[qubes-devel] Re: QSB-069: Multiple Xen and Intel issues

2021-06-09 Thread Vít Šesták
Is it OK to see ”cat: broken pipe“ during update of the microcode package? It still boots. Note that the machine has an AMD CPU. Regards, Vít Šesták 'v6ak' On Wednesday, June 9, 2021 at 3:06:35 AM UTC+2 a...@qubes-os.org wrote: > Dear Qubes Community, > > We have just published Qubes

[qubes-devel] Re: Help me test fixes for Intel IGD graphical artifacts on Qubes R4.0

2021-01-21 Thread Vít Šesták
to eDP-1. As a result, it broke my screen configuration scripts, so that my external screen was just scaled-up fullHD mirror of my laptop screen. But the solution was pretty easy: just adjust the screen names in the scripts. I have observed no other drawbacks so far. Regards, Vít Šesták 'v6ak

[qubes-devel] Are there any real obstacles for a (theoretical) ARM port of QubesOS?

2020-06-30 Thread Vít Šesták
> security (exposing Dom0 to untrusted hardware). IIUC: 1. Missing IOMMU also means a malicious DomU with a PCI device can attack dom0 through DMA. 2. Actually, IOMMU does not fully protect dom0 from a malicious hardware, because a malicious hardware could alter the boot process. -- You

Re: [qubes-devel] R4.0-rc4 installation image considerations

2018-02-01 Thread Vít Šesták
at the time of writing… (Note the typo in my previous post – I wrote “rc1” instead of “rc4”.) Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving

Re: [qubes-devel] R4.0-rc4 installation image considerations

2018-01-30 Thread Vít Šesták
rowhammer test. Moreover, rowhammer test might take some time... Regards, Vít Šesták 'v6ak' Maybe top-posting is bad. However, quoting whole message (including quotes of quotes and quotes of quotes of quotes etc.) before your message is even worse. Please don't let others scroll extensively.

Re: [qubes-devel] R4.0-rc4 installation image considerations

2018-01-30 Thread Vít Šesták
. I see this approach is too late for Qubes4-rc1, but it could be useful for some future release. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails fro

Re: [qubes-devel] Upgrade instructions for R3.2 and QSB37 patches

2018-01-18 Thread Vít Šesták
is no other way. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to th

Re: [qubes-devel] Upgrade instructions for R3.2 and QSB37 patches

2018-01-18 Thread Vít Šesták
On Thursday, January 18, 2018 at 11:25:11 AM UTC+1, Chris Laprise wrote: > If this Xen 4.6 patch were more robust in protecting memory, I'd opt for > it instead of upgrading Xen. I believe that PVHs are more robust. But I'd prefer to stay conservative in Qubes 3.2 and progressive in Qubes 4.0.

Re: [qubes-devel] Upgrade instructions for R3.2 and QSB37 patches

2018-01-17 Thread Vít Šesták
ity. Also, the people who don't want the performance hit and cannot upgrade to Q4 can: a. Disable the patch. (Reasonable on CPUs that aren't affected.) b. Maybe migrate to HVMs? If Spectre cannot be addressed via the third option, then the conclusion is not so clear for me. Regards, Vít Šesták

Re: [qubes-devel] Upgrade instructions for R3.2 and QSB37 patches

2018-01-17 Thread Vít Šesták
, but it might be good to use this in, say, Qubes 4.1. Regards, Vít Šesták -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@google

Re: [qubes-devel] Difference between PVH and PVHVM

2017-12-17 Thread Vít Šesták
Cool, this can allow us to test PVH without switching to Q4.1. -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post

Re: [qubes-devel] Difference between PVH and PVHVM

2017-12-16 Thread Vít Šesták
not sure how hard/easy it is, though. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@google

Re: [qubes-devel] Convert to trusted LibreOffice file

2017-11-18 Thread Vít Šesták
Running in DispVM can prevent some class of attack that extracts data using techniques like path traversal, XXE (hmm, …) or other attacks below RCE. Regards, Vít Šesták 'v6ak' On Wednesday, November 15, 2017 at 12:07:21 AM UTC+1, Marek Marczykowski-Górecki wrote: > > -BEGIN PGP

Re: [qubes-devel] Fedora 27

2017-11-18 Thread Vít Šesták
Do you mean Wayland in AppVMs, dom0, or in both? For AppVMs, I don't care much while X11 is supported. For dom0, it might be important for hardware support. Regards, Vít Šesták 'v6ak' On Friday, November 17, 2017 at 8:20:33 PM UTC+1, Henry de Valence wrote: > > On Fri, Nov 17, 2017 at

[qubes-devel] Re: Remove SWAP file on SSD systems / provide option in installer

2017-10-22 Thread Vít Šesták
is encrypted by a key that is held in memory only, so the whole partition is protected in a similar way as dom0 swap. Regards, Vít Šesták 'v6ak' On Tuesday, September 26, 2017 at 9:43:32 AM UTC+2, tai...@gmx.com wrote: > > It increases SSD wear and decreases privacy by writing temporar

[qubes-devel] Re: Suggestion: touchscreen support for guests

2017-07-22 Thread Vít Šesták
) that disables all USB devices in dom0, you are currently out of luck. While there are input proxies, they will not currently work with touchscreen. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubs

[qubes-devel] Changing qubes-core-admin license to LGPL v2.1+

2017-07-22 Thread Vít Šesták
I agree with the change. > If you do not reply with one month, we will assume that you consent to this > change. I am afraid this is not legally bulletproof. Anyway, I wish you smooth transition to the new license. Regards, Vít Šesták 'v6ak' -- You received this message becau

Re: [qubes-devel] Distinct inter/intra vm clipboard shortcuts

2017-06-07 Thread Vít Šesták
Hmm, copy action could be probably implemented by copying from selection, that sounds rather OK for me. But I still don't see how to implement paste. -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop

Re: [qubes-devel] Distinct inter/intra vm clipboard shortcuts

2017-06-07 Thread Vít Šesták
a different meaning there. The copy/paste/cut keycodes would be a much more elegant solution if they were supported. