Re: [qubes-users] Re: Qubes OS 4.1.1 has been released!

2022-07-19 Thread Howard Chen
It might be the release notes has turned into patch 2 for the qubes and 
correcting them in the process.

On Monday, July 18, 2022 at 8:27:25 PM UTC-7 a...@qubes-os.org wrote:

> On 7/18/22 7:59 PM, Howard Chen wrote:
> > Danm! That's a long a** message to read, and most importantly, the qubes
> > release note was written with 4.1.2 instead of 4.1.1.
>
> Hi Howard,
>
> I'm not sure what you mean. 4.1.2 doesn't exist yet, and it isn't 
> mentioned anywhere in this announcement. Where are you seeing 4.1.2?
>
> Also, this announcement isn't actually that long, but it's divided up 
> into small sections anyway, so feel free to skim and skip the ones that 
> aren't relevant to you.
>
> Best,
> Andrew
>
> P.S. -- Please avoid top-posting.
>
> > On Monday, July 18, 2022 at 6:59:52 PM UTC-7 a...@qubes-os.org wrote:
> > 
> >> Dear Qubes Community,
> >>
> >> We're pleased to announce the stable release of Qubes 4.1.1! This
> >> release aims to consolidate all the security patches, bug fixes, and
> >> upstream template OS upgrades that have occurred since the initial Qubes
> >> 4.1.0 release in February. Our goal is to provide a secure and
> >> convenient way for users to install (or reinstall) the latest stable
> >> Qubes release with an up-to-date ISO.
> >>
> >> Qubes 4.1.1 is available on the
> >> [downloads](https://www.qubes-os.org/downloads/) page.
> >>
> >>
> >> ## Reminder: Qubes 4.0 approaching end-of-life
> >>
> >> As we recently
> >> [announced](
> >> 
> https://www.qubes-os.org/news/2022/07/04/qubes-os-4-0-eol-on-2022-08-04/),
> >>
> >> Qubes 4.0 reaches EOL (end-of-life) on 2022-08-04. If you're using Qubes
> >> 4.0 and have been waiting for an opportunity to upgrade to Qubes 4.1 via
> >> the [clean
> >> reinstallation](
> >> https://www.qubes-os.org/doc/upgrade/4.1/#clean-installation)
> >> method, we strongly recommend using this Qubes 4.1.1 release to do so,
> >> as this is the last Qubes 4.1 patch release before Qubes 4.0 reaches 
> EOL.
> >>
> >>
> >> ## Existing Qubes 4.1.0 and release candidate users
> >>
> >> If you are already using Qubes 4.1.0 or [Qubes
> >> 4.1.1-rc1](https://www.qubes-os.org/news/2022/06/27/qubes-4-1-1-rc1/),
> >> then you should simply [update
> >> normally](https://www.qubes-os.org/doc/how-to-update/) (which includes
> >> [upgrading any EOL
> >> templates](
> >> https://www.qubes-os.org/doc/how-to-update/#upgrading-to-avoid-eol)
> >> you might have) in order to make your system essentially equivalent to
> >> this stable Qubes 4.1.1 release. No special action is required on your
> >> part.
> >>
> >>
> >> ## What's new in Qubes 4.1.1?
> >>
> >> Qubes 4.1.1 includes numerous updates over the initial 4.1.0 release, in
> >> particular:
> >>
> >> - All 4.1.0 dom0 updates to date
> >> - Fedora 36 template (upgraded from Fedora 34)
> >> - Linux kernel 5.15 (upgraded from 5.10)
> >>
> >>
> >> ## What is a patch release?
> >>
> >> The Qubes OS Project uses the [semantic versioning](https://semver.org/
> )
> >> standard. Version numbers are written as `..`.
> >> Hence, we refer to releases that increment the third number as "patch
> >> releases." A patch release does not designate a separate, new major or
> >> minor release of Qubes OS. Rather, it designates its respective major or
> >> minor release (in this case, 4.1.0) inclusive of all updates up to a
> >> certain point. Installing Qubes 4.1.0 and fully updating it results in
> >> essentially the same system as installing Qubes 4.1.1. You can learn
> >> more about how Qubes release versioning works in the [version
> >> scheme](https://www.qubes-os.org/doc/version-scheme/) documentation.
> >>
> >>
> >> This announcement is also available on the Qubes website:
> >> https://www.qubes-os.org/news/2022/07/18/qubes-4-1-1.md
> >>
> > 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9776ed1b-1cab-4312-8c88-a86c9c86cccen%40googlegroups.com.


Re: [qubes-users] Re: Qubes OS 4.1.1 has been released!

2022-07-18 Thread Andrew David Wong

On 7/18/22 7:59 PM, Howard Chen wrote:

Danm! That's a long a** message to read, and most importantly, the qubes
release note was written with 4.1.2 instead of 4.1.1.


Hi Howard,

I'm not sure what you mean. 4.1.2 doesn't exist yet, and it isn't 
mentioned anywhere in this announcement. Where are you seeing 4.1.2?


Also, this announcement isn't actually that long, but it's divided up 
into small sections anyway, so feel free to skim and skip the ones that 
aren't relevant to you.


Best,
Andrew

P.S. -- Please avoid top-posting.


On Monday, July 18, 2022 at 6:59:52 PM UTC-7 a...@qubes-os.org wrote:


Dear Qubes Community,

We're pleased to announce the stable release of Qubes 4.1.1! This
release aims to consolidate all the security patches, bug fixes, and
upstream template OS upgrades that have occurred since the initial Qubes
4.1.0 release in February. Our goal is to provide a secure and
convenient way for users to install (or reinstall) the latest stable
Qubes release with an up-to-date ISO.

Qubes 4.1.1 is available on the
[downloads](https://www.qubes-os.org/downloads/) page.


## Reminder: Qubes 4.0 approaching end-of-life

As we recently
[announced](
https://www.qubes-os.org/news/2022/07/04/qubes-os-4-0-eol-on-2022-08-04/),

Qubes 4.0 reaches EOL (end-of-life) on 2022-08-04. If you're using Qubes
4.0 and have been waiting for an opportunity to upgrade to Qubes 4.1 via
the [clean
reinstallation](
https://www.qubes-os.org/doc/upgrade/4.1/#clean-installation)
method, we strongly recommend using this Qubes 4.1.1 release to do so,
as this is the last Qubes 4.1 patch release before Qubes 4.0 reaches EOL.


## Existing Qubes 4.1.0 and release candidate users

If you are already using Qubes 4.1.0 or [Qubes
4.1.1-rc1](https://www.qubes-os.org/news/2022/06/27/qubes-4-1-1-rc1/),
then you should simply [update
normally](https://www.qubes-os.org/doc/how-to-update/) (which includes
[upgrading any EOL
templates](
https://www.qubes-os.org/doc/how-to-update/#upgrading-to-avoid-eol)
you might have) in order to make your system essentially equivalent to
this stable Qubes 4.1.1 release. No special action is required on your
part.


## What's new in Qubes 4.1.1?

Qubes 4.1.1 includes numerous updates over the initial 4.1.0 release, in
particular:

- All 4.1.0 dom0 updates to date
- Fedora 36 template (upgraded from Fedora 34)
- Linux kernel 5.15 (upgraded from 5.10)


## What is a patch release?

The Qubes OS Project uses the [semantic versioning](https://semver.org/)
standard. Version numbers are written as `..`.
Hence, we refer to releases that increment the third number as "patch
releases." A patch release does not designate a separate, new major or
minor release of Qubes OS. Rather, it designates its respective major or
minor release (in this case, 4.1.0) inclusive of all updates up to a
certain point. Installing Qubes 4.1.0 and fully updating it results in
essentially the same system as installing Qubes 4.1.1. You can learn
more about how Qubes release versioning works in the [version
scheme](https://www.qubes-os.org/doc/version-scheme/) documentation.


This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/07/18/qubes-4-1-1.md





--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d7d5f103-038e-0034-2b20-4f9e5715f388%40qubes-os.org.


[qubes-users] Re: Qubes OS 4.1.1 has been released!

2022-07-18 Thread Howard Chen
Danm! That's a long a** message to read, and most importantly, the qubes 
release note was written with 4.1.2 instead of 4.1.1.
On Monday, July 18, 2022 at 6:59:52 PM UTC-7 a...@qubes-os.org wrote:

> Dear Qubes Community,
>
> We're pleased to announce the stable release of Qubes 4.1.1! This 
> release aims to consolidate all the security patches, bug fixes, and 
> upstream template OS upgrades that have occurred since the initial Qubes 
> 4.1.0 release in February. Our goal is to provide a secure and 
> convenient way for users to install (or reinstall) the latest stable 
> Qubes release with an up-to-date ISO.
>
> Qubes 4.1.1 is available on the 
> [downloads](https://www.qubes-os.org/downloads/) page.
>
>
> ## Reminder: Qubes 4.0 approaching end-of-life
>
> As we recently 
> [announced](
> https://www.qubes-os.org/news/2022/07/04/qubes-os-4-0-eol-on-2022-08-04/), 
>
> Qubes 4.0 reaches EOL (end-of-life) on 2022-08-04. If you're using Qubes 
> 4.0 and have been waiting for an opportunity to upgrade to Qubes 4.1 via 
> the [clean 
> reinstallation](
> https://www.qubes-os.org/doc/upgrade/4.1/#clean-installation) 
> method, we strongly recommend using this Qubes 4.1.1 release to do so, 
> as this is the last Qubes 4.1 patch release before Qubes 4.0 reaches EOL.
>
>
> ## Existing Qubes 4.1.0 and release candidate users
>
> If you are already using Qubes 4.1.0 or [Qubes 
> 4.1.1-rc1](https://www.qubes-os.org/news/2022/06/27/qubes-4-1-1-rc1/), 
> then you should simply [update 
> normally](https://www.qubes-os.org/doc/how-to-update/) (which includes 
> [upgrading any EOL 
> templates](
> https://www.qubes-os.org/doc/how-to-update/#upgrading-to-avoid-eol) 
> you might have) in order to make your system essentially equivalent to 
> this stable Qubes 4.1.1 release. No special action is required on your 
> part.
>
>
> ## What's new in Qubes 4.1.1?
>
> Qubes 4.1.1 includes numerous updates over the initial 4.1.0 release, in 
> particular:
>
> - All 4.1.0 dom0 updates to date
> - Fedora 36 template (upgraded from Fedora 34)
> - Linux kernel 5.15 (upgraded from 5.10)
>
>
> ## What is a patch release?
>
> The Qubes OS Project uses the [semantic versioning](https://semver.org/) 
> standard. Version numbers are written as `..`. 
> Hence, we refer to releases that increment the third number as "patch 
> releases." A patch release does not designate a separate, new major or 
> minor release of Qubes OS. Rather, it designates its respective major or 
> minor release (in this case, 4.1.0) inclusive of all updates up to a 
> certain point. Installing Qubes 4.1.0 and fully updating it results in 
> essentially the same system as installing Qubes 4.1.1. You can learn 
> more about how Qubes release versioning works in the [version 
> scheme](https://www.qubes-os.org/doc/version-scheme/) documentation.
>
>
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2022/07/18/qubes-4-1-1.md
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c506aaa0-778b-4293-a7d3-0e81343307e2n%40googlegroups.com.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2022-01-22 Thread Ulrich Windl

On 1/15/22 18:22, Scat wrote:

Thanks all for the help...making progress...really appreciate the responses

As I continue to explore the new 4.1rc3 another issue comes up that I 
can't remember experiencing with 4.0 and it seems important:


When I try to back up my system and insert a WD external hard drive I 
get an error when I try to mount it, specifically "Error mounting 
/dev/sda1 at run/media/user/easystore: unknown filesystem type 'ntfs3,ntfs'


Backing up Qubes OS to NTFS seems a bad idea to me. Why not use a 
dedicated medium/partition formatted with a unix filesystem like xfs?




- I tried both USB ports, same error
- I tried multiple hard drives, including the one I used with my 4.0 
setup, same error
- I see the device in my sys-usb but the error comes when I try to mount 
the device
- I can mount a small USB drive and transfer files but when I put in a 
large disk the error occurs
- I tried backing up on a 32g thumb drive and it started to back up but 
then errored out with the following: "ERROR: Writing backup to VM 
failed: cat: write error: File too large (I use a dedicated VM for my 
email(Thunderbird) which has a lot of emails.

- Never had this problem with my 4.0 set up
- I googled and found similar issues but nothing with a solution

The above is my biggest issue right now but also had a few other questions:
- USB-C doesn't seem to work? Not a big deal but I can't mount a USB-C 
thumbdrive(in all fairness I was using a regular USB and used a dongle 
to convert to USB-C). I found an old thread that mentioned USB-C isn't 
supported in Qubes...
- My Thunderbird VM(dedicated VM to email) seems to constantly be 
downloading emails (I remember this from my 4.0 set up and it eventually 
stopped) but I have a large number of emails. Is there a better way to 
manage this? Can I some how save these emails with out deleting them? I 
changed "Private storage max size:" to 30g...not sure this is right but 
seems to make sense. I also changed Initial memory to 500MB and Max 
memory to 5000MB in an effort to add more resources to my email VM


The lack of being able to back-up is my biggest concern...


On Monday, January 10, 2022 at 10:30:10 AM UTC-6 stevenlc...@gmail.com 
wrote:




On Mon, Jan 10, 2022, 11:15 AM 'awokd' via qubes-users
 wrote:

Scat:

 > TPM: Device not found <---Is this Anti-Evil Maid" ?

Yes.

VT-D settings look OK. Qubes will warn on install if something
required
is missing.


Anybody try using a vTPM or TPM Simulator with Qubes?

My machine came with a "software TPM" which only works under Windows
apparently. I had previously looked at Xen vTPM but somehow could
not manage to get it to work under Qubes. I can't be the only one
out there without a TPM, so I just wanted to ask if anyone else had
looked into a virtual/software replacement yet.



--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1a9c1224-7cb0-439c-91f5-8bf5acf2f870n%40googlegroups.com 
.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/31de9786-60bf-1ca1-8157-01b8d534a3c0%40rz.uni-regensburg.de.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2022-01-16 Thread 'awokd' via qubes-users

Scat:


When I try to back up my system and insert a WD external hard drive I get
an error when I try to mount it, specifically "Error mounting /dev/sda1 at
run/media/user/easystore: unknown filesystem type 'ntfs3,ntfs'


Add an ntfs package to the template you're using for the AppVM where 
you're trying to mount it.




The above is my biggest issue right now but also had a few other questions:
- USB-C doesn't seem to work? Not a big deal but I can't mount a USB-C
thumbdrive(in all fairness I was using a regular USB and used a dongle to
convert to USB-C). I found an old thread that mentioned USB-C isn't
supported in Qubes...


I think USB-C is supported now, but can't confirm. Maybe try an addin 
USB-C adapter so you can connect directly?



- My Thunderbird VM(dedicated VM to email) seems to constantly be
downloading emails (I remember this from my 4.0 set up and it eventually
stopped) but I have a large number of emails. Is there a better way to
manage this? Can I some how save these emails with out deleting them? I
changed "Private storage max size:" to 30g...not sure this is right but
seems to make sense. I also changed Initial memory to 500MB and Max memory
to 5000MB in an effort to add more resources to my email VM


Your changes seem reasonable. I doubt email would need more than 1-2GB 
max RAM, but more won't hurt if you have plenty. You can create a local 
mail folder in Thunderbird and move your emails there, but then it 
becomes even more important to have a good backup as the only location 
for them would be on local storage.


--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/79211a33-efa3-5c43-bf4c-b7903b8a94c0%40danwin1210.de.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2022-01-15 Thread Scat
Thanks all for the help...making progress...really appreciate the responses

As I continue to explore the new 4.1rc3 another issue comes up that I can't 
remember experiencing with 4.0 and it seems important:

When I try to back up my system and insert a WD external hard drive I get 
an error when I try to mount it, specifically "Error mounting /dev/sda1 at 
run/media/user/easystore: unknown filesystem type 'ntfs3,ntfs'

- I tried both USB ports, same error
- I tried multiple hard drives, including the one I used with my 4.0 setup, 
same error
- I see the device in my sys-usb but the error comes when I try to mount 
the device
- I can mount a small USB drive and transfer files but when I put in a 
large disk the error occurs
- I tried backing up on a 32g thumb drive and it started to back up but 
then errored out with the following: "ERROR: Writing backup to VM failed: 
cat: write error: File too large (I use a dedicated VM for my 
email(Thunderbird) which has a lot of emails.
- Never had this problem with my 4.0 set up
- I googled and found similar issues but nothing with a solution

The above is my biggest issue right now but also had a few other questions:
- USB-C doesn't seem to work? Not a big deal but I can't mount a USB-C 
thumbdrive(in all fairness I was using a regular USB and used a dongle to 
convert to USB-C). I found an old thread that mentioned USB-C isn't 
supported in Qubes...
- My Thunderbird VM(dedicated VM to email) seems to constantly be 
downloading emails (I remember this from my 4.0 set up and it eventually 
stopped) but I have a large number of emails. Is there a better way to 
manage this? Can I some how save these emails with out deleting them? I 
changed "Private storage max size:" to 30g...not sure this is right but 
seems to make sense. I also changed Initial memory to 500MB and Max memory 
to 5000MB in an effort to add more resources to my email VM

The lack of being able to back-up is my biggest concern...


