressvpn's https site - and you're 
going to trust them anyway.  (Plus it's a clone template.) 

 Install Expressvpn following their instructions for the linux (appropriate 
Fedora package) into that template from their website.

  Then follow the easy instructions (Expressvpn site) and activate on the 
template.

 

  If you want to you can now connect to the vpn - expressvpn connect - in the 
command line of the template and go to (for example), 
https://www.dnsleaktest.com/ in your firefox to test it's working ok.

 .

  Close network access again on the template.

  Then make a proxy vm based on that new clone template as described in the 
qubes documentation:  https://www.qubes-os.org/doc/vpn/

  Set it with sys-firewall as it's netvm.

  Then connect to Expressvpn in your new proxy (I called mine sys-vpn-exp) - to 
get a list of commands - expressvpn help -   in the command line.

  Set any appvms you want to go through that new proxy vpn (sys-vpn-exp) to 
have it as their netvm.

  Then open firefox in one of the appvms that go through your new sys-vpn-exp 
proxy and to test it - personally I mostly use:   https://www.dnsleaktest.com/  
or Expressvpn have their own dns leak test facility.  Where ever.

  .

  The Expressvpn site has instructions for qubes but they want you to set up in 
the sys-net vm which means everything goes through them.  I do it the above way 
because it's easy and you can use other vpn providers as well for some of your 
other appvms if you want to.

  It works fine.

  Or you could use:  https://github.com/tasket/Qubes-vpn-support  as suggested 
above - I use that for one of my vpns in Qubes 4 and it's excellent but it's 
more involved.  Also harder to change which server / country you want to come 
out of.

  cheers,

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fbc47b88-00dd-4a74-8feb-6e6a41b07f9c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Whonix 14 - Updated, just lost Tor Browser for Whonix-dvm??

2018-08-29 Thread code9n
I gave up on trying to back date whonix - there's so much about it on Whonix / 
Whonix-Qubes website and warnings about messing with the clock in Whonix ws 
konsole I didn't want to mess about.
Tried (in Whonix ws) update-torbrowser chosing 7.5.6 but got the signature 
expired message so in the end I just went with 8.a10 which propagated fine into 
the whonix dvms.  (There was a message somewhere on torproject.org website 
saying that 7.5.6 signature was about to run out so maybe it's just over due).
TTB 8 is still in alpha theoretically but has worked fine for me and is 
apparently scheduled for release next month anyway.
Just as a side note 'cos it seems relevant; When I updated Whonix to 14 a few 
days ago I kept the anon-whonix app vm with the 7.5.6 browser in it and 
although that is now based on Whonix 14 it kept ttb 7.5.6 which also runs fine. 
 so it's not taking it's version of ttb from the Whonix 14 template but keeping 
the version of it's own.
  cheers,

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d002af71-0258-4f20-86a6-24327224ae82%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Whonix 14 - Updated, just lost Tor Browser for Whonix-dvm??

2018-08-27 Thread code9n
Same issue but when I try to update-torbrowser (or via Tor Browser Downloader) 
the install fails because ttb's signature has expired.

I have to wait for the tor project to resign ttb (7.5.6), right?  If I tried to 
get the key that comes with it from torproject.org and import it into Whonix 
it'd still be the same, expired, key anyway?


Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0f397f1-4401-47c1-a0aa-163b85593b0f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fresh r4 install qrexec daemon fails to start. Any suggestion?

2018-08-21 Thread code9n
Thanks, you're right.  I remembered I had the same problem when I installed 
3.2.  Disabled wifi adapter in sys-net and it worked.  Same this time.
Probably because I haven't got a wifi card - it's a desktop and I only use an 
ethernet cable.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e36a506a-8506-4596-ab49-128ba3111339%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fresh r4 install qrexec daemon fails to start. Any suggestion?

2018-08-21 Thread code9n
Hi,
 
  I made r4 installation USBs many times to install r4 over the last couple of 
days - first fedora media writer in Q3.2, then from Windows with rufus with 
several different USB sticks and several different downloads.  The downloads 
always completed properly, like wise writing onto the USBs.

