Re: [qubes-devel] Running (or not) Xen during installation

2016-11-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Nov 03, 2016 at 02:51:38PM -0600, Trammell Hudson wrote: > On Thu, Nov 03, 2016 at 09:33:34PM +0100, Marek Marczykowski-Górecki wrote: > > On Thu, Nov 03, 2016 at 02:26:28PM -0600, Trammell Hudson wrote: > > > One other option is to use a min

[qubes-devel] WhoNix

2016-11-03 Thread drew . qubes
Hi folks, I'm trying to find out information on Whonix and it's operation and all. Does Qubes use their Qubes-Tor-VM or is it the full blown Whonix? If it's the later, then their documentation is out of date. What I'm trying to find out is how the whonix gateway and workstation actually work,

Re: [qubes-devel] Running (or not) Xen during installation

2016-11-03 Thread Trammell Hudson
On Thu, Nov 03, 2016 at 09:33:34PM +0100, Marek Marczykowski-Górecki wrote: > On Thu, Nov 03, 2016 at 02:26:28PM -0600, Trammell Hudson wrote: > > One other option is to use a minimal Linux image that can then kexec > > Xen/dom0/initrd without any of the UEFI limitations. [...] > > That's indeed i

Re: [qubes-devel] Running (or not) Xen during installation

2016-11-03 Thread 7v5w7go9ub0o
On 11/03/2016 08:24 PM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-03 13:13, Marek Marczykowski-Górecki wrote: So, now the question - do we want to keep launching Xen for installation, or launch just plain Linux? By far one of the most common problem

Re: [qubes-devel] Running (or not) Xen during installation

2016-11-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Nov 03, 2016 at 02:26:28PM -0600, Trammell Hudson wrote: > On Thu, Nov 03, 2016 at 09:13:26PM +0100, Marek Marczykowski-Górecki wrote: > > [...] > > Benefits of dropping Xen: > > - no longer limited to 32MB of initrd for UEFI boot[1] > > -

Re: [qubes-devel] Running (or not) Xen during installation

2016-11-03 Thread Trammell Hudson
On Thu, Nov 03, 2016 at 02:26:28PM -0600, Trammell Hudson wrote: > One other option is to use a minimal Linux image that can then kexec > Xen/dom0/initrd without any of the UEFI limitations. This also addresses > the various interesting alternate installation techniques -- if Linux > has a driver

Re: [qubes-devel] Running (or not) Xen during installation

2016-11-03 Thread Trammell Hudson
On Thu, Nov 03, 2016 at 09:13:26PM +0100, Marek Marczykowski-Górecki wrote: > [...] > Benefits of dropping Xen: > - no longer limited to 32MB of initrd for UEFI boot[1] > - easier starting installation in non standard environment (network >boot, non standard installation media) > - ability t

Re: [qubes-devel] Running (or not) Xen during installation

2016-11-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-03 13:13, Marek Marczykowski-Górecki wrote: > So, now the question - do we want to keep launching Xen for > installation, or launch just plain Linux? > By far one of the most common problems new users encounter (as reported on Twitter, R

[qubes-devel] Running (or not) Xen during installation

2016-11-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Currently Qubes OS installer is starting full Xen + Linux dom0 to perform installation. On one hand it is good, because it is obvious at this early stage if hardware is not compatible (especially display driver and its cooperation with Xen). But

Re: [qubes-devel] Patch for qvm-ls (-r/--running) to show ony running VMs

2016-11-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Nov 03, 2016 at 12:31:58AM -, johnyju...@sigaint.org wrote: > I find the qvm-ls utility to be quite handy, but often I only want > information about currently running VMs, rather than all of them. > > So I added a -r (--running) flag to

Re: [qubes-devel] xdotool to type senstive data into app vms

2016-11-03 Thread Jean-Philippe Ouellet
On Thu, Nov 3, 2016 at 7:38 AM, pixel fairy wrote: > ... i was thinking of installing xdotool into dom0 and writing a new > script to the same end. I believe it would be preferable to put xdotool in the AppVM and invoke it via qrexec rather than allowing AppVMs to trigger the generation of events

[qubes-devel] xdotool to type senstive data into app vms

2016-11-03 Thread pixel fairy
in my precube days, i had a vaultvm and various appvms. because firejail could protect the keyboard from scary apps, and i just dont like sensitive data hitting that clipboard, my pass script would copy the vaults clipboard, then type it into the target vm using xdotool over ssh. this worked pr

Re: [qubes-devel] Issues 3.2

2016-11-03 Thread drew . qubes
On Tuesday, 1 November 2016 21:37:41 UTC+11, Chris Laprise wrote: > > On 10/30/2016 12:12 AM, Eric Shelton wrote: > > > > Outback Dingo: > > > > I am going to repeat a suggestion I made back when I tried helping you > > out, as it seems like you never tried it and it is a fairly > > inexpen