On Monday, January 10, 2022 at 10:30:10 AM UTC-6 stevenlc...@gmail.com 
wrote:

>
>
> On Mon, Jan 10, 2022, 11:15 AM 'awokd' via qubes-users <
> qubes...@googlegroups.com> wrote:
>
>> Scat:
>>
>> > TPM: Device not found <---Is this Anti-Evil Maid" ?
>>
>> Yes.
>>
>> VT-D settings look OK. Qubes will warn on install if something required 
>> is missing.
>>
>
> Anybody try using a vTPM or TPM Simulator with Qubes? 
>
> My machine came with a "software TPM" which only works under Windows 
> apparently. I had previously looked at Xen vTPM but somehow could not 
> manage to get it to work under Qubes. I can't be the only one out there 
> without a TPM, so I just wanted to ask if anyone else had looked into a 
> virtual/software replacement yet.
>
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1a9c1224-7cb0-439c-91f5-8bf5acf2f870n%40googlegroups.com.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2022-01-10 Thread Steve Coleman
On Mon, Jan 10, 2022, 11:15 AM 'awokd' via qubes-users <
qubes-users@googlegroups.com> wrote:

> Scat:
>
> > TPM: Device not found <---Is this Anti-Evil Maid" ?
>
> Yes.
>
> VT-D settings look OK. Qubes will warn on install if something required
> is missing.
>

Anybody try using a vTPM or TPM Simulator with Qubes?

My machine came with a "software TPM" which only works under Windows
apparently. I had previously looked at Xen vTPM but somehow could not
manage to get it to work under Qubes. I can't be the only one out there
without a TPM, so I just wanted to ask if anyone else had looked into a
virtual/software replacement yet.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ5FDniV4zk7ETMEW5B5AMDVfYE7NjU_6iCXW2f3yk-uk9W-uQ%40mail.gmail.com.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2022-01-10 Thread 'awokd' via qubes-users

Scat:


TPM: Device not found <---Is this Anti-Evil Maid" ?


Yes.

VT-D settings look OK. Qubes will warn on install if something required 
is missing.



3) I tried to Install Anti-Evil-Maid
sudo qubes-dom0-update anti-evil-maid<---It timed out or couldn't find
where to download??


May not be out yet for 4.1, but you'd need to get your TPM functional 
first anyways.



4) Cool feature but 4.1rc3 has options in General Settings to pick how to
update dom0, which one do I use for 4.1rc3?: Stable updates? Testing
updates? Unstable updates? or Testing updates(security only)?


If this is your primary workstation, choose stable or testing(security 
only) if you want security updates as soon as they are released, but 
with potential problems as they haven't been as broadly tested. If you 
don't mind breakage and want to test updates in advance and provide 
feedback, choose Testing.


--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3114fa81-5572-c841-b905-930754384a04%40danwin1210.de.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2022-01-07 Thread Scat
I just updated my OS to 4.1rc3pretty slick! I picked up a X1 Carbon 
(5thG) and loaded it on...the install went pretty good. Verifying the ISO 
is still a painI would suggest Qubes sell a bootable thumb drive that 
has been verified, maybe package it in a tamper resistant package for 
security. I would pay for that...might be a good way to raise funds.

Some early observations are:
- I have always used Debian for my Printing VM...struggled setting Debian 
up for printing but setting up Fedora was a breeze. Although I don't get 
some of the print notifications...not a big deal at all.
- Love the disposable USB and firewall. 

I did have a few questions I was hoping to get help with:


1) I ran these tests I know: qubes-hcl-report AppVM  (Name of a "AppVM" I 
was running)

Results you want:
HVM: Active
I/O MMU: Active
HAP/SLAT: Yes
TPM: Device not found  <- Is this Anti-Evil-Made I am missing?
Remapping: Yes

2)I also ran this test: sudo xl dmesg|grep VT-d  (Thats a small “L” and a 
“|” Shift+\)

Results you want:
XEN Intel VT-d iommu 0 supported page sizes: 4kB
XEN Intel VT-d iommu 1 supported page sizes: 4kB
XEN Intel VT-d Snoop Control not enabled
XEN Intel VT-d Dom0 DMA Passthrough not enabled
XEN Intel VT-d Queued Invalidation enabled
XEN Intel VT-d Interrupt Remapping enabled

Post Interupt not enabled<- This is something new?? Is this OK?

XEN Intel VT-d Shared EPT tables not enabled - This is enabled


3)I was not able to install "Anti-Evil-Maid" it seemed to time out?
sudo qubes-dom0-update anti-evil-maid 


4) With 4.1rc3 I noticed some cool GUI options in "Global Settings" for 
picking how to update dom0for 4.1rc3 which one do I use? 
Stable(default)? Testing updates? Unstable updates? or Testing 
updates(security only)?

Thanks for any help or thoughts...

On Saturday, January 1, 2022 at 2:46:58 AM UTC-6 a...@qubes-os.org wrote:

> On 12/31/21 2:40 PM, Scat wrote:
> > Thank you all, appreciate the feedback and happy new year to some!
> > 
> > Excuse the layman question but I assume if I install 4.1rc3, when 4.1 
> rolls
> > outit is simply an upgrade?
> > 
>
> It depends on the nature of any updates, but that seems like the most 
> likely outcome right now. In general, the final release candidate of a 
> series (whichever one that might be) is ultimately declared to be the 
> stable release. However, it's possible that a clean reinstallation may 
> be required from one release candidate to the next (though that's less 
> common and rather unlikely at this stage of the R4.1-rc series).
>
> -- 
> Andrew David Wong
> Community Manager
> The Qubes OS Project
> https://www.qubes-os.org
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4c07d709-e920-493e-847f-57275762955dn%40googlegroups.com.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2022-01-07 Thread Scat
Just installed 4.1rc3 onto a Carbon X1(5th G)...went well. No major 
glitches...I think I am good but had a few questions:

1)I ran, a simple test I was advised to do: qubes-hcl-report AppVM  (Name 
of "AppVM" I was running)

Results you want:
HVM: Active
I/O MMU: Active
HAP/SLAT: Yes
TPM: Device not found <---Is this Anti-Evil Maid" ?
Remapping: Yes

2) I also ran: sudo xl dmesg|grep VT-d  (Thats a small “L” and a “|” 
Shift+\)
Results you want:
XEN Intel VT-d iommu 0 supported page sizes: 4kB
XEN Intel VT-d iommu 1 supported page sizes: 4kB
XEN Intel VT-d Snoop Control not enabled
XEN Intel VT-d Dom0 DMA Passthrough not enabled
XEN Intel VT-d Queued Invalidation enabled
XEN Intel VT-d Interrupt Remapping enabled

Post Interupt not enabled  On 12/31/21 2:40 PM, Scat wrote:
> > Thank you all, appreciate the feedback and happy new year to some!
> > 
> > Excuse the layman question but I assume if I install 4.1rc3, when 4.1 
> rolls
> > outit is simply an upgrade?
> > 
>
> It depends on the nature of any updates, but that seems like the most 
> likely outcome right now. In general, the final release candidate of a 
> series (whichever one that might be) is ultimately declared to be the 
> stable release. However, it's possible that a clean reinstallation may 
> be required from one release candidate to the next (though that's less 
> common and rather unlikely at this stage of the R4.1-rc series).
>
> -- 
> Andrew David Wong
> Community Manager
> The Qubes OS Project
> https://www.qubes-os.org
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c5a6fd2c-4e22-4629-85ab-6ff7f185f032n%40googlegroups.com.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2022-01-01 Thread Andrew David Wong

On 12/31/21 2:40 PM, Scat wrote:

Thank you all, appreciate the feedback and happy new year to some!

Excuse the layman question but I assume if I install 4.1rc3, when 4.1 rolls
outit is simply an upgrade?



It depends on the nature of any updates, but that seems like the most 
likely outcome right now. In general, the final release candidate of a 
series (whichever one that might be) is ultimately declared to be the 
stable release. However, it's possible that a clean reinstallation may 
be required from one release candidate to the next (though that's less 
common and rather unlikely at this stage of the R4.1-rc series).


--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/92339c41-abae-d5ae-3dd9-fffedeef7460%40qubes-os.org.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2021-12-31 Thread Scat
Thank you all, appreciate the feedback and happy new year to some!

Excuse the layman question but I assume if I install 4.1rc3, when 4.1 rolls 
outit is simply an upgrade? 

Wishing every one the best 2022...
On Friday, December 31, 2021 at 11:50:14 AM UTC-6 Ulrich Windl wrote:

> On 12/29/21 12:20 PM, TheGardner wrote:
> > If you want to get the lastest version, just install/upgrade to 4.1rc3. 
> > This version is already working for most of the things and I'm sure, it 
> > will work for your daily things also. I wouldn't bother with 4.0.4 any 
> > more at this point of stage.
>
> Actually for a "release candidate" I'm expecting that most things do 
> work. ;-)
> ...
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9e1d655-393c-487a-9cc3-e1a25c67f9c8n%40googlegroups.com.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2021-12-31 Thread Ulrich Windl

On 12/29/21 12:20 PM, TheGardner wrote:
If you want to get the lastest version, just install/upgrade to 4.1rc3. 
This version is already working for most of the things and I'm sure, it 
will work for your daily things also. I wouldn't bother with 4.0.4 any 
more at this point of stage.


Actually for a "release candidate" I'm expecting that most things do 
work. ;-)

...

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bd2587c7-ab3b-94f5-779e-dd363cefa6f0%40rz.uni-regensburg.de.


Re: [EXT] [qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2021-12-31 Thread Ulrich Windl

On 12/29/21 3:34 AM, Scat wrote:
...
(PS Just donated before year end to the Qubes project...keep going 
developers and community! You do great stuff!)

...

Me too ;-)

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b4d98eac-4126-d5bc-ebf0-4cd236309ccc%40rz.uni-regensburg.de.


[qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2021-12-29 Thread TheGardner
If you want to get the lastest version, just install/upgrade to 4.1rc3. 
This version is already working for most of the things and I'm sure, it 
will work for your daily things also. I wouldn't bother with 4.0.4 any more 
at this point of stage.

Scat schrieb am Dienstag, 28. Dezember 2021 um 22:48:56 UTC-5:

> Long time Qubes user...I just bought an upgraded laptop from what I have 
> been using. I'd like to get the latest Qubes version and this release has a 
> lot of appeal, however I am not sure I am competent enough to provide 
> valuable feedback on this latest RC.
>
> Should I install the RC or version 4.0.4? I would like to build this 
> properly to start on my upgraded laptop...
>
> I have been able to handle making new templates as febora and debian 
> versions go end of lifeso no problem there.
> Any advice appreciated!
>
> Sincerely,
>
> (PS Just donated before year end to the Qubes project...keep going 
> developers and community! You do great stuff!)
>
> On Wednesday, December 22, 2021 at 3:23:22 AM UTC-6 a...@qubes-os.org 
> wrote:
>
>> Dear Qubes Community, 
>>
>> The third release candidate for Qubes 4.1 is here! There are no major 
>> changes to report. We've just focused on fixing bugs that were 
>> discovered and reported in the second release candidate. 
>>
>> If you're currently using any Qubes 4.1 release candidate, a regular 
>> update [01] is sufficient to upgrade to the latest one. Otherwise, 
>> read on for more about how to get started with testing Qubes 4.1-rc3. 
>>
>>
>> What's new in Qubes 4.1? 
>>  
>>
>> In case you still haven't heard, Qubes 4.1 includes several major new 
>> features, each of which is explained in depth in its own article: 
>>
>> - Qubes Architecture Next Steps: The GUI Domain [02] 
>> - Qubes Architecture Next Steps: The New Qrexec Policy System [03] 
>> - New Gentoo templates and maintenance infrastructure [04] 
>> - Reproducible builds for Debian: a big step forward [05] 
>>
>> There are also numerous other improvements and bug fixes listed in 
>> the release notes [06] and in the issue tracker [07]. 
>>
>> Finally, Qubes 4.1 features the following updated default components: 
>>
>> - Xen 4.14 
>> - Fedora 32 in dom0 
>> - Fedora 34 template 
>> - Debian 11 template 
>> - Whonix 16 Gateway and Workstation templates 
>> - Linux kernel 5.10 
>>
>>
>> How to test Qubes 4.1-rc3 
>> - 
>>
>> If you're willing to test [08] this release candidate, you can help to 
>> improve the stable release by reporting any bugs you encounter [09]. 
>> Experienced users are strongly encouraged to join the testing team [10]! 
>>
>> How to migrate to 4.1-rc3: 
>>
>> - If you're already on any 4.1 release candidate, simply perform a 
>> normal update [01]. 
>> - If you're not on a 4.1 release candidate yet, you have two options: 
>> 1. Back up [11] your current installation, download [12] 4.1-rc3, 
>> perform a fresh install [13], then restore [14] from your backup. 
>> 2. Perform an in-place upgrade [15]. 
>>
>>
>> Release candidate planning 
>> -- 
>>
>> With each new release candidate, Qubes 4.1 becomes more and more stable 
>> as our testers report more bugs, and our developers fix them. As 
>> explained in our general release schedule [16], this cycle will continue 
>> until no major bugs are discovered, at which point the last release 
>> candidate will be declared the stable 4.1 release. Until then, we plan 
>> to have new release candidates approximately every five weeks. 
>>
>>
>> [01] https://www.qubes-os.org/doc/how-to-update/ 
>> [02] https://www.qubes-os.org/news/2020/03/18/gui-domain/ 
>> [03] https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/ 
>> [04] 
>>
>> https://www.qubes-os.org/news/2020/10/05/new-gentoo-templates-and-maintenance-infrastructure/
>>  
>> [05] 
>>
>> https://www.qubes-os.org/news/2021/10/08/reproducible-builds-for-debian-a-big-step-forward/
>>  
>> [06] https://www.qubes-os.org/doc/releases/4.1/release-notes/ 
>> [07] 
>>
>> https://github.com/QubesOS/qubes-issues/issues?q=milestone%3A%22Release+4.1%22+is%3Aclosed+-label%3A%22R%3A+duplicate%22+-label%3A%22R%3A+invalid%22+-label%3A%22R%3A+cannot+reproduce%22+-label%3A%22R%3A+not+an+issue%22+-label%3A%22R%3A+not+our+bug%22+-label%3A%22R%3A+won%27t+do%22+-label%3A%22R%3A+won%27t+fix%22+
>>  
>> [08] https://www.qubes-os.org/doc/testing/ 
>> [09] https://www.qubes-os.org/doc/issue-tracking/ 
>> [10] https://forum.qubes-os.org/t/joining-the-testing-team/5190 
>> [11] 
>>
>> https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/#creating-a-backup
>>  
>> [12] https://www.qubes-os.org/downloads/ 
>> [13] https://www.qubes-os.org/doc/installation-guide/ 
>> [14] 
>>
>> https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/#restoring-from-a-backup
>>  
>> [15] https://www.qubes-os.org/doc/upgrade/4.1/ 
>> [16] https://www.qubes-os.org/doc/version-scheme/#release-schedule 
>>
>> This announ

[qubes-users] Re: Qubes OS 4.1-rc3 has been released!

2021-12-28 Thread Scat
Long time Qubes user...I just bought an upgraded laptop from what I have 
been using. I'd like to get the latest Qubes version and this release has a 
lot of appeal, however I am not sure I am competent enough to provide 
valuable feedback on this latest RC.

Should I install the RC or version 4.0.4? I would like to build this 
properly to start on my upgraded laptop...

I have been able to handle making new templates as febora and debian 
versions go end of lifeso no problem there.
Any advice appreciated!

Sincerely,

(PS Just donated before year end to the Qubes project...keep going 
developers and community! You do great stuff!)

On Wednesday, December 22, 2021 at 3:23:22 AM UTC-6 a...@qubes-os.org wrote:

> Dear Qubes Community,
>
> The third release candidate for Qubes 4.1 is here! There are no major
> changes to report. We've just focused on fixing bugs that were
> discovered and reported in the second release candidate.
>
> If you're currently using any Qubes 4.1 release candidate, a regular
> update [01] is sufficient to upgrade to the latest one. Otherwise,
> read on for more about how to get started with testing Qubes 4.1-rc3.
>
>
> What's new in Qubes 4.1?
> 
>
> In case you still haven't heard, Qubes 4.1 includes several major new
> features, each of which is explained in depth in its own article:
>
> - Qubes Architecture Next Steps: The GUI Domain [02]
> - Qubes Architecture Next Steps: The New Qrexec Policy System [03]
> - New Gentoo templates and maintenance infrastructure [04]
> - Reproducible builds for Debian: a big step forward [05]
>
> There are also numerous other improvements and bug fixes listed in
> the release notes [06] and in the issue tracker [07].
>
> Finally, Qubes 4.1 features the following updated default components:
>
> - Xen 4.14
> - Fedora 32 in dom0
> - Fedora 34 template
> - Debian 11 template
> - Whonix 16 Gateway and Workstation templates
> - Linux kernel 5.10
>
>
> How to test Qubes 4.1-rc3
> -
>
> If you're willing to test [08] this release candidate, you can help to
> improve the stable release by reporting any bugs you encounter [09].
> Experienced users are strongly encouraged to join the testing team [10]!
>
> How to migrate to 4.1-rc3:
>
> - If you're already on any 4.1 release candidate, simply perform a
> normal update [01].
> - If you're not on a 4.1 release candidate yet, you have two options:
> 1. Back up [11] your current installation, download [12] 4.1-rc3,
> perform a fresh install [13], then restore [14] from your backup.
> 2. Perform an in-place upgrade [15].
>
>
> Release candidate planning
> --
>
> With each new release candidate, Qubes 4.1 becomes more and more stable
> as our testers report more bugs, and our developers fix them. As
> explained in our general release schedule [16], this cycle will continue
> until no major bugs are discovered, at which point the last release
> candidate will be declared the stable 4.1 release. Until then, we plan
> to have new release candidates approximately every five weeks.
>
>
> [01] https://www.qubes-os.org/doc/how-to-update/
> [02] https://www.qubes-os.org/news/2020/03/18/gui-domain/
> [03] https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/
> [04] 
>
> https://www.qubes-os.org/news/2020/10/05/new-gentoo-templates-and-maintenance-infrastructure/
> [05] 
>
> https://www.qubes-os.org/news/2021/10/08/reproducible-builds-for-debian-a-big-step-forward/
> [06] https://www.qubes-os.org/doc/releases/4.1/release-notes/
> [07] 
>
> https://github.com/QubesOS/qubes-issues/issues?q=milestone%3A%22Release+4.1%22+is%3Aclosed+-label%3A%22R%3A+duplicate%22+-label%3A%22R%3A+invalid%22+-label%3A%22R%3A+cannot+reproduce%22+-label%3A%22R%3A+not+an+issue%22+-label%3A%22R%3A+not+our+bug%22+-label%3A%22R%3A+won%27t+do%22+-label%3A%22R%3A+won%27t+fix%22+
> [08] https://www.qubes-os.org/doc/testing/
> [09] https://www.qubes-os.org/doc/issue-tracking/
> [10] https://forum.qubes-os.org/t/joining-the-testing-team/5190
> [11] 
>
> https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/#creating-a-backup
> [12] https://www.qubes-os.org/downloads/
> [13] https://www.qubes-os.org/doc/installation-guide/
> [14] 
>
> https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/#restoring-from-a-backup
> [15] https://www.qubes-os.org/doc/upgrade/4.1/
> [16] https://www.qubes-os.org/doc/version-scheme/#release-schedule
>
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2021/12/21/qubes-4-1-rc3/
>
> -- 
> Andrew David Wong
> Community Manager
> The Qubes OS Project
> https://www.qubes-os.org
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-user

[qubes-users] Re: Qubes OS 4.1-rc1 has been released!