  But every time I install r4 all goes well until after the reboot part of the 
install when the 'Qubes Install' window comes up.  After this runs ok for a 
while, dealing with fedora 26, debian 9 and whonix templates - it gets as far 
as (something like) 'setting up network' when I get an error box with, 

[/usr/bin/qvm-start', 'sys-firewall'] failed: stdout:""
stderr: "Cannot connect to qrexec agent for 60 seconds, see 
/varlog/xen/console/guest-sys-net.log for details

  Then when I move on and Qubes opens the qrexec daemon won't run when called.  
eg.  Following installation guide, when I get to:

  sudo qubes-dom0-update

  It tries to open sys-firewall and I get pretty much the same error message:

  ERROR: Cannot connect to qrexec agent for 60 seconds, see
  /var/log/xen/console/guest-sys-net.log for details

  (Waiting 60 seconds does nothing more.)

  Has anyone dealt with this or have any suggestions?  Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bf3fdbc8-0335-47e7-b688-9dc7af1f0405%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes canary over due...

2018-03-15 Thread code9n
...but only by a day  (see Qubes canary #14 - 
https://github.com/QubesOS/qubes-secpack/blob/master/canaries/canary-014-2017.txt)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e3fcb65-8058-4d5f-96d0-b852ddff5f40%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Anon-whonix browser fails to connect to tor in Qubes 3.2, any ideas?

2018-01-27 Thread code9n
Solved.
Not sure if it was relevant but since the most recent Whonix updates this has 
gone back to normal.

Thanks to all.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9dd5a721-bb5d-4e88-9b66-c4b567c9621b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Anon-whonix browser fails to connect to tor in Qubes 3.2, any ideas?

2018-01-27 Thread code9n
Yeh, the anon-whonix app vm is routed through sys-whonix properly.  I haven't 
changed that from default.
I do route most non-whonix app vms through a vpn in a proxy vm but that all 
works as it should.
Both systems have worked independently and as expected for months.

Checking today some IP address checks in the anon-whonix app vm do come out in 
places other than Germany but they're not my vpn's servers, or my ISP's.
It's like tor is mostly working but not fully.

I'll leave this help request here and see if there are any more suggestions but 
if I have to I'll try deleting the var/lib/tor file contents  - the tor data 
file mentioned above - and if it doesn't work try re-installing all the whonix 
stuff.

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5a5d2c4f-a3db-4579-8ed0-74e573c8e574%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Anon-whonix browser fails to connect to tor in Qubes 3.2, any ideas?

2018-01-27 Thread code9n
Running the WhonixCheck from the default anon-whonix app vm in the Qubes 
manager list; the fail warning basically says:

SocksPort test [fails]. ... (curl exit code: [7] - [failed to connect to host])

The browser - anon-whonix app vm (default)/Tor browser - opens like normal to 
the Whonix page but checking the 'check IP' link from there won't connect and 
if I search for https://check.torproject.org the top result says I'm not using 
tor.  I can't connect to .onion sites but surface browsing's fine.

 Checking the IP address keeps coming back to the same one in Germany even if I 
reload / change Identity / reboot. (I'm not in Germany).

It persists over cold re-boots. 
I've tried making a new anon-whonix app vm with the same results.
 Everything has been fine since install - maybe 6 months ago.
All updates are up to date including the recent tor browser update to 7.5 (64 
bit).

 yzxd on the sub reddit (Thanks, yzxd) had a similar problem on non-Qubes 
Whonix and solved it by "going into the Gateway VM, stopping Tor, opening the 
folder named "Tor Data" and deleting all the files inside, and finally 
restarting Tor".

But I see from issue #1137 the Qubes team deliberately made that persistent:

https://github.com/Whonix/qubes-whonix/commit/a9f24f5d0b700a0cd710e52eb170875d635c22a9

  so I'm wary to mess with that.

 Would that be likely to work in this instance?  Or Does anyone have any ideas 
for a fix or would just re-installing the entire Whonix 
system following:

https://www.qubes-os.org/doc/whonix/install/  

  be better...?  

  Thanks,

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6978414b-9934-40e3-96c9-403488a2e332%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.