2021-10-13 Thread evado...@gmail.com
amazinggg

понедельник, 11 октября 2021 г. в 23:51:52 UTC, a...@qubes-os.org: 

> Dear Qubes Community,
>
> After many years of work, the team is pleased to announce the first
> release candidate for Qubes 4.1!
>
> Qubes 4.1 includes several major new features, each of which is
> explained in depth in its own article:
>
> - Qubes Architecture Next Steps: The GUI Domain [01]
> - Qubes Architecture Next Steps: The New Qrexec Policy System [02]
> - New Gentoo templates and maintenance infrastructure [03]
> - Reproducible builds for Debian: a big step forward [04]
>
> This release candidate also includes numerous other improvements and
> bug fixes, which are listed in the release notes [05] and in the issue
> tracker [06].
>
> Finally, Qubes 4.1 features the following updated default components:
>
> - Xen 4.14
> - Fedora 32 in dom0
> - Fedora 34 template
> - Debian 11 template
> - Whonix 16 Gateway and Workstation templates
> - Linux kernel 5.10
>
> Qubes 4.1-rc1 is available on the downloads [07] page.
>
>
> How to test Qubes 4.1-rc1
> -
>
> If you're willing to test [08] this release candidate, you can help to
> improve the stable release by reporting any bugs you encounter [09].
> Experienced users are strongly encouraged to join the testing team [10]!
>
> There are two ways to migrate to 4.1-rc1:
>
> - Back up [11] your current installation, perform a fresh
> install [12] of 4.1-rc1, then restore [13] from your backup.
> - Perform an in-place upgrade [14].
>
>
> Release candidate planning
> --
>
> As with any initial release candidate, it's likely that user testing
> will reveal important bugs that we'll want to fix before the stable
> release. Depending on the severity of the bugs discovered and how long
> it takes to fix them, we expect that it may be anywhere from a few weeks
> to a few months before we announce the second release candidate.
>
>
> [01] https://www.qubes-os.org/news/2020/03/18/gui-domain/
> [02] https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/
> [03] 
>
> https://www.qubes-os.org/news/2020/10/05/new-gentoo-templates-and-maintenance-infrastructure/
> [04] 
>
> https://www.qubes-os.org/news/2021/10/08/reproducible-builds-for-debian-a-big-step-forward/
> [05] https://www.qubes-os.org/doc/releases/4.1/release-notes/
> [06] 
>
> https://github.com/QubesOS/qubes-issues/issues?q=milestone%3A%22Release+4.1%22+is%3Aclosed+-label%3A%22R%3A+duplicate%22+-label%3A%22R%3A+invalid%22+-label%3A%22R%3A+cannot+reproduce%22+-label%3A%22R%3A+not+an+issue%22+-label%3A%22R%3A+not+our+bug%22+-label%3A%22R%3A+won%27t+do%22+-label%3A%22R%3A+won%27t+fix%22+
> [07] https://www.qubes-os.org/downloads/
> [08] https://www.qubes-os.org/doc/testing/
> [09] https://www.qubes-os.org/doc/issue-tracking/
> [10] https://forum.qubes-os.org/t/joining-the-testing-team/5190
> [11] 
>
> https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/#creating-a-backup
> [12] https://www.qubes-os.org/doc/installation-guide/
> [13] 
>
> https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/#restoring-from-a-backup
> [14] https://www.qubes-os.org/doc/upgrade/4.1/
>
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2021/10/11/qubes-4-1-rc1/
>
> -- 
> Andrew David Wong
> Community Manager
> The Qubes OS Project
> https://www.qubes-os.org
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/96ea932d-2e9b-4b0a-b4c3-115cdfefc084n%40googlegroups.com.


Re: [qubes-users] Re: Qubes OS 4.0.4 has been released!

2021-03-11 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Mar 05, 2021 at 09:12:07AM +0100, haaber wrote:
> Dear Andrew
> 
> thank you. My system (based on q4.0) is up-to-date. However I need to
> test the
> 
> kernel-latest-5.10.16-1.3.fc32.qubes.x86_64.rpm
> 
> compile that marmarek put only in r4.1 repos. Could you push it please
> into r4.0 as well or are they incompatible ??

That very package was built for r4.1 only (they are not directly
compatible, I'd need to built r4.0 version separately). But in the
meatime there is kernel-latest-5.11.4 for both 4.0 and 4.1, that
includes the same fix.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmBKNdAACgkQ24/THMrX
1ywbjgf+M70MVByRydvWSSHpfe3+pCFXhj0JefiL8m2k/SwrgHxQRPG4UvOjT1TJ
FUrrPMGIDnsbkvFEphSkucLw0Jqfb9lhepd6PUNwD6l8Oq+iXZUoVhGb3IvEP52Q
YqnmO0xDoqhCmqALUimhArq42w0zMqzBIIr+E84fdp5efUHkQo8pmBLcRtAOJDQa
GHBr1nHkvC5nMLTFF6Yuha1U0MrW7giAOd055KvNacE2IgNTx3NVJ/CFloy5P7KN
GePuAbWRPQiW9QT1zFDkwuI/mw5RTHizsE9y34ppz4raHC0D8gnzwJd1E+3iTaeq
9h3N3hNHvfBlLNIvZ5t+KA2OGXxuAQ==
=Jybj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YEo10PHmLLevmsvg%40mail-itl.


[qubes-users] Re: Qubes OS 4.0.4 has been released!

2021-03-05 Thread haaber

Dear Andrew

thank you. My system (based on q4.0) is up-to-date. However I need to
test the

kernel-latest-5.10.16-1.3.fc32.qubes.x86_64.rpm

compile that marmarek put only in r4.1 repos. Could you push it please
into r4.0 as well or are they incompatible ??

cheers, Bernhard




Dear Qubes Community,

We're pleased to announce the release of Qubes OS 4.0.4! This is the
fourth stable release of Qubes 4.0. It includes many updates over the
initial 4.0 release, including:

- All 4.0 dom0 updates to date
- Fedora 32 TemplateVM
- Debian 10 TemplateVM
- Whonix 15 Gateway and Workstation TemplateVMs
- Linux kernel 5.4 by default

Qubes 4.0.4 is available on the downloads page:

https://www.qubes-os.org/downloads/


What is a point release?


A point release does not designate a separate, new version of Qubes OS.
Rather, it designates its respective major or minor release (in this
case, 4.0) inclusive of all updates up to a certain point. Installing
Qubes 4.0 and fully updating [1] it results in the same system as
installing Qubes 4.0.4.


What should I do?
-

If you installed Qubes 4.0, 4.0.1, 4.0.2, or 4.0.3 and have fully
updated [1], then your system is already equivalent to a Qubes
4.0.4 installation. No further action is required.

Regardless of your current OS, if you wish to install (or reinstall)
Qubes 4.0 for any reason, then the 4.0.4 ISO makes this more convenient
and secure, since it bundles all Qubes 4.0 updates to date. Please see
the installation guide [2] for detailed instructions.

Thank you to all the release candidate users for testing this release
and reporting issues [3]!


[1] https://www.qubes-os.org/doc/updating-qubes-os/
[2] https://www.qubes-os.org/doc/installation-guide/
[3] https://www.qubes-os.org/doc/reporting-bugs/

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/03/04/qubes-4-0-4/



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/790a8d89-e94a-7904-56a7-bd6c31fd869f%40web.de.


[qubes-users] Re: Qubes OS 4.0.4-rc2 has been released!

2021-01-25 Thread brian rutland
dom0: sudo dnf remove kernel-5.4.x... -y

It will be nice if the next update will come with a 5.6+ kernel(a lot of 
people are complaining about Nvidia RTX 20xx issues).

On Sunday, January 24, 2021 at 3:13:06 PM UTC-5 haa...@web.de wrote:

> I have a kernel question. With last updates I have 3 kernels 5.4.x
> installed and one 5.10.x (kernel-latest). It happens that the
> 5.4.x-kernels provoque freezes & sponaneous reboots. So I would like to
> ask qubes to disregard these (5.4.x) and keep at least two 5.9.x or
> 5.10.x kernels when upgrading (and maybe some stable 4.x kernel as
> backup in case). How can I do that? Cheers. Bernhard
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/834350db-281e-44b1-bda2-c73607a6df0dn%40googlegroups.com.


[qubes-users] Re: Qubes OS 4.0.4-rc2 has been released!

2021-01-25 Thread 0spin...@gmail.com
5.4 is a stable kernel series, so if you experience issues, please report 
them on the github issues list after some trial and erroring on here or the 
qubes-os forum.

On Sunday, January 24, 2021 at 8:13:06 PM UTC haa...@web.de wrote:

> I have a kernel question. With last updates I have 3 kernels 5.4.x
> installed and one 5.10.x (kernel-latest). It happens that the
> 5.4.x-kernels provoque freezes & sponaneous reboots. So I would like to
> ask qubes to disregard these (5.4.x) and keep at least two 5.9.x or
> 5.10.x kernels when upgrading (and maybe some stable 4.x kernel as
> backup in case). How can I do that? Cheers. Bernhard
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/83f6ef2a-4197-4888-b70f-15e753e42f0cn%40googlegroups.com.


[qubes-users] Re: Qubes OS 4.0.4-rc2 has been released!

2021-01-24 Thread haaber

I have a kernel question. With last updates I have 3 kernels 5.4.x
installed and one 5.10.x (kernel-latest). It happens that the
5.4.x-kernels provoque freezes & sponaneous reboots. So I would like to
ask qubes to disregard these (5.4.x) and keep at least two 5.9.x or
5.10.x kernels when upgrading (and maybe some stable 4.x kernel as
backup in case). How can I do that?  Cheers.  Bernhard

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/08712453-a8b6-4cb0-b09a-26e834743915%40web.de.


Re: [EXT] [qubes-users] Re: Qubes OS: .onion and links

2020-12-06 Thread Ulrich Windl
On 12/1/20 6:22 PM, TheGardner wrote:
> What happens, if you have set "Prioritize .onion sites when known." to 
> ALWAYS under Privacy & Security - Browser Privacy ?

That was not the question: The page exists; otherwise I wouldn't have asked.

> 
> Cheers :)
> 
> Ulrich Windl schrieb am Montag, 30. November 2020 um 21:16:31 UTC+1:
> 
> Hi!
> 
> I noticed when I click the link "upgrading Fedora TemplateVMs" found on
> the onion version of the page (using the tor browser of whonix), you
> are
> directed to a non-onion page
> (https://www.qubes-os.org/doc/template/fedora/upgrade/
> ), and you'll
> have
> to switch to onion again.
> 
> In contrast when I click news items on
> 
> http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/news/
> 
> 
> 
> I remain on onion sites.
> 
> Regards,
> Ulrich
> 
> -- 
> You received this message because you are subscribed to the Google 
> Groups "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send 
> an email to qubes-users+unsubscr...@googlegroups.com 
> .
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/e6d5020b-5d5d-483f-8816-53b98ef90a0an%40googlegroups.com
>  
> .

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5FCD805002A10003D54A%40gwsmtp.uni-regensburg.de.


Re: [EXT] [qubes-users] Re: Qubes OS: .onion and links

2020-12-06 Thread Ulrich Windl
On 12/1/20 6:22 PM, TheGardner wrote:
> What happens, if you have set "Prioritize .onion sites when known." to 
> ALWAYS under Privacy & Security - Browser Privacy ?

That was not the question: The page exists; otherwise I wouldn't have asked.

> 
> Cheers :)
> 
> Ulrich Windl schrieb am Montag, 30. November 2020 um 21:16:31 UTC+1:
> 
> Hi!
> 
> I noticed when I click the link "upgrading Fedora TemplateVMs" found on
> the onion version of the page (using the tor browser of whonix), you
> are
> directed to a non-onion page
> (https://www.qubes-os.org/doc/template/fedora/upgrade/
> ), and you'll
> have
> to switch to onion again.
> 
> In contrast when I click news items on
> 
> http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/news/
> 
> 
> 
> I remain on onion sites.
> 
> Regards,
> Ulrich
> 
> -- 
> You received this message because you are subscribed to the Google 
> Groups "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send 
> an email to qubes-users+unsubscr...@googlegroups.com 
> .
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/e6d5020b-5d5d-483f-8816-53b98ef90a0an%40googlegroups.com
>  
> .

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5FCD7F9502A10003D530%40gwsmtp.uni-regensburg.de.


[qubes-users] Re: Qubes OS: .onion and links

2020-12-01 Thread TheGardner
What happens, if you have set "Prioritize .onion sites when known." to 
ALWAYS under Privacy & Security - Browser Privacy ?

Cheers :)

Ulrich Windl schrieb am Montag, 30. November 2020 um 21:16:31 UTC+1:

> Hi!
>
> I noticed when I click the link "upgrading Fedora TemplateVMs" found on 
> the onion version of the page (using the tor browser of whonix), you are 
> directed to a non-onion page 
> (https://www.qubes-os.org/doc/template/fedora/upgrade/), and you'll have 
> to switch to onion again.
>
> In contrast when I click news items on 
> http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/news/ 
> I remain on onion sites.
>
> Regards,
> Ulrich
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e6d5020b-5d5d-483f-8816-53b98ef90a0an%40googlegroups.com.


[qubes-users] Re: Qubes OS breaks when setting up initial VMs on Thinkpad T580

2020-08-02 Thread solworth%uic.edu via qubes-users
I'm running qubes on a T580.  I did the install in March 2019, so I'm 
relying on incomplete notes.

Note you must do (1) before (2), otherwise your T580 will be bricked.

1. Update bios to 1.18 or later
*2. Enable BIOS assist for Thunderbolt (make sure to use "Quick" boot mode)*
*3. Legacy boot*

*I believe that you must also have "OS optimized defaults" disabled.  This 
is AFAIK a windows only option.*

*best of luck*
*Jon*



On Saturday, July 25, 2020 at 4:07:28 PM UTC-5, deathg...@gmail.com wrote:
>
> Hi,
>
> I've recently tried to install Qubes OS on a Lenovo Thinkpad T580.
>
> But for some reason I always get this when doing the initial configuration 
> (after install where you choose what VMs to have)
>
> https://media.discordapp.net/attachments/242046482931384320/736628585644687380/IMG_20200725_175711.jpg
>
> I'm using Qubes OS 4.0 which said to be working on T580 just fine (except 
> for suspend not working)
>
> I tried flashing it on a different USB stick as I thought my USB wasn't 
> flashing properly. No luck
>
> I tried setting my boot to legacy and turning off secure boot. No luck
>
> I thought it was failing because my display went to sleep during the 
> initial configuration. So I moved the trackpad every minute to keep it 
> awake but still no luck.
>
> I'm completely out of options here and I have no clue why this is 
> happening.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b53b317a-00f5-43fb-93ef-4adcb25c52b8o%40googlegroups.com.


[qubes-users] Re: Qubes-OS nature.

2020-07-04 Thread Catacombs


On Saturday, July 4, 2020 at 2:40:58 PM UTC-5, Jason Long wrote:
>
> Hello,
> The Qubes-OS is secure in nature or just secure in Virtualization?
> How about the system resourced that it using by default?
>
> Thank you.
>

Qubes is secure in how one uses it.  I would prefer, that some of the more 
experienced on here point out a concise checklist of the "how to stay 
secure" with a list of don't ever do this, and think you are going to stay 
secure.  

There is an old saying,   'Encryption is usually broken in practice, not in 
theory.' Meaning people do dumb things while trying to stay secure.   Like 
in WW One, when they changed codes on the front lines, someone would lose 
their new code book, So command, after sending orders in code, would sent 
the same thing "in the clear" not encrypted.   Giving the code beakers a 
crib.  

Qubes security, order of how one uses it, is not just encryption.  

I repeat. Be great if one of the more knowledgeable created a concise 
checklist, "how to stay secure using Qubes."

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a5d0ed4-beee-47e7-ba76-574f2e365ad4o%40googlegroups.com.


[qubes-users] Re: Qubes OS and clonezilla

2020-06-26 Thread didier . pelligra
I cannot put NVME in SATA mode, nor can I clone disk to disk as I have to 
go through an intermediate image. I tried a LOT of clonezilla options and I 
was already familiar with clonezilla so I don't think any option can help 
me here.

Anyway I ended up setting up a PXE server and deploying Qubes from there, 
along with a kickstart file and configuration scripts.

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a87ca0c0-3618-45b2-8083-67e1719395a5o%40googlegroups.com.


Re: [qubes-users] Re: Qubes OS & 3mdeb minisummit 2020

2020-05-30 Thread David Hobach

On 5/28/20 10:12 AM, Camille wrote:

edit: all the recordings will be available on 3mdeb youtube channel
 :)


Thanks for that, much appreciated!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7474b9f4-269b-63dd-3355-832c8b1d5da9%40hackingthe.net.


smime.p7s
Description: S/MIME Cryptographic Signature


[qubes-users] Re: Qubes OS & 3mdeb minisummit 2020

2020-05-28 Thread Camille
edit: all the recordings will be available on 3mdeb youtube channel 
 :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f0b4f80a-cc33-48d3-8688-c7bd06991948%40googlegroups.com.


Re: [qubes-users] Re: Qubes OS 4.0.2 has been released!

2020-01-13 Thread trueriver


On Friday, 10 January 2020 01:16:58 UTC, Marek Marczykowski-Górecki wrote:
>
>
> No, it doesn't affect security. It simply crashes (and reboot). If it 
> works on your particular hardware, then you're lucky and should be safe 
> to continue using it. 
>
>
I got through install, and had problems restoring from backups. Those 
problems were
not cnsistent, but included

- sometimes the machine crashed without warning
- complaints from the backup process that a "file list" was missing
- creating space on the LVM for the restored machines but then announcing 
BOTH
 in green that the restore had worked AND in red that it failed
- on exactly one occasion actually working

I am guessing that the critical bug is one that is timing dependent in some 
way, and in fairness
to your testers those are the hardest ones to spot as they depend on the 
hardware, on the
day of the week, and possibly the conjunction of Mercury and Mars...

Anyway, after a thorough test of my drive, and on similar symptoms 
appearing on a second
machine, I reverted to rc3 and those problems resolved.

Let me know if you would believe it would be useful to add these comments 
to the -issues
facility:  I won't unless you ask

Warmly
R~~
Those problems went away 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8e672e67-28e5-429e-954b-e21b75e83389%40googlegroups.com.


Re: [qubes-users] Re: Qubes OS 4.0.2 has been released!

2020-01-09 Thread fiftyfourthparallel
Thanks, and keep up the good work!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/757f6e1b-d174-41a4-a4ec-d32f1c6fede0%40googlegroups.com.


Re: [qubes-users] Re: Qubes OS 4.0.2 has been released!

2020-01-09 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Jan 08, 2020 at 06:07:01AM -0800, fiftyfourthparal...@gmail.com wrote:
> Hi Andrew,
> 
> I installed 4.0.2 on my Dell Inspiron 5593 without new issues.
> 
> The answer to the following question seems to have been implied in earlier 
> responses, but I'd just like an explicit clarification: Can the "critical 
> kernel bug" affect my security in any way?

No, it doesn't affect security. It simply crashes (and reboot). If it
works on your particular hardware, then you're lucky and should be safe
to continue using it.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAl4X0IEACgkQ24/THMrX
1yzgDgf8CAQZyZQLeuF45UToxe4lumA3PWb9q8j82LW7p/Llizwu97T1pF/c6mGJ
MXuUGyu8H8AS2nEK6W4zC1ZDClTFMGvsmMOwhkDbSUuSxyK1WXtRdAhsHK32jQ6j
0xnS6woUeFUkmBonjfQZxrDtj719WwrLWsJWffrDG4GPRoQkk6Mp+QjB8N1d/0bX
9hPjWxok0c6Up4hTOoGLVlnW0OlRgZ35P4UOGqxxscjygpgBwXvD+BXg8YMP+f/v
t6gEu7oLJ9faxtNT4nGHgQZhKayuhAGFvf5Q+uvyBplGWqwGpHmEh6FJnlKEoWYD
UbaUNGX1UPuBM8WMstJ/F9P3n8a/tA==
=xWrL
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200110011649.GA29736%40mail-itl.


[qubes-users] Re: Qubes OS 4.0.2 has been released!

2020-01-08 Thread fiftyfourthparallel
Hi Andrew,

I installed 4.0.2 on my Dell Inspiron 5593 without new issues.

The answer to the following question seems to have been implied in earlier 
responses, but I'd just like an explicit clarification: Can the "critical 
kernel bug" affect my security in any way?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b02ac1a2-ea36-481a-a83c-b85d56eb467c%40googlegroups.com.


[qubes-users] Re: Qubes OS 4.0.2 has been released!

2020-01-08 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

Shortly after this announcement was originally sent, a bug was
discovered in the dom0 kernel included in Qubes 4.0.2:

https://github.com/QubesOS/qubes-issues/issues/5553

Since this bug would present installation problems for the majority of
users, we have temporarily removed it from the Downloads page and
reinstated the latest release candidate (Qubes 4.0.2-rc3) in its place.


On 2020-01-02 8:21 PM, Andrew David Wong wrote:
> Dear Qubes Community,
> 
> We're pleased to announce the release of Qubes 4.0.2! This is the second
> stable point release of Qubes 4.0. It includes many updates over the
> initial 4.0 release, in particular:
> 
> - All 4.0 dom0 updates to date
> - Fedora 30 TemplateVM
> - Debian 10 TemplateVM
> - Whonix 15 Gateway and Workstation TemplateVMs
> - Linux kernel 4.19 by default
> 
> Qubes 4.0.2 is available on the Downloads page:
> 
> https://www.qubes-os.org/downloads/
> 
> 
> What is a point release?
> 
> 
> A point release does not designate a separate, new version of Qubes OS.
> Rather, it designates its respective major or minor release (in this
> case, 4.0) inclusive of all updates up to a certain point. Installing
> Qubes 4.0 and fully updating it results in the same system as installing
> Qubes 4.0.2.
> 
> 
> What should I do?
> -
> 
> If you installed Qubes 4.0 or 4.0.1 and have fully updated, then your
> system is already equivalent to a Qubes 4.0.2 installation. [1] No
> further action is required.
> 
> Similarly, if you're currently using a Qubes 4.0.2 release candidate
> (4.0.2-rc1, 4.0.2-rc2, or 4.0.2-rc3), and your system is fully updated,
> then your system is equivalent to a 4.0.2 stable installation, and no
> additional action is needed. [1]
> 
> Regardless of your current OS, if you wish to install (or reinstall)
> Qubes 4.0 for any reason, then the 4.0.2 ISO makes this more convenient
> and secure, since it bundles all Qubes 4.0 updates to date.
> 
> *Note:* At 4.5 GiB, the Qubes 4.0.2 ISO will not fit on a single-layer
> DVD (for the technical details underlying this, please see issue
> #5367). [2] Instead, we recommend copying the ISO onto a sufficiently
> large USB drive. [3] However, if you would prefer to use optical media,
> we suggest selecting a dual-layer DVD or Blu-ray disc.
> 
> Thank you to all the release candidate users for testing this release
> and reporting issues! [4]
> 
> 
> [1] https://www.qubes-os.org/doc/updating-qubes-os/
> [2] https://github.com/QubesOS/qubes-issues/issues/5367
> [3] 
> https://www.qubes-os.org/doc/installation-guide/#copying-the-iso-onto-the-installation-medium
> [4] https://www.qubes-os.org/doc/reporting-bugs/
> 
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2020/01/02/qubes-4-0-2/
> 
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=B08q
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/99b43cf1-d911-3253-7f14-efc4814d95c9%40qubes-os.org.


[qubes-users] Re: Qubes-OS compatible SSD SAMSUNG.

2019-08-02 Thread rec wins
On 8/1/19 6:27 AM, 0brand wrote:
> 
>> Good morning I have the following doubt:
>>
>> The qubes-os operating system is compatible with the following SSD disk 
>> models:
>>
>> SAMSUNG 860 EVO?
>> SAMSUNG860 QVO?
>> SAMSUNG860 PRO?
>>
>> I have directly asked the manufacturer SAMSUNG and he has told me that LINUX 
>> is generally compatible, but they have no list of which LINUX distributions 
>> are fully compatible.
> 
> I used the 860 pro in a previous hardware configuration with no issues.
> 
> Regards
> 
> 0brand
> 
> 

old 840 evo  seems to work fine on 4.0.1, not sure about 4.0.2 yet

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee47394e-bb54-fb81-c75f-da814d6b6b32%40riseup.net.


[qubes-users] Re: Qubes-OS compatible SSD SAMSUNG.

2019-08-01 Thread brendan . hoar
On Thursday, August 1, 2019 at 7:28:09 AM UTC-4, gerard ribas vicente wrote:
>
> The qubes-os operating system is compatible with the following SSD disk 
> models:
>
> SAMSUNG 860 EVO?
> SAMSUNG860 QVO?
> SAMSUNG860 PRO?
>

Generally all contemporary SSDs are compatible. I have used the 860 EVO 
(both SATA and mSATA) successfully. The other two should work fine, as well.

>From a performance perspective, I currently avoid the QVO line, which 
utilize quad-level cells, as they do not meet performance expectations if 
one plans to move a lot of data in and out of the drive regularly. 

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/15968449-7db4-4dea-a570-cb46d3c3f230%40googlegroups.com.


[qubes-users] Re: Qubes OS 4.0.2-rc1 has been released!

2019-07-10 Thread drokmed
Great!

I was getting ready to ask when it might be out :)

I'll download the ISO and try it out.  Time to wipe another drive...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e83177c6-26f8-4d8f-8099-56dcc6d0d8c7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes os resolution issue

2019-07-01 Thread 'awokd' via qubes-users

oak2...@gmail.com:


If you want to enable full screen mode for select VMs, you can do that by 
creating the following entry in the /etc/qubes/guid.conf file in Dom0:

Can anyone tell me how to do this?  Thanks.


Qubes menu>Terminal Emulator> "sudo nano /etc/qubes/guid.conf"?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b475dea-0f22-98dc-f718-4a51db78c43a%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes os resolution issue

2019-06-30 Thread oak2572
On Friday, March 9, 2018 at 12:56:25 PM UTC-5, randal...@gmail.com wrote:
> Hi there so I was finally able to get qubes installed to test if it actually 
> runs on my laptop (Razer stealth 2017) and there's some issue with the 
> display resolution. My resolution is 3200 x 1800 and that's fine, but when I 
> log into qubes everything looks extremely small and hard to read. I assume 
> it's because of how high the resolution is. how can I get the desktop to 
> display a bigger gui while keeping the resolution the same? I need baby 
> tutorials as I'm new to qubes. Thanks in advance!

I have the problem of screen resolution after finally figuring out how to 
install windows 7 in win7new qube.  Other Qubes have option in upper right 
corner to make fullscreen but the win7new doesn't.  Now I saw instructions 
about it on Qubes site:

If you want to enable full screen mode for select VMs, you can do that by 
creating the following entry in the /etc/qubes/guid.conf file in Dom0:

Can anyone tell me how to do this?  Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d16a55eb-c082-4f34-98e1-7ce5bf0ff947%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS Installation Resolution

2019-06-28 Thread Jon deps

On 6/28/19 7:56 AM, 'awokd' via qubes-users wrote:

'[NOTIFICATION]' via qubes-users:

The problem is the ease of convenience when it comes to to eh various VM 
instances. As a new user to QUBES OS, it seems more complicated than usual. One 
of the main issues was the ethernet tethering passthrough. That was so 
difficult to set up due to the lack of or vague instructions. QUBES OS should 
have a more user friendly interface or framework. While it does seem simple as 
it can get, The ability to maneuver in the infrastructure can be confusing. 
Sometimes just using VIRTUALBOX can seem much more easier because of its visual 
compartmentalization. Along with the extension pack to share data between, 
QUBES OS does not have this setting options. In QUBES OS, you have to do it 
each time? Anyways, hope to some QUBES OS improvement in terms of interface and 
ease of use?


Glad you were able to get it installed and try it out. 8GB should be
sufficient- I wonder if it's not a bad stick. I missed having a
graphical representation of networking too, when I came to Qubes from
other OS/virtualization products.

Not sure what you mean by ethernet tethering passthrough in context of
Qubes. What were you trying to do, and where did you have trouble?





Along with the extension pack to share data between, QUBES OS does not 
have this setting options. In QUBES OS, you have to do it each time?


you probably are not going to get far comparing VBox  and  Qubes, I 
believe your talking about VB extensions to do things.


Qubes are designed Not to share easily, I think that is the point. So, 
if your wanting a permanent data sharing between Qubes, afaik, not 
possible, what would be the point ?


maybe you can make a  HVM and install VBox on it and see how far you get
https://www.qubes-os.org/doc/hvm/

it's probably as complicated as you make it

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f8236422-17d2-e8df-0051-afe0501b5694%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS screensharing

2019-04-26 Thread Fernando
On Thursday, April 25, 2019 at 3:41:43 PM UTC-3, brend...@gmail.com wrote:
> On Thursday, April 25, 2019 at 1:54:38 PM UTC-4, Fernando wrote:
> > The fix from Marmarek worked for me as soon as it was released, but then 
> > after a few updates (I don't remember exactly when) it stopped working for 
> > me.
> > 
> > Do you have any suggestions on where I can start looking to debug this 
> > issue? From what I see, no one else has reported problems.
> 
> Is release repo up to date with the related changes from testing?
> 
> I'm using testing and it worked on and off recently, but worked ok the last 
> two attempts. Hard to pin down, though, as I'm updating dom0 daily-ish.
> 
> Just tried a few device attach/detach/attach/VM restart/VM start/attach of an 
> ISOstick with -testing updates and it seems to be working today...
> 
> Brendan

Thanks, Brendan. At least I know it's not just my local config.

I'm not using testing repo since I need my work laptop to be quite stable, and 
I run weekly updates in dom0. That would explain why it consistently doesn't 
work for me.

I guess I'll just have to wait for it to become stable.

Nando.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9478ccd4-189e-420d-a00c-36e1af04f2a7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS screensharing

2019-04-25 Thread brendan . hoar
On Thursday, April 25, 2019 at 1:54:38 PM UTC-4, Fernando wrote:
> The fix from Marmarek worked for me as soon as it was released, but then 
> after a few updates (I don't remember exactly when) it stopped working for me.
> 
> Do you have any suggestions on where I can start looking to debug this issue? 
> From what I see, no one else has reported problems.

Is release repo up to date with the related changes from testing?

I'm using testing and it worked on and off recently, but worked ok the last two 
attempts. Hard to pin down, though, as I'm updating dom0 daily-ish.

Just tried a few device attach/detach/attach/VM restart/VM start/attach of an 
ISOstick with -testing updates and it seems to be working today...

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fafde20d-d111-4ab2-bea6-ce605d3078f5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS screensharing

2019-04-25 Thread Fernando
On Tuesday, December 11, 2018 at 2:00:56 PM UTC-3, Dave C wrote:
> On Thursday, October 18, 2018 at 5:52:31 AM UTC-7, Vít Šesták wrote:
> > Marmarek has identified the issue and fixed it: 
> > https://github.com/QubesOS/qubes-issues/issues/4351
> > 
> 
> I haven't been vocal on this thread in a while... but I appreciate the 
> comments from v6ak and the bugfix from Marmarek.
> 
> I had a moment to update my blog post about screensharing in Qubes: 
> https://www.dave-cohen.com/blog/qubes-vnc-screenshare/, please check it out 
> if interested.  I welcome any constructive feedback.
> 
> Cheers, -Dave

The fix from Marmarek worked for me as soon as it was released, but then after 
a few updates (I don't remember exactly when) it stopped working for me.

Do you have any suggestions on where I can start looking to debug this issue? 
From what I see, no one else has reported problems.

Thanks, 

Nando.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9542060b-6ba1-4b4c-9f25-bea9916bc70e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Os 4.0 - problem with performance

2019-04-11 Thread Cranix
Ad swap: on my laptop i did not created any swap to limit amount of
writes on SSD. On desktop i have created resonable swap, so this is
rather not realted to this problem.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190412060510.GA12102%40hackerspace.pl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Os 4.0 - problem with performance

2019-04-11 Thread Cranix
On Wed, Apr 10, 2019 at 10:00:47PM +, john s. wrote:
> sorry, after I posted I read your full post , you have an AMD system
> 
> so maybe you don't have "intel speedstep"  , as it's apparently just intel
> 
> on AMD it's called  "cool n quiet"  if you have that  try turning it off
> 
> 
> problem is it will make your cpu  run  hotter,  hence monitoring cpu 
> temp and /or  increasing  fan speed to compensate
> 
> g'luck

I will look for that option. How this feature can hurt performance?
I do not see how this can cause problems...
Especially that qubes os 3.2 was working fine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2019045047.GA3569%40hackerspace.pl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Os 4.0 - problem with performance

2019-04-10 Thread 'awokd' via qubes-users

Cranix wrote on 4/10/19 6:02 PM:

When my machine boots i see
sp5100_tco: I/O address 0x0cd6 already in use
Can it be related to my performance problem?


No, that's a pretty common message. The
TBD: tbd_open_ex could not open file /var/lib/xenstored/tbd no such file
or directory
xen free = too small for satisy assignments! assigned_but_unused
lines are unusual, as is receiving 80% in use messages on a fresh 
install. Did you allocate the full drive to Qubes when you installed? 
Might need to reinstall if not.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7fb441b1-c9f2-6f37-007c-2c43747700fd%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Os 4.0 - problem with performance

2019-04-10 Thread Cranix
When my machine boots i see
sp5100_tco: I/O address 0x0cd6 already in use
Can it be related to my performance problem?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190410180223.GA10549%40hackerspace.pl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes Os 4.0 - problem with performance

2019-04-07 Thread Jon deps

On 4/7/19 7:40 PM, Cranix wrote:

By mistake i sent direct answer, not mail to list sorry for that.

I have checked logs and found
dom0 kernel: sp5100_tco: I/O address 0x0cd6 already in use
TBD: tbd_open_ex could not open file /var/lib/xenstored/tbd no such file
or directory
xen free = too small for satisy assignments! assigned_but_unused

both duckduckgo and google did not gave me answer what is going on.
systemd-analyze bleme shown me that AppVM needs 1 to 3 minutes to start,
rest of services was rather quick.

After installation performance of system was torelable, maybe not super
fast but it was usable. Right now i had to increase qrexec-timeout to 5
minutes to be able to launch AppVM.

I had also noticed warning in logs that it's running out of storate
about 80% full.

So this is rather software related issue, not a hardware one?



for me, the culprit was the "speedstep" in the bios/uefi,  if you have 
that try it with and without,  and maybe turn up your cpu fan speeds if 
you have that option


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3c27cc1e-e514-9cf5-635c-9234ce84bf5c%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes Os

2019-02-06 Thread 'Frédéric ASDRUBAL' via qubes-users
Merci bcp

Toda (Hb)

_
Frédéric ASDRUBAL
fasdru...@pm.me
[Simple plan de Salut](https://www.godssimpleplan.org/languages-in-print)

Sent with [ProtonMail](https://protonmail.com) Secure Email.

‐‐‐ Original Message ‐‐‐
Le mercredi 6 février 2019 09:06, Frédéric Pierret 
 a écrit :

> Hi,
>
> Even if I can answer the question in French, please ask to the list first 
> instead of me directly for such question as other will probably be interested 
> by your question.
>
> Currently, as far as I know (please Andrew confirm), there is only 
> documentation in English.
>
> French:
>
> "De ce que je sais, il n'existe pas de documentation à l'heure actuelle en 
> français."
>
> Best,
>
> Frédéric
>
> On 2/6/19 2:01 PM, Frédéric ASDRUBAL wrote:
>
>> Bonjour,
>> Est-il possible de trouver de la doc sur Qubes Os en français ?
>> Merci
>>
>> _
>> Frédéric ASDRUBAL
>> fasdru...@pm.me
>> [Simple plan de Salut](https://www.godssimpleplan.org/languages-in-print)
>>
>> Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5OBMvU9euBGv_d3hngBREYifKI5C5-uWuw-xWpqUmCudYxh2Zp_rl3m1O78SC6S5YZmRVouRrmYAxnaW-gKpU3A2hvmcY22T75PilenECg%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes Os

2019-02-06 Thread Frédéric Pierret
Hi,

Even if I can answer the question in French, please ask to the list
first instead of me directly for such question as other will probably be
interested by your question.

Currently, as far as I know (please Andrew confirm), there is only
documentation in English.

French:

"De ce que je sais, il n'existe pas de documentation à l'heure actuelle
en français."

Best,

Frédéric

On 2/6/19 2:01 PM, Frédéric ASDRUBAL wrote:
> Bonjour,
> Est-il possible de trouver de la doc sur Qubes Os en français ?
> Merci
>
> _
> *Frédéric ASDRUBAL*
> /fasdru...@pm.me /
> Simple plan de Salut 
>
> Sent with ProtonMail  Secure Email.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c9dbf3ec-281e-1eb3-c884-73240e11a87a%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Re: Qubes OS 4.0.1 has been released!

2019-01-09 Thread Lorenzo Lamas
On Wednesday, January 9, 2019 at 11:11:31 AM UTC+1, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Wed, Jan 09, 2019 at 01:35:42AM -0800, Lorenzo Lamas wrote:
> > I see the hashes are different to 4.0.1-RC2 What has changed compared to 
> > RC2?
> 
> Minor fix to update widget[1] plus a rebuild with "4.0.1" as a version,
> instead of "4.0.1-rc2".
> 
> [1] https://github.com/QubesOS/qubes-issues/issues/4667
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> 
> iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlw1yMsACgkQ24/THMrX
> 1ywoBAf+Nad/7dZEMepMvmLeWjAbKpFF2P1wM9bVHwRY3j+ZB0ahCmRntAN1soeC
> 1p3A7eppOGIfr5IuhtozeBim/ZdswT1fc/zLPG4UCIfr4Oo0SbZpfI7THijHoc5u
> PgmAOu2FGzQ3IwufkFp74b6pN+MiP2MP1aCabKBCA8kF0am24buism5VBZoBwblT
> umQGYePGSEFepPN1qbPGbYzy/+Z+aVXOIBdxT61RSQteB8yGJLz+kwmaoOlO6o0r
> oTYGaCD8TNvzJFarnaa5/xPvBCptL7BecsbZkn6gNzKNTI3+gT++hMbQ6AJIYatv
> sKHmHKC4ti1PW6DBJxNLX6unMNTwVg==
> =LZWx
> -END PGP SIGNATURE-

Thanks for the reply! And also thanks for the 4.0.1 release, this has made it 
easier for me to migrate from 3.2.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/36da0d17-8ffc-47be-9174-f6cde9e25152%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] RE: Qubes OS 4.0.1 fresh install reboot halt

2019-01-09 Thread Robert Rettig
Solved with the help of: https://www.qubes-os.org/doc/uefi-troubleshooting/

```
mapbs=1
noexitboot=1
```

From: qubes-users@googlegroups.com  On Behalf Of 
Robert Rettig
Sent: Wednesday, 9 January 2019 14:38
To: qubes-users@googlegroups.com
Subject: [qubes-users] RE: Qubes OS 4.0.1 fresh install reboot halt


Maybe I should add some options to XEN.CFG?
Current File:
```
[global]
default=4.14.74-1.pvops.qubes.x86_64

[4.14.74-1.pvops.qubes.x86_64]
options=loglvl=all dom0_mem=min:1024M dom0_mem=max:4096M iommu=no-igfx 
ucode=scan smt=off
kernel=vmlinuz-4.14.74-1.pvops.qubes.x86_64 root=/dev/mapper/qubes_dom0-root 
rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap i915.alpha_support=1 rhgb 
quiet
ramdisk=initramfs-4.14.74-1.pvops.qubes.x86_64.img
```
Maybe console=vga … ?
https://wiki.xen.org/wiki/Xen_EFI


From: mailto:qubes-users@googlegroups.com <mailto:qubes-users@googlegroups.com> 
On Behalf Of Robert Rettig
Sent: Wednesday, 9 January 2019 14:31
To: mailto:qubes-users@googlegroups.com
Subject: [qubes-users] Qubes OS 4.0.1 fresh install reboot halt

Hello,

just used the new release
https://groups.google.com/d/msg/qubes-users/qbu6fL1FBk0/Kdu0g43bAgAJ

For reproduction I always use wipefs to cleanup the target disk before 
installation.
I tested 2 times, because I have another disk in the system.
1. enabled
2. disabled
the second disk from BIOS. The target disk is always /dev/sda in both cases.

The installation media is transferred to an usb flash storage.
The installation proceeds without errors.
After clicking on reboot the machine reboots as expected.
There is a short info about the Xen Kernel, than screen is blank.
The CPU cooler fan is getting loud and no keyboard hit is accepted anymore ( 
“Ctrl Alt PrintScr rseinub” is not working too ).

Is it possible to boot the usb flash storage as a rescue media?
Otherwise I have some additional rescue media like knoppix …
I do not have any hints because the screen is blank.

Thanks
Robert
-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to mailto:qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to mailto:qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/AM0PR04MB59069B8A01E2ED57472994C7D28B0%40AM0PR04MB5906.eurprd04.prod.outlook.com?utm_medium=email&utm_source=footer.
For more options, visit https://groups.google.com/d/optout.
-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to mailto:qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to mailto:qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/AM0PR04MB590637CF500680A13C4FF115D28B0%40AM0PR04MB5906.eurprd04.prod.outlook.com?utm_medium=email&utm_source=footer.
For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/AM0PR04MB5906E25E4DFF44EE108450D7D28B0%40AM0PR04MB5906.eurprd04.prod.outlook.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] RE: Qubes OS 4.0.1 fresh install reboot halt

2019-01-09 Thread Robert Rettig

Maybe I should add some options to XEN.CFG?
Current File:
```
[global]
default=4.14.74-1.pvops.qubes.x86_64

[4.14.74-1.pvops.qubes.x86_64]
options=loglvl=all dom0_mem=min:1024M dom0_mem=max:4096M iommu=no-igfx 
ucode=scan smt=off
kernel=vmlinuz-4.14.74-1.pvops.qubes.x86_64 root=/dev/mapper/qubes_dom0-root 
rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap i915.alpha_support=1 rhgb 
quiet
ramdisk=initramfs-4.14.74-1.pvops.qubes.x86_64.img
```
Maybe console=vga … ?
https://wiki.xen.org/wiki/Xen_EFI


From: qubes-users@googlegroups.com  On Behalf Of 
Robert Rettig
Sent: Wednesday, 9 January 2019 14:31
To: qubes-users@googlegroups.com
Subject: [qubes-users] Qubes OS 4.0.1 fresh install reboot halt

Hello,

just used the new release
https://groups.google.com/d/msg/qubes-users/qbu6fL1FBk0/Kdu0g43bAgAJ

For reproduction I always use wipefs to cleanup the target disk before 
installation.
I tested 2 times, because I have another disk in the system.

  1.  enabled
  2.  disabled
the second disk from BIOS. The target disk is always /dev/sda in both cases.

The installation media is transferred to an usb flash storage.
The installation proceeds without errors.
After clicking on reboot the machine reboots as expected.
There is a short info about the Xen Kernel, than screen is blank.
The CPU cooler fan is getting loud and no keyboard hit is accepted anymore ( 
“Ctrl Alt PrintScr rseinub” is not working too ).

Is it possible to boot the usb flash storage as a rescue media?
Otherwise I have some additional rescue media like knoppix …
I do not have any hints because the screen is blank.

Thanks
Robert
--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to 
qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to 
qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/AM0PR04MB59069B8A01E2ED57472994C7D28B0%40AM0PR04MB5906.eurprd04.prod.outlook.com.
For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/AM0PR04MB590637CF500680A13C4FF115D28B0%40AM0PR04MB5906.eurprd04.prod.outlook.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0.1 has been released!

2019-01-09 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Jan 09, 2019 at 01:35:42AM -0800, Lorenzo Lamas wrote:
> I see the hashes are different to 4.0.1-RC2 What has changed compared to RC2?

Minor fix to update widget[1] plus a rebuild with "4.0.1" as a version,
instead of "4.0.1-rc2".

[1] https://github.com/QubesOS/qubes-issues/issues/4667

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlw1yMsACgkQ24/THMrX
1ywoBAf+Nad/7dZEMepMvmLeWjAbKpFF2P1wM9bVHwRY3j+ZB0ahCmRntAN1soeC
1p3A7eppOGIfr5IuhtozeBim/ZdswT1fc/zLPG4UCIfr4Oo0SbZpfI7THijHoc5u
PgmAOu2FGzQ3IwufkFp74b6pN+MiP2MP1aCabKBCA8kF0am24buism5VBZoBwblT
umQGYePGSEFepPN1qbPGbYzy/+Z+aVXOIBdxT61RSQteB8yGJLz+kwmaoOlO6o0r
oTYGaCD8TNvzJFarnaa5/xPvBCptL7BecsbZkn6gNzKNTI3+gT++hMbQ6AJIYatv
sKHmHKC4ti1PW6DBJxNLX6unMNTwVg==
=LZWx
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190109101123.GB7536%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0.1 has been released!

2019-01-09 Thread Lorenzo Lamas
On Wednesday, January 9, 2019 at 3:49:32 AM UTC+1, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> Dear Qubes Community,
> 
> We're pleased to announce the release of Qubes 4.0.1! This is the first
> stable point release of Qubes 4.0. It includes many updates over the
> initial 4.0 release, in particular:
> 
>  - All 4.0 dom0 updates to date, including a lot of bug fixes and
>improvements for GUI tools
>  - Fedora 29 TemplateVM
>  - Debian 9 TemplateVM
>  - Whonix 14 Gateway and Workstation TemplateVMs
>  - Linux kernel 4.14
> 
> Qubes 4.0.1 is available on the [Downloads] page.
> 
> 
> What is a point release?
> - 
> 
> A point release does not designate a separate, new version of Qubes OS.
> Rather, it designates its respective major or minor release (in this
> case, 4.0) inclusive of all updates up to a certain point. Installing
> Qubes 4.0 and fully updating it results in the same system as installing
> Qubes 4.0.1.
> 
> 
> What should I do?
> - -
> 
> If you're currently using an up-to-date Qubes 4.0 installation
> (including updated Fedora 29, Debian 9, and Whonix 14 templates), then
> your system is already equivalent to a Qubes 4.0.1 installation. No
> action is needed.
> 
> Similarly, if you're currently using a Qubes 4.0.1 release candidate
> (4.0.1-rc1 or 4.0.1-rc2), and you've followed the standard procedure for
> keeping it up-to-date, then your system is equivalent to a 4.0.1 stable
> installation, and no additional action is needed.
> 
> If you're currently using Qubes 4.0 but don't have these new templates
> installed yet, we recommend that you follow the appropriate
> documentation to do so:
> 
>  - [Fedora 29]
>  - [Debian 9]
>  - [Whonix 14]
> 
> Regardless of your current OS, if you wish to install (or reinstall)
> Qubes 4.0 for any reason, then the 4.0.1 ISO will make this more
> convenient and secure, since it bundles all Qubes 4.0 updates to date.
> It will be especially helpful for users whose hardware is too new to be
> compatible with the original Qubes 4.0 installer.
> 
> 
> [Downloads]: https://www.qubes-os.org/downloads/
> [Fedora 29]: https://www.qubes-os.org/doc/template/fedora/upgrade-28-to-29/
> [Debian 9]: https://www.qubes-os.org/doc/template/debian/upgrade-8-to-9/
> [Whonix 14]: https://www.whonix.org/wiki/Upgrading_Whonix_13_to_Whonix_14
> 
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2019/01/09/qubes-401/
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> 
> iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlw1YTUACgkQ24/THMrX
> 1ywKSgf/RepKuj8klzDbi3G566MRg6XaF6GgVKYtt8xa9PX5w3yk+3j0n26zsW07
> fsO4iJQtn4xt4nUDkIkY0ZaFuLXiXes6syLsu2mJ5dhB23C6C07No1tbeJ0GqzmJ
> G5TbCsXpTGnTH8URSyb0U0aB2C6dIAwQZUom+HaDgb/x6M6OWAwODhVV/hbFzhm/
> msWu6Xy1rVcbaAB2Q2YLGGIShwx3cd5I/K6y0Lw+9sWhIZ8lj4ARfdnWzqGp5u2+
> YYVMtRDGBWGm2o5Wu/gmduYNjRpkDSoE2qh5bUvubRm7TWK0HDkTCHvqyGTQXaZZ
> mGbhYdSlxM1N4Qm5YuyYMcGd1qUKQg==
> =8aly
> -END PGP SIGNATURE-

I see the hashes are different to 4.0.1-RC2 What has changed compared to RC2?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a1101cec-3133-4c93-bfb1-b979efcda0ec%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS screensharing

2018-12-11 Thread Dave C
On Thursday, October 18, 2018 at 5:52:31 AM UTC-7, Vít Šesták wrote:
> Marmarek has identified the issue and fixed it: 
> https://github.com/QubesOS/qubes-issues/issues/4351
> 

I haven't been vocal on this thread in a while... but I appreciate the comments 
from v6ak and the bugfix from Marmarek.

I had a moment to update my blog post about screensharing in Qubes: 
https://www.dave-cohen.com/blog/qubes-vnc-screenshare/, please check it out if 
interested.  I welcome any constructive feedback.

Cheers, -Dave

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/56a60b96-eb1d-4134-9673-708ee694af03%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 3.2.1-rc1 has been released!

2018-11-30 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 11/30/18 7:03 PM, unman wrote:
> On Thu, Nov 29, 2018 at 08:28:59PM -0800, Steve Phillips wrote:
>>> If you're currently using an up-to-date Qubes 3.2 installation,
>>> then your system is already equivalent to a Qubes 3.2.1
>>> installation. No action is needed.
>> 
>> Are you sure? I am on Qubes 3.2 and have installed all updates,
>> yet whenever I boot up I still receive a warning about using
>> Whonix 13 rather than 14. And when I go to create a new VM, my
>> options of TemplateVM include Debian 8 and Fedora 23, but not
>> Debian 9 nor Fedora 29.
>> 
>> Is there something we can do to force such an upgrade? Thanks.
>> 
> 
> If you have installed all updates, then your system has all the
> packages that a 3.2.1 install would have, but you have to
> separately install the templates. There is a comprehensive guide on
> upgrading from Whonix 13 to Whonix 14. For Debian 9 just 'sudo
> qubes-dom0-update qubes-template-debian-9'. Then update that
> template, clone and reconfigure as needed. Then change your qubes
> to use the new template instead of debian-8. You can do this easily
> using a batch script looping over relevant qube names. Once done
> you can delete the old template(s).
> 
> unman
> 

Yes. Part of updating a Qubes system is updating TemplateVMs (not just
dom0).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=h4Xq
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e6ba025f-6e51-29a3-50bc-98ab84f5dc16%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 3.2.1-rc1 has been released!

2018-11-30 Thread unman
On Thu, Nov 29, 2018 at 08:28:59PM -0800, Steve Phillips wrote:
> > If you're currently using an up-to-date Qubes 3.2 installation, then 
> > your system is already equivalent to a Qubes 3.2.1 installation. No 
> > action is needed.
> 
> Are you sure? I am on Qubes 3.2 and have installed all updates, yet whenever 
> I boot up I still receive a warning about using Whonix 13 rather than 14. And 
> when I go to create a new VM, my options of TemplateVM include Debian 8 and 
> Fedora 23, but not Debian 9 nor Fedora 29.
> 
> Is there something we can do to force such an upgrade? Thanks.
> 

If you have installed all updates, then your system has all the packages
that a 3.2.1 install would have, but you have to separately install the
templates.
There is a comprehensive guide on upgrading from Whonix 13 to Whonix 14.
For Debian 9 just 'sudo qubes-dom0-update qubes-template-debian-9'. Then
update that template, clone and reconfigure as needed.
Then change your qubes to use the new template instead of debian-8. You
can do this easily using a batch script looping over relevant qube
names.
Once done you can delete the old template(s).

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181201010353.q6t5imhtesw6ydmn%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 3.2.1-rc1 has been released!

2018-11-29 Thread Steve Phillips
> If you're currently using an up-to-date Qubes 3.2 installation, then 
> your system is already equivalent to a Qubes 3.2.1 installation. No 
> action is needed.

Are you sure? I am on Qubes 3.2 and have installed all updates, yet whenever I 
boot up I still receive a warning about using Whonix 13 rather than 14. And 
when I go to create a new VM, my options of TemplateVM include Debian 8 and 
Fedora 23, but not Debian 9 nor Fedora 29.

Is there something we can do to force such an upgrade? Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7c87694a-2a5e-4275-a2a9-0a15de900ba7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 3.2.1-rc1 has been released!

2018-10-29 Thread Lorenzo Lamas
Any ETA on 4.0.1 yet?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a0499f5-d653-4ea7-ba57-7c248694f70e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS screensharing

2018-10-18 Thread Vít Šesták
Marmarek has identified the issue and fixed it: 
https://github.com/QubesOS/qubes-issues/issues/4351

So if you are patient, you can just wait until you see it in current 
repository. (There will be likely Gihtub comment.)

If you are eager, you can wait until it is in testing repository. (Again, we 
will probably see a Github comment.)

If you are supereager, you can compile it yourself 😉

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4438d31f-d9df-448c-b4cd-f62baafb27e8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS dual boot question

2018-08-14 Thread Patrick Bouldin
On Monday, August 13, 2018 at 4:17:31 PM UTC-4, Patrick Bouldin wrote:
> I have a goal to buy a new laptop, preconfigured with Windows, and then 
> within Windows I will reallocate disk space in order to install Qubes4.0.
> 
> In the past with prior versions of Qubes that has sometimes been problematic, 
> is that fixed with 4.0 or still a problem?
> 
> Any input on how to proceed?
> 
> One data point, while I can recreate windows it's a pain in the butt to get 
> the licensing back on the machine. I can do it, but would like to avoid it.
> 
> Thanks,
> Patrick

Hello, Sphere - apologies, I didn't recognize the help you were giving me was 
tactually a better approach than dual boot. Thanks for that. Also, I just have 
to find the details on how I'd approach that solution. If I get a laptop that's 
preloaded with the SSD+HDD already then I would need to unwind that. Perhaps 
should just by something that has the SSD already, and add the HDD - but then I 
need to find the details on how to boot to either one.

Thanks again.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4857e886-6b24-4353-a527-8d996c174166%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS dual boot question

2018-08-13 Thread Patrick Bouldin

> If you really want to insist on dual boot however, sad to say but I can't 
> help you with that.

Ok, thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/742a56a5-e62a-49c8-ad45-621fe69a90ab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS dual boot question

2018-08-13 Thread Sphere
On Tuesday, August 14, 2018 at 4:17:31 AM UTC+8, Patrick Bouldin wrote:
> I have a goal to buy a new laptop, preconfigured with Windows, and then 
> within Windows I will reallocate disk space in order to install Qubes4.0.
> 
> In the past with prior versions of Qubes that has sometimes been problematic, 
> is that fixed with 4.0 or still a problem?
> 
> Any input on how to proceed?
> 
> One data point, while I can recreate windows it's a pain in the butt to get 
> the licensing back on the machine. I can do it, but would like to avoid it.
> 
> Thanks,
> Patrick

Question: What's your purpose for using Qubes? Usually the answer is to have 
very-high level of security. This purpose however, is ultimately defeated once 
you do OS dual boot as your Qubes installation could be easily 
infiltrated/modified in the context of the Windows OS that you have dual-booted.

So I suggest having two HDDs or one HDD and one M.2/SATA PCI SSD in your laptop 
to effectively separate the Windows OS and Qubes OS(By setting a password on 
the HDD/SSD where Qubes is installed and not entering it when booting on the 
Windows OS (To effectively protect the UEFI boot partition and also a tag-team 
protection with LUKS encryption).

If you really want to insist on dual boot however, sad to say but I can't help 
you with that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37b79503-dc99-40e1-ba10-178ce5f2f221%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: (Qubes OS 4.0) Anyone that built a Ubuntu Xenial template successfully?

2018-05-05 Thread max . militant
tirsdag den 1. maj 2018 kl. 14.17.41 UTC+2 skrev Frank Schäckermann:
>> I wish I knew how to fix it... I tried the sugested "dpkg-source --commit" 
>> in various places but to no avail and I don't understand the build process 
>> good enough to figure out, what EXACTLY is going wrong here.

The documentation says it works with xenial, so maybe an early xenial iso 
version might do, and then upgrade within?

https://www.qubes-os.org/doc/templates/ubuntu/

Max

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b5d5f5c8-e8e6-482f-8d55-884cdb22edc5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: (Qubes OS 4.0) Anyone that built a Ubuntu Xenial template successfully?

2018-05-01 Thread Frank Schäckermann
On Wednesday, April 18, 2018 at 10:00:19 PM UTC+2, Christoffer Lilja wrote:
> I've tried to build a Ubuntu Xenial template on Qubes OS 4.0 but I get this 
> error:
> dpkg-source: info: using options from core-agent-linux/debian/source/options: 
> --extend-diff-ignore=(^|/)(.git/.*)$ --extend-diff-ignore=(^|/)(deb/.*)$ 
> --extend-diff-ignore=(^|/)(pkgs/.*)$ --extend-diff-ignore=(^|/)(rpm/.*)$
> dpkg-source: info: using source format '3.0 (quilt)'
> dpkg-source: info: building qubes-core-agent using existing 
> ./qubes-core-agent_4.0.24.orig.tar.gz
> dpkg-source: warning: executable mode 0775 of 'qubes-rpc/qvm-open-in-dvm' 
> will not be represented in diff
> dpkg-source: info: local changes detected, the modified files are:
>  core-agent-linux/qubes-rpc/qvm-open-in-dvm
> dpkg-source: error: aborting due to unexpected upstream changes, see 
> /tmp/qubes-core-agent_4.0.24-1+xenialu1.diff.raLTJa
> dpkg-source: info: you can integrate the local changes with dpkg-source 
> --commit
> dpkg-buildpackage: error: dpkg-source -b core-agent-linux gave error exit 
> status 2
> make[2]: *** 
> [/home/user/qubes-builder/qubes-src/builder-debian/Makefile.qubuntu:215: 
> dist-package] Error 2
> make[1]: *** [Makefile.generic:166: packages] Error 1
> make: *** [Makefile:212: core-agent-linux-vm] Error 1
> 
> Does someone know how to solve this?


The same error happens for Qubes OS 3.2! Thus I can't build the latest qubes 
deb files for my xenial template that is now running with more and more old 
versions of core-agent  etc.   :-(

I wish I knew how to fix it... I tried the sugested "dpkg-source --commit" in 
various places but to no avail and I don't understand the build process good 
enough to figure out, what EXACTLY is going wrong here.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f5387726-08d8-499d-ad4d-e066a2713bf9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: (Qubes OS 4.0) Anyone that built a Ubuntu Xenial template successfully?

2018-04-21 Thread sdika
On Wednesday, April 18, 2018 at 4:00:19 PM UTC-4, Christoffer Lilja wrote:
> I've tried to build a Ubuntu Xenial template on Qubes OS 4.0 but I get this 
> error:
> dpkg-source: info: using options from core-agent-linux/debian/source/options: 
> --extend-diff-ignore=(^|/)(.git/.*)$ --extend-diff-ignore=(^|/)(deb/.*)$ 
> --extend-diff-ignore=(^|/)(pkgs/.*)$ --extend-diff-ignore=(^|/)(rpm/.*)$
> dpkg-source: info: using source format '3.0 (quilt)'
> dpkg-source: info: building qubes-core-agent using existing 
> ./qubes-core-agent_4.0.24.orig.tar.gz
> dpkg-source: warning: executable mode 0775 of 'qubes-rpc/qvm-open-in-dvm' 
> will not be represented in diff
> dpkg-source: info: local changes detected, the modified files are:
>  core-agent-linux/qubes-rpc/qvm-open-in-dvm
> dpkg-source: error: aborting due to unexpected upstream changes, see 
> /tmp/qubes-core-agent_4.0.24-1+xenialu1.diff.raLTJa
> dpkg-source: info: you can integrate the local changes with dpkg-source 
> --commit
> dpkg-buildpackage: error: dpkg-source -b core-agent-linux gave error exit 
> status 2
> make[2]: *** 
> [/home/user/qubes-builder/qubes-src/builder-debian/Makefile.qubuntu:215: 
> dist-package] Error 2
> make[1]: *** [Makefile.generic:166: packages] Error 1
> make: *** [Makefile:212: core-agent-linux-vm] Error 1
> 
> Does someone know how to solve this?

I also tried and failed with similar errors. I wish there was an update for 
this, it isn't up to date with the documentation. When you pull system build 
from git and run the setup script it won't let you select one template. You 
have to select fedora, debian and salt to get to the next screen where you can 
select ubuntu.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4bb6fc24-dd76-48da-81a7-35bda1a81ed1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS Stable Release 3.2. (Cant up-date template to fedora-26 or fedora-27)

2018-04-04 Thread max via qubes-users
Den mandag den 26. februar 2018 kl. 11.23.57 UTC+1 skrev spud12...@gmail.com:
> Hey,
> 
> I've installed Qubes OS and I'm having trouble installing the fedora-26 and 
> fedora-27 template. I've tried minimal and the full 1.5 G I believe. The 
> template is downloading but I'm getting an error when it attempts to install. 
> the temple. 
> 
> "Failed to synchronize cache for repo 'qubes-dom0-cached' -disabling
> 
> I've installed the 3.2 Release stable from qubes-OS web-site.
> 
> Any one able too help.
> 
> 
> Thanks.

I actually used the upgrade guide on qubes-os homepage to use fedora-27 :
- https://www.qubes-os.org/doc/template/fedora/upgrade-25-to-26/

and switched the numbers. It requires editing the qubes repository file, 
changing "fc$releasever" or something just to fc26, then it works with 27. No 
guaranteees though :) since it's not tested, I guess.

I made a guide mostly for myself, if I have to do it all over again :)
https://www.militant.dk/2018/04/04/cloning-fedora-26-to-fedora-27-template-qubes-3-2/

The template seems to work for me, but I'm a not a demanding user, and only did 
it for the KeePassXC version upgrade.

Sincerely
Max

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/00d66b9a-673a-4658-ae50-260709d2d54f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0 has been released!

2018-04-01 Thread Amilton Justino
Em quarta-feira, 28 de março de 2018 13:36:46 UTC-4, Andrew David Wong  
escreveu:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> After nearly two years in development and countless hours of testing,
> we're pleased to announce the stable release of Qubes OS 4.0!
> 
> 
> Major changes in version 4.0
> 
> 
> Version 4.0 includes several fundamental improvements to the security
> and functionality of Qubes OS:
> 
>  * The Qubes Admin API [01]
>  * Qubes Core Stack version 3 [02]
>  * Fully virtualized VMs for enhanced security [03]
>  * Multiple, flexible Disposable VM templates [04]
>  * A more expressive, user-friendly Qubes RPC policy system [05]
>  * A powerful new VM volume manager that makes it easy to keep VMs on
>external drives [06]
>  * Enhanced TemplateVM security via split packages [07] and network
>interface removal [08]
>  * More secure backups with scrypt for stronger key derivation [09] and
>enforced encryption
>  * Rewritten command-line tools with new options [10]
> 
> This release delivers on the features we promised in our announcement of
> Qubes 4.0-rc1 [11], with some course corrections along the way, such as
> the switch from HVM to PVH for most VMs in response to Meltdown and
> Spectre [03]. For more details, please see the full Release Notes [12].
> The Qubes 4.0 installation image is available on the Downloads [13]
> page, along with the complete Installation Guide [14].
> 
> 
> Current 4.0 release candidate users
> ===
> 
> In our Qubes 4.0-rc5 announcement [15], we explained that if the testing
> of 4.0-rc5 did not reveal any major problems, we would declare it to be
> the stable 4.0 release without any further significant changes and that,
> in this scenario, any bugs discovered during the testing process would
> be fixed in subsequent updates. This is, in fact, what has occurred. We
> found that, with the fifth release candidate, 4.0 had finally reached a
> level of stability that met our standards such that we were comfortable
> designating it the stable release. Accordingly, current users of 4.0-rc5
> can upgrade in-place by downloading the latest updates from the *stable*
> repositories in both dom0 [16] and TemplateVMs [17].
> 
> We know that this stable release has been a long time in coming for many
> you. We sincerely appreciate your patience. Thank you for sticking with
> us. We're especially grateful to all of you who have contributed code
> [18] and documentation [19] to this release, tested [20] release
> candidates, and diligently reported bugs [21]. This stable release would
> not have been possible without your efforts. Your involvement makes
> Qubes a truly open-source project. Your energy, skill, and good will
> make this project a joy to work on. We are lucky to have you.
> 
> 
> The past and the future
> ===
> 
> Since first announcing extended support for Qubes 3.2 [22], we
> determined that users would be better served by having a version of
> Qubes 3.2 with updated TemplateVMs and a newer kernel. We've designated
> this release Qubes 3.2.1. As the name suggests, this is a point release
> for Qubes 3.2 that does not contain any major changes, and it is this
> release to which the extended support period will apply. We intend for
> Qubes 3.2.1 to be a viable alternative to version 4.0 for those who wish
> to use Qubes on hardware that does not meet the system requirements for
> Qubes 4.0 [23]. While our standard policy [24] is to support each Qubes
> release for six months after the next major or minor release, the
> special extension for 3.2.1 raises this period to one full year.
> Therefore, the stable release of Qubes 4.0 sets the EOL (end-of-life)
> date for Qubes 3.2.1 at one year from today on 2019-03-28. We expect
> 3.2.1 to be available soon, after Kernel 4.9 testing is completed.
> 
> Looking forward, our work on Qubes 4.x has only just begun. Our sights
> are now set on Qubes 4.1, for which we have a growing list [25] of
> planned enhancements to nearly every aspect of Qubes OS. Whether you're
> new to Qubes or have been here for years, we welcome you to join us and
> get involved [26]. We've personally chosen to devote our time and skills
> to making Qubes freely available to the world because we believe that
> being open-source is essential to Qubes being trustworthy and secure. If
> Qubes is valuable to you, we ask that you please consider making a
> donation [27] to the project. With your support, we can continue to make
> reasonable security a reality for many years to come.
> 
> 
> [01] https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/
> [02] https://www.qubes-os.org/news/2017/10/03/core3/
> [03] 
> https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-037-2018.txt
> [04] https://github.com/QubesOS/qubes-issues/issues/2253
> [05] 
> https://www.qubes-os.org/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later
> [06] https

[qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-11 Thread Yuraeitha
On Sunday, March 11, 2018 at 6:30:58 PM UTC+1, Dave wrote:
> I just used System Tools, Qubes Manager UPDATE (down arrow) for DOM0 and each 
> template without keying terminal commands. It appears to have worked, so I 
> assume that RC4 already included testing repo

yeah, if it's anything like it was back in Qubes 3.2. (I'd assume so), then 
these updates in the Qube Manager are stable updates. Once current-testing 
updates are deemed tested and stable after testers tried them out, they 
eventually migrate to stable repository. That's when you see them in the Qube 
Manager (or via normal update commands, not the current-testing ones). 

So I assume they must have been moved from testing to stable now? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7211e67e-4483-43f8-a238-6d705749d47f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-11 Thread Dave
I just used System Tools, Qubes Manager UPDATE (down arrow) for DOM0 and each 
template without keying terminal commands. It appears to have worked, so I 
assume that RC4 already included testing repo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9349ad32-5fda-463e-aeb9-df86463f6c73%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-10 Thread contact . diesel
Hey Guys, 

thx for your Summary. Nice Work!

Am Samstag, 10. März 2018 15:02:20 UTC+1 schrieb Yuraeitha:
> On Friday, March 9, 2018 at 10:36:49 PM UTC+1, contact...@gmail.com wrote:
> > Thx for the great description and tips. I think I updated everything. Is 
> > there a way to check if  rc5 is active? 
> > 
> > One other thing:
> > When my system booted. TOR is connected but I get an gui error message from 
> > sys-whonix:
> > 
> > System clock check result
> > Unexpected result by timedatectl
> > Timedatectl_output_pretty:
> > 
> > Local time and universal time are the same 
> > RTC time: n/a
> > Time zone: etc/utc ( utc, +)
> > NTP enabled: yes
> > NTP sychronized: no
> > Rtc in local TZ: no
> > DST active: N/A
> > 
> > Does someone has the same Issue?
> 
> I improved the update commands a bit after looking a bit around.
> 
> dom0
> sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --clean
> (or --check-only instead for dom0).
> 
> fedora
> sudo dnf update --enablerepo=qubes-vm-*-current-testing --refresh
> 
> debian/whonix
> sudo apt-get update -t *-testing && sudo apt-get dist-upgrade -t *-testing
> 
> This way, you don't need to edit any files for debian/whonix to get the 
> testing.
> If you also want to increase reliability further, you can make a 
> dependency/cache check with "sudo apt-get check", which is normally very 
> quick. For that do;
> 
> debian/whonix
> sudo apt-get check && sudo apt-get update -t *-testing && sudo apt-get 
> dist-upgrade -t *-testing
> 
> 
> It may be possible to further optimize the update commands, if anyone got 
> suggestions, please feel free to opt-in so that we can recommend better 
> update approaches in the future.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fc05379d-40ca-47d3-84a4-8e58a4f30327%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-10 Thread Yuraeitha
On Friday, March 9, 2018 at 10:36:49 PM UTC+1, contact...@gmail.com wrote:
> Thx for the great description and tips. I think I updated everything. Is 
> there a way to check if  rc5 is active? 
> 
> One other thing:
> When my system booted. TOR is connected but I get an gui error message from 
> sys-whonix:
> 
> System clock check result
> Unexpected result by timedatectl
> Timedatectl_output_pretty:
> 
> Local time and universal time are the same 
> RTC time: n/a
> Time zone: etc/utc ( utc, +)
> NTP enabled: yes
> NTP sychronized: no
> Rtc in local TZ: no
> DST active: N/A
> 
> Does someone has the same Issue?

I improved the update commands a bit after looking a bit around.

dom0
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --clean
(or --check-only instead for dom0).

fedora
sudo dnf update --enablerepo=qubes-vm-*-current-testing --refresh

debian/whonix
sudo apt-get update -t *-testing && sudo apt-get dist-upgrade -t *-testing

This way, you don't need to edit any files for debian/whonix to get the testing.
If you also want to increase reliability further, you can make a 
dependency/cache check with "sudo apt-get check", which is normally very quick. 
For that do;

debian/whonix
sudo apt-get check && sudo apt-get update -t *-testing && sudo apt-get 
dist-upgrade -t *-testing


It may be possible to further optimize the update commands, if anyone got 
suggestions, please feel free to opt-in so that we can recommend better update 
approaches in the future.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e5e9cd36-dc6a-499e-8f3f-46533a1b3aa1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-09 Thread Yuraeitha
On Friday, March 9, 2018 at 10:55:16 PM UTC+1, awokd wrote:
> On Fri, March 9, 2018 9:50 pm, Yuraeitha wrote:
> > On Friday, March 9, 2018 at 10:36:49 PM UTC+1, contact...@gmail.com
> > wrote:
> >
> >> Thx for the great description and tips. I think I updated everything.
> >> Is there a way to check if  rc5 is active?
> >>
> >>
> >> One other thing:
> >> When my system booted. TOR is connected but I get an gui error message
> >> from sys-whonix:
> >>
> >> System clock check result
> >> Unexpected result by timedatectl
> >> Timedatectl_output_pretty:
> >>
> >>
> >> Local time and universal time are the same
> >> RTC time: n/a
> >> Time zone: etc/utc ( utc, +)
> >> NTP enabled: yes
> >> NTP sychronized: no
> >> Rtc in local TZ: no
> >> DST active: N/A
> >>
> >>
> >> Does someone has the same Issue?
> >>
> >
> > Your welcome :)
> >
> >
> > I have exactly that issue whonix as well, but it's the first time I've
> > seen others having it. I haven't checked if it's on github yet though,
> > but so far we both have it.
> 
> It is in qubes-issues. Will be fixed with Whonix 14, which should be out
> soon.

That's good news, gonna have to keep track on when those new whonix updates are 
released then. Thanks awokd :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2cc8721-0a02-4b42-b386-c99449e94947%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-09 Thread 'awokd' via qubes-users
On Fri, March 9, 2018 9:50 pm, Yuraeitha wrote:
> On Friday, March 9, 2018 at 10:36:49 PM UTC+1, contact...@gmail.com
> wrote:
>
>> Thx for the great description and tips. I think I updated everything.
>> Is there a way to check if  rc5 is active?
>>
>>
>> One other thing:
>> When my system booted. TOR is connected but I get an gui error message
>> from sys-whonix:
>>
>> System clock check result
>> Unexpected result by timedatectl
>> Timedatectl_output_pretty:
>>
>>
>> Local time and universal time are the same
>> RTC time: n/a
>> Time zone: etc/utc ( utc, +)
>> NTP enabled: yes
>> NTP sychronized: no
>> Rtc in local TZ: no
>> DST active: N/A
>>
>>
>> Does someone has the same Issue?
>>
>
> Your welcome :)
>
>
> I have exactly that issue whonix as well, but it's the first time I've
> seen others having it. I haven't checked if it's on github yet though,
> but so far we both have it.

It is in qubes-issues. Will be fixed with Whonix 14, which should be out
soon.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6e9b71a787ec47b2097283c60616a8e9.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-09 Thread Yuraeitha
On Friday, March 9, 2018 at 10:36:49 PM UTC+1, contact...@gmail.com wrote:
> Thx for the great description and tips. I think I updated everything. Is 
> there a way to check if  rc5 is active? 
> 
> One other thing:
> When my system booted. TOR is connected but I get an gui error message from 
> sys-whonix:
> 
> System clock check result
> Unexpected result by timedatectl
> Timedatectl_output_pretty:
> 
> Local time and universal time are the same 
> RTC time: n/a
> Time zone: etc/utc ( utc, +)
> NTP enabled: yes
> NTP sychronized: no
> Rtc in local TZ: no
> DST active: N/A
> 
> Does someone has the same Issue?

Your welcome :)

I have exactly that issue whonix as well, but it's the first time I've seen 
others having it. I haven't checked if it's on github yet though, but so far we 
both have it. 

Also it seems some people have a graphical minor issue in the Qubes widget, 
where the update wheel for upstart/shutdown keeps spinning, and the log links 
stop working too. It doesn't seem to impact performance, but it can be a bit 
annoying having to use qvm-shutdown in dom0 to shutdown a VM properly, rather 
than pressing the kill command that appears in the widget bug. Well it works 
normally it seems, it's just a bit annoying bug. I think I've seen 4-5 people 
who is on RC-5 having it now, and it's also reported on github.

about checking if you're on RC-5, if you noticed during the update process 
which repository the updates came from (i.e. from current-testing in fedora 
updates), then you will know it pulled down the current-testing updates.

I'm not sure about a way to confirm it more directly though, that's actually an 
interesting question, I'd like to find a solution for that one as well.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/11aaa455-028b-4b67-bb91-b1fdee28ca76%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-09 Thread contact . diesel
Thx for the great description and tips. I think I updated everything. Is there 
a way to check if  rc5 is active? 

One other thing:
When my system booted. TOR is connected but I get an gui error message from 
sys-whonix:

System clock check result
Unexpected result by timedatectl
Timedatectl_output_pretty:

Local time and universal time are the same 
RTC time: n/a
Time zone: etc/utc ( utc, +)
NTP enabled: yes
NTP sychronized: no
Rtc in local TZ: no
DST active: N/A

Does someone has the same Issue?



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d6996a5-2c42-43ad-84fc-dc9f52272a66%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes os resolution issue

2018-03-09 Thread Yuraeitha
On Friday, March 9, 2018 at 9:28:33 PM UTC+1, sevas wrote:
> May I suggest installing the KDE5 desktop? 
> 
> In kali, I know that there is an options menu to change the zoom or something.
> 
> Its at the very bottom of the settings menu in Kali KDE desktop.

Is KDE confirmed working for Qubes 4 yet? The lack of mention of Qubes 4 in the 
KDE quide makes me a bit nervous, https://www.qubes-os.org/doc/kde/ but perhaps 
I don't need to be.

Though for example, does the KDE environment have the Qubes 4 widget and Qubes 
4 qvm-usb/qvm-block widget? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eb36942e-10b7-4d20-bd90-24c98f68fe69%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-09 Thread Yuraeitha
On Friday, March 9, 2018 at 9:14:43 PM UTC+1, contact...@gmail.com wrote:
> Can me someone explain which commands in which VM i have to use? I used the 
> following ones but i'm not sure if they are right.
> 
> In dom0: sudo qubes-dom0-update --enable=qubes*testing
> 
> In Template Fedora-26: sudo dnf -y update && sudo dnf -y upgrade 
> --enablerepo=qubes-vm-*-current-testing
> 
> In Template Debian-9: apt update && apt dist-upgrade
> 
> What about the --refresh flags. Where i have to put them? 
> 
> Thx

Don't use the --clean flag too often, but currently I'm not sure how --refresh 
works in dom0. If you didn't update within 48 hours previously, then you can 
ignore the use of --clean and --refresh altogether. Debian/Whonix doesn't need 
them. This should work if you updated recently;

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --clean
sudo dnf update --enablerepo=qubes-vm-*-current-testing --refresh

You don't need to use upgrade for fedora, check
https://forums.fedoraforum.org/showthread.php?313135-newbie-quot-dnf-update-quot-or-quot-dnf-upgrade-quot

Since I unfortunately don't know how to include repositories in apt commands, I 
can only tell you the bit longer way to do it. For all debian/Whonix VM's, you 
need to edit this file /etc/apt/sources.list.d/qubes-*.list I haven't found a 
way to just add it temporary in the command itself, so if you only need to 
temporarily access the current-testing, then you need to edit the files back 
again afterwards. For debian-9 it should be on the 6th line, the 
'stretch-testing main' repository. I believe whonix is still on jessie, instead 
of stretch. Once you edited the file and removed the # blocking 
'stretch-testing main', just update debian/whonix like you normally would. 
Debian/Whonix should also do the refresh correctly, I believe, so doesn't need 
a flag. Someone please correct me if I'm wrong about that.

After editing the debian/whonix files, run
sudo apt-get update && sudo apt-get dist-upgrade

Remember to revert back the edited files afterwards if you plan not to use 
current-testing repositories onwards, i.e. if you only want to upgrade to RC-5 
and stop current-testing repository updates after that.

Be careful by using the -y flag, if by some chance the cache or --refresh 
doesn't work, errors appear in the update but it still continues, or something 
along to that, then it may be worth it to keep watch during the update. 
Although maybe I'm just being too careful. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3fcd4d35-0817-4517-8b26-022ad5bb8dce%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes os resolution issue

2018-03-09 Thread sevas
May I suggest installing the KDE5 desktop? 

In kali, I know that there is an options menu to change the zoom or something.

Its at the very bottom of the settings menu in Kali KDE desktop. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe3b022c-8ffe-465d-a78f-69b516e08250%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-09 Thread contact . diesel
Am Freitag, 9. März 2018 21:14:43 UTC+1 schrieb contact...@gmail.com:
> Can me someone explain which commands in which VM i have to use? I used the 
> following ones but i'm not sure if they are right.
> 
> In dom0: sudo qubes-dom0-update --enable=qubes*testing
> 
> In Template Fedora-26: sudo dnf -y update && sudo dnf -y upgrade 
> --enablerepo=qubes-vm-*-current-testing
> 
> In Template Debian-9: apt update && apt dist-upgrade
> 
> What about the --refresh flags. Where i have to put them? 
> 
> Thx

PS: The Question is for the Upgrade von 4.0 RC4 to RC5!
How can i check if I'm on RC5?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/22e1ad59-d95d-4557-90fd-db0c379f58d3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-09 Thread contact . diesel
Can me someone explain which commands in which VM i have to use? I used the 
following ones but i'm not sure if they are right.

In dom0: sudo qubes-dom0-update --enable=qubes*testing

In Template Fedora-26: sudo dnf -y update && sudo dnf -y upgrade 
--enablerepo=qubes-vm-*-current-testing

In Template Debian-9: apt update && apt dist-upgrade

What about the --refresh flags. Where i have to put them? 

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b44c2d3f-4b89-49ed-824d-a93158cba20a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes os resolution issue

2018-03-09 Thread Yuraeitha
On Friday, March 9, 2018 at 6:56:25 PM UTC+1, randal...@gmail.com wrote:
> Hi there so I was finally able to get qubes installed to test if it actually 
> runs on my laptop (Razer stealth 2017) and there's some issue with the 
> display resolution. My resolution is 3200 x 1800 and that's fine, but when I 
> log into qubes everything looks extremely small and hard to read. I assume 
> it's because of how high the resolution is. how can I get the desktop to 
> display a bigger gui while keeping the resolution the same? I need baby 
> tutorials as I'm new to qubes. Thanks in advance!

This solution below only partly solves your issue as a temporary solution until 
you find a way to scale everything up (which is often a pain in other Linux's 
as well these days, even MS-Windows are facing issues these days...).
You can merge the idea awokd linked, to put it into autostart. 

Since Qubes/XFCE4 doesn't remember the resolution or other screen settings, you 
can use the below to fix it yourself. In addition it also gives you greater 
screen control beyond just "fixing it".

Below is the script I use my self when I connect my puny little tablet/laptop 
to my 4k TV. It obviously hates running dual-screen 4k (poor little thing), so 
I had to lower that resolution. I got two scripts, one for left and right too. 
Which makes it easy for me to change which side of the TV I put my 
tablet/laptop.

#!/bin/sh
xrandr --output HDMI1 --mode 1920x1080 --right-of eDP1

For example if your screen is named ur-screens-name, and it's only one screen 
you want to change settings for, then it should be something like this.

#!/bin/sh
xrandr --output ur-screens-name --mode 1920x1080 

Test if the command works first, in dom0 terminal.
You can find your screen name by writing 'xrandr -q' in your dom0 terminal. 
It'll list all screens currently connected, plus all their possible resolutions 
and refresh rates, which is also information you will need (don't copy my 
resolution, find one compatible in your list out-put here).

Now all you need to remember is to put the command in a script file, i.e. use 
nano or another editor to create the script, and remember to allow script to 
executable chmod +x /path/to/your-script.sh

Once it is tested working, now type 'xfce4-session-settings' and click on the 
"Application Autostart" tab in the window that popups. Click add, and add your 
script to autostart. 

Now every time you boot up Qubes, dom0 will change your settings to the 
specified ones you gave it in the command. Furthermore you can keybind it in a 
similar way.

Type 'xfce4-keyboard-settings' in dom0, and click on the "Application 
Shortcuts" tab in the window that popups. Now same as before, simply click add, 
put path to your script, and add a keybind.

If you just need permanent changes, then the first is enough. If you need to 
change it once in a while, i.e. switch between resolutions, or move second 
screen to the left or right, change refresh rates, and things like that, then 
turn the script into a keybind. You can have multiple of scripts like this.

It doesn't solve the primary issue, but it's also something I need to look into 
my self when I find the time to play around with Linux/Qubes screen scaling. At 
least this can work as a temporary solution though.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/787978a9-96c3-4e61-bd9a-213f1a404f83%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-08 Thread Yuraeitha
On Thursday, March 8, 2018 at 9:00:33 AM UTC+1, sevas wrote:
> lol My problem was that I didnt read the date on the paper which was 
> yesterday. I had already downloaded and installed it before I realized that 
> it was out. 
> 
> Despite that the article came up on my phone and this post as well came up 24 
> hours later.

ah yes, you had already installed RC-5. But anyway, if others face the same 
problem then check flags/sync update commands across Qubes :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/897e63d8-d4bb-487b-bde2-91f33a750d1a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-08 Thread Yuraeitha
On Wednesday, March 7, 2018 at 9:21:58 PM UTC+1, sevas wrote:
> Whoo hoo! 
> 
> I went to download qvm-dom0-update and it says no new updates available

This is not an official response in anyway, but here's what I'd suggest to do.

Remember if you recently downloaded updates within 48 hours, then the cache on 
fedora systems (which includes dom0 as far as I know, though I'm still a bit 
unsure about dom0 my self, since it's Qubes specific, so while it works, but 
isn't perfect since it isn't light and cleans up more, I use --clean flag in 
dom0). 

Anyway, you need to use the --refresh flag on fedora templates after the enable 
repository, in order to make it sync the cache list with the server within 48 
hours since last update. If you're beyond the 48 hours since the cache was 
made, then you don't need the --refresh flag. Also as far as I know, debian 
does this automatically, so no action is needed beyond enabling the testing 
repository. 

To sum up;
- Always use the same Qubes repositories across Qubes, be it dom0 or templates, 
it's important to keep them in sync.
- Use --refresh for fedora templates and --clean for dom0, if you updated 
within 48 hours or if you mistakenly only updated some VM''s/dom0 and need to 
update them all again. In which case, use the flags to sync.
- Debian/Whonix require no metadata sync as they do this automatically. But 
remember Debian/Whonix also require the dist-upgrade command in addition to 
update command.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/63ba2640-7a63-4a81-a6c8-08088412f17e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-08 Thread sevas
lol My problem was that I didnt read the date on the paper which was yesterday. 
I had already downloaded and installed it before I realized that it was out. 

Despite that the article came up on my phone and this post as well came up 24 
hours later.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f921c714-2e05-405a-904c-4dd29dfb2d0d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-07 Thread haaber
> Le mercredi 7 mars 2018 22:21:58 UTC+2, sevas a écrit :
>> Whoo hoo! 
>>
>> I went to download qvm-dom0-update and it says no new updates available
> 
> Same thing for me ...
> 
and   sudo qubes-dom0-update --enablerepo=qubes*testing ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1961d5fc-5bf2-6b96-7718-b3c82f96bf13%40web.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-07 Thread ThierryIT
Le mercredi 7 mars 2018 22:21:58 UTC+2, sevas a écrit :
> Whoo hoo! 
> 
> I went to download qvm-dom0-update and it says no new updates available

Same thing for me ...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47a2824b-378f-4784-8aeb-b7afdf1fe4ed%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-07 Thread sevas
Whoo hoo! 

I went to download qvm-dom0-update and it says no new updates available

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f6a9802f-d5d6-4466-a58a-2866f8f57831%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-07 Thread amilton
Thanks for the great news Andrew.
Congratulations to the team.

Em terça-feira, 6 de março de 2018 22:03:05 UTC-3, Andrew David Wong  escreveu:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Dear Qubes Community,
> 
> We're pleased to announce the fifth release candidate for Qubes 4.0!
> This release contains bug fixes for the issues discovered in the
> [previous release candidate][4.0-rc4]. A full list of the Qubes 4.0
> issues closed so far is available [here][closed-issues]. Further
> details about this release, including full installation instructions,
> are available in the [Qubes 4.0 release notes][release-notes]. The new
> installation image is available on the [Downloads] page.
> 
> As always, we're immensely grateful to our community of testers for
> taking the time to [discover and report bugs]. Thanks to your efforts,
> we're able to fix these bugs *before* the final release of Qubes 4.0. We
> encourage you to continue diligently testing this fourth release
> candidate so that we can work together to improve Qubes 4.0 before the
> stable release.
> 
> The Qubes 4.0 stable release
> - 
> 
> If the testing of 4.0-rc5 does not reveal any major problems, we hope to
> declare it the stable 4.0 release without any further significant
> changes. In this scenario, any bugs discovered during the testing
> process would be fixed in subsequent updates.
> 
> If, on the other hand, a major issue is discovered, we will continue
> with the standard [release schedule], and Qubes 4.0 stable will be a
> separate, later release.
> 
> Current Qubes 4.0 Users
> - ---
> 
> Current users of Qubes 4.0-rc4 can upgrade in-place by downloading the
> latest updates from the testing repositories in both
> [dom0][dom0-testing] and [TemplateVMs][domU-testing].
> 
> 
> [4.0-rc4]: https://www.qubes-os.org/news/2018/01/31/qubes-40-rc4/
> [closed-issues]: 
> https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+milestone%3A%22Release+4.0%22+is%3Aclosed
> [release-notes]: https://www.qubes-os.org/doc/releases/4.0/release-notes/
> [Downloads]: https://www.qubes-os.org/downloads/
> [discover and report bugs]: https://www.qubes-os.org/doc/reporting-bugs/
> [release schedule]: 
> https://www.qubes-os.org/doc/version-scheme/#release-schedule
> [dom0-testing]: 
> https://www.qubes-os.org/doc/software-update-dom0/#testing-repositories
> [domU-testing]: 
> https://www.qubes-os.org/doc/software-update-vm/#testing-repositories
> 
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2018/03/06/qubes-40-rc5/
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> 
> -BEGIN PGP SIGNATURE-
> 
> iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlqfOjgACgkQ203TvDlQ
> MDD85w/+NXqtxDpaC84CeETA/1/HK6WcbYoNmt1ZjRouKJmmrW2pxyUsYo7vZNsN
> +qgupvvHkE+AFhKuwRrQJq8k6fHPzaY2GWvLpJGQ/bEFqO8fWnrvFzR0OzQb/sYI
> NfRZoSA9lKyt05QJPfxG3aHqAXJeVwslj337arE/lhws6zsVS0zhtHxCyB9w/Wag
> c+YWy2BrWjzujlJZC1SDGFrD0bdd+voD2GTOcUrCSXOP4IxH9ym/VWVtD8O5Tssx
> WIU1qvSumpMaIWN2GsbVIQXqjxv2+AvtNg28neAyAoudpqq4EmX3/ugNe9ngVV0U
> 8wAKGnRAm5keV7tNV48Kqrsd26N95kkB/0U3AYLG5o1ZwTV2dId5ERxj1hkE8/FC
> TDIlFcC3S94N39pUwfMcE0wFr6q8m6Mt7XJdDjII2OCrhxbpgoPRrCeUOH0Vkj5d
> F8VETME1w1taoPjoVIO7jclgaBWChgLLBRjelYUj0fYFIRu3WCQDG1l86ZFWa96q
> qHLBPSdddzMxdj9G2MQFRamv4cmefUHZx9XbDLK5tjZcX8lfKPS96avNg1iAa3x8
> wZGwkk96Lo5MoapH+ZlYde0oTacyssmDSvDw4qmhSAyRbM1TrFlCCtv2TMNkLFHW
> DaN4GgYeh1XSmw0M7fAf/TmBjjKVxz0oMOgaGhjrmK0vmH29C0w=
> =BkQO
> -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f7ee59a2-1c1a-4a36-b247-9ff71c52e82f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS Stable Release 3.2. (Cant up-date template to fedora-26 or fedora-27)

2018-02-26 Thread Tim W
Inhave gotten errors such as those building qubes iso and templates.  I now 
break up the components and bud them in small in order groups so I can start 
where it fails vs running the whole script build.

I would try again and as was said restart the nework vm chain or full 
powercycle the machine.  It really sucks when that happens on a six hour custom 
qubes iso build and you bogger it and have to start over.  Live and learn I 
guess lol

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90acf871-d748-48f1-aac3-e1d797413a3e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS Stable Release 3.2. (Cant up-date template to fedora-26 or fedora-27)

2018-02-26 Thread Yuraeitha
On Monday, February 26, 2018 at 11:23:57 AM UTC+1, The Hermit wrote:
> Hey,
> 
> I've installed Qubes OS and I'm having trouble installing the fedora-26 and 
> fedora-27 template. I've tried minimal and the full 1.5 G I believe. The 
> template is downloading but I'm getting an error when it attempts to install. 
> the temple. 
> 
> "Failed to synchronize cache for repo 'qubes-dom0-cached' -disabling
> 
> I've installed the 3.2 Release stable from qubes-OS web-site.
> 
> Any one able too help.
> 
> 
> Thanks.

btw you can also try restart sys-net and sys-firewall. I've recently had 
similar yet slightly different cache issues in regard to GPG checks. Restarting 
sys-net/sys-firewall always fixed it for me. 

I suggest you try that first since it's a quick confirmation if it works or not.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/498df030-ea77-4bf2-b355-f40402345f3d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS Stable Release 3.2. (Cant up-date template to fedora-26 or fedora-27)

2018-02-26 Thread Yuraeitha
On Monday, February 26, 2018 at 11:23:57 AM UTC+1, The Hermit wrote:
> Hey,
> 
> I've installed Qubes OS and I'm having trouble installing the fedora-26 and 
> fedora-27 template. I've tried minimal and the full 1.5 G I believe. The 
> template is downloading but I'm getting an error when it attempts to install. 
> the temple. 
> 
> "Failed to synchronize cache for repo 'qubes-dom0-cached' -disabling
> 
> I've installed the 3.2 Release stable from qubes-OS web-site.
> 
> Any one able too help.
> 
> 
> Thanks.

To my understanding, it could be server issues, DNS issues, cache issues, or 
wrong repository issues. I'm no expert though, but it's the gist I get of the 
issue.

What did you type in the dom0 terminal? Something like this?

sudo qubes-dom0-update qubes-template-fedora-26 
sudo qubes-dom0-update qubes-tempalte-fedora-26-minimal

I don't think the fedora-27 is officially ready on Qubes yet? But I have not 
checked recently either.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/219a47e9-1216-40ce-80c6-4d72197179ba%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0RC4 can't get xterm from sys-usb, sys-net, sys-whonix

2018-02-21 Thread wyory
Hi,

This resolved after I restarted. Seems to be part of some
hard-to-pin-down bugs in 4.0rc4. I'll hang tight as things are ironed out.

Thanks for the help.

-wyory

wyory:
> Hi,
> 
> I can't get anything to run using 'qvm-run' on the sys-vms (sys-usb,
> sys-net, sys-whonix). Is this intentional? I'd like to get xterm on
> sys-usb to run some disk diagnostics on an external drive using 'smartctl.'
> 
> Any suggestions?
> 
> Using Qubes OS 4.0RC4.
> 
> Thanks in advance.
> 
> -wyory
> 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/08377d59-1bfe-57c9-0e20-5f8b76c6e1cd%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0RC4 can't get xterm from sys-usb, sys-net, sys-whonix

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 12:24:09 AM UTC+1, wyory wrote:
> Hi,
> 
> I can't get anything to run using 'qvm-run' on the sys-vms (sys-usb,
> sys-net, sys-whonix). Is this intentional? I'd like to get xterm on
> sys-usb to run some disk diagnostics on an external drive using 'smartctl.'
> 
> Any suggestions?
> 
> Using Qubes OS 4.0RC4.
> 
> Thanks in advance.
> 
> -wyory

I use Q4-RC3, so I'm not sure if the smaller variations not included in the 
RC-4 updates makes a difference here on an RC-3 install. No re-install was 
recommended, but there can still be small variations.

For me it works, all commands below work on my Q4-RC3 fully updated system.



Try see if this works for you too in dom0: qvm-run sys-net 'gnome-terminal -e 
xterm' 

You can also try this one if there is something wrong with xterm "qvm-run 
sys-net 'gnome-terminal -e smartctl, your command etc.'

As I recall, Marek was looking to purge some packages during RC-4 compiling, 
because it was just about a bit bigger than what could be fit on a DVD size. So 
some things had to be removed. Perhaps xterm was one of those. Try check if 
it's installed in your template. As far as I know it wasn't removed for 
security reasons, it was size reasons. So I don't think its a problem to just 
manually install it yourself. Assuming, it's gone, it's a guess on my part. 
I've seen others report Thunar missing in dom0 too in RC-4. As far as I 
understand the same goes here, Thunar might just be removed for size reduction, 
and not due to security. Although it's a security concern if users have an 
easier time to access dom0, Qubes 4 seems to be a bit early to remove such 
things just for this. Maybe it could be done in Qubes 5 or Qubes 6, but there 
are still too many things to be done in dom0, just yet. Either way, this might 
explain it if xterm isn't installed, but used to be installed in the past. Try 
check if its there or not.

Another alternative could be to put a script inside your AppVM that does the 
smartctl execution. Then Execute the script with 

qvm-run sys-net 'bash /path/to/script'

If none of this is working, then perhaps something more serious is going on? No 
error messages or such sorts?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/732eef5d-386c-487d-8178-45d1358157aa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS screensharing

2018-02-11 Thread donoban
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 02/11/2018 04:03 PM, Vít Šesták wrote:
> I am sorry for the monolog, but I have some further ideas and
> findings.

Hehe, I'm following your progress but I don't have currently the need
of share my screen.

I enjoy reading it and maybe I will test when I have some free time
for spend on it :)
-BEGIN PGP SIGNATURE-
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=+c3d
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ad577b1-4cef-9b89-9c67-7d13b9d0302b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS screensharing

2018-02-11 Thread Vít Šesták
I am sorry for the monolog, but I have some further ideas and findings.

I see two promising options to make screensharing great again:

a. VM screensharing: It would share the screen of the current VM and nothing 
else. We need to get in-VM screenshots working for this. Or you can use a VNC 
loopback session with its drawbacks.
b. Full screensharing. This requires to pipe screen contents from dom0 to a 
specific domU. Maybe we need to stream it to some window that cover everything 
while being ignored by qubes-gui.

Technical findings:

When considering the most common VMs in Qubes, none of those two variants 
currently works well. When I try to screenshot the main X11 of a PV domU, I get 
a solid white image. This is true for any screenscrapping technique I have 
tried. I am not sure what is the reason of white screenshot, but I've traced it 
a bit:

* The color is not related to xsetroot call in /usr/bin/qubes-session (i.e., 
you can change it to some other color in a StandaloneVM and reboot it, but you 
will still get white screenshot).
* It is not related to xorg.conf and/or the dummyqbs driver. First, changing 
“dummyqbs” to “dummy” does not help. Second, when I copy 
/etc/X11/xorg-qubes.conf to /etc/X11/xorg.conf run a second X11 session (as :1) 
and screenshot it (e.g., env DISPLAY=:1 scrot out.png && feh out.png), the 
screenshot works. (Maybe you will want to run something there to see it, e.g., 
env DISPLAY=:1 xterm&.)
* It is not related to window manager. When i run a WM (Openbox) in standard 
Qubes session, it does not help. I believe it is also true vice versa.
* It seems to be related to qubes-gui process. When I kill it, screenshots (and 
thus screensharing) starts working. But obviously, you cannot interact with the 
GUI.

You can see it on a simple experiment. I've used two sessions of a DVM started 
by command qvm-run '$dispvm' bash. This creates some inconvenient Bash session 
(e.g., you cannot see prompts and error messages), but it is good enough to run 
few commands as follows:

sudo apt install scrot # Install screenshoting app. Adjust this if you are not 
on Debian.
xterm& # run some app that will be seen on screenshot
# sudo killall qubes-gui # Run this in one VM only in order to see differences.
ps aux | grep qubes-gui # See if it is killed
(rm -f out.png && scrot out.png && cat out.png | qvm-run '$dispvm' 'feh -') 
2>&1 # Look at the result. Since the VM might be incapable of showing some GUI, 
I start a new VM.

You might need to adjust the commands or your environment a bit (e.g., install 
feh if not installed), but it should be trivial and obvious.

I do not know why qubes-gui makes such difference. The source is at 
https://github.com/QubesOS/qubes-gui-agent-linux/blob/master/gui-agent/vmside.c 
, but I still don't know why it behaves this way. There are two occurrences of 
“white” (case-insensitive), but I don't understand the code much. But I have 
found some interesting part: “/* pretend that GUI agent is window manager */”. 
So, it tries to look like some window manager. This is strange, as Openbox does 
not complain that some WM is already running when I run it within a Qubes 
session. But I don't understand X11 details much, which is probably the reason 
I don't understand the linked source code much.

No, I don't have a solution. I have few intermediate results that might be 
useful for someone to find something more.

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/626cd5a7-97b0-497b-8d85-2eb7df9e9402%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS screensharing

2018-02-10 Thread Vít Šesták
Just another idea: Since the video approach is sooo slow, I've tried another 
approach. This one is suboptimal by design, but it is much faster than the 
recordMyDesktop variant. This one requires a VNC loopback session or other way 
of getting another session with its own background. (This is something that 
would be required for real screensharing anyway.) You can easily get it by apt 
install tigervnc-standalone-server tigervnc-viewer openbox (or similar command 
on non-Debian system), running vncpasswd (configure any password, you don't 
have to remember it), running tigervncserver and then running the viewer 
command mentioned it server's output.

There is my hack. It assumes that:
* /tmp/out.bmp is a symlink to /dev/stdout. The reason is the same as with the 
video approach.
* You have scrot installed in dom0.
* You have feh installed in the target VM.
* Your VNC loopback session has display :1. (You can change it.)
* You want to pipe it to disp3. (You can change it.)

The command to run in dom0:

while true; do (scrot /tmp/out.bmp | qvm-run disp3 -p 'env DISPLAY=:1 feh 
--bg-center --no-fehbg -'); done

It is suboptimal for many reasons:

* It forks several processes in both dom0 and domU for each screenshot.
* It opens a new RPC call for each frame. (Which causes previous unoptimality.)
* All screenshots are saved in /tmp (internal behavior of feh). This probably 
matters less when /tmp is tmpfs, but still.
* Works fully synchronously.

Actual performance on my laptop was about 2 FPS (measured by my eyes), which is 
not great, but it works much better than the video. For some purposes, 2FPs 
might be useable. Not sure why this is better than the video, maybe it is due 
to missing compression and decompression, maybe it is due to missing buffering.

How the performance can be improved:

1. Use a single pipe, don't open a new RPC call for each frame. (This might get 
tricky due to buffering. It might be important to verify that it works well 
even if the consumer is slower than producer.)
2. Use a single process as producer instead of looped scrot.
3. Use a single process as consumer instead of looped feh.

Another idea is to use half-duplex VNC, but this might be also tricky. The goal 
is not to allow to pass any input from the untrusted VM to VNC server in dom0, 
maybe except information about potential congestion (i.e., situation when 
consumer is slower than producer). I am not sure if VNC is designed for that, 
but Wireshark capture of session with -ViewOnly on client-side looks still a 
bit chatty. There are many Authentication Response messages for some time 
(WTF?) and many Fence messages (hmm, probably synchronization).

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a8bff52-744b-4233-b87a-ddebe23a52c9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS screensharing

2018-02-10 Thread Vít Šesták
I've implemented my approach of screensharing. It pipes content scrapped from 
dom0 to a VM. I don't call it a success, because the FPS is terribly low. But 
maybe someone can try to get it even further.

Recording:
* VLC and ffmpeg could be good choices (with probably many options for 
adjusting it for your needs), but they aren't available in Fedora unless you 
use some third-party repository, which is not what I wanted.
* recordMyDesktop works with some hacks and config, but its FPS is terribly low 
(at least when using --on-the-fly-encoding). It also does not have much 
encoding options. It would be probably ideal to use uncompressed video, because 
transfer is cheap and encoding/decoding is GPU/CPU-intensive. (Actually, GPU 
can at least theoretically help with encoding, as it happens in dom0. It can't 
help with video decoding.) I haven't tried to adjust video quality, because I 
am not sure about the effect on encoding performance.
* Not sure about other alternatives available in Fedora without additional 
repositories. I am not aware about any.
* Maybe we could try the software intended to pipe windows from domUs to dom0 
for the other way?

Playback:

* I use MPlayer, but any player capable of playing a pipe can do the job.
* If you want to use it in a VNC session, you will probably want to add 
something like “env DISPLAY=:1”. But now, it is too early.
* In my experiment, the domU part was Debian 9, but I don't think this matters 
much.

The script with comments: 
https://gist.github.com/v6ak/1678244cd71a0ebd019531d02a149c8f

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/43dae632-d8a9-4735-bb40-a6ed71053501%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


  1   2   3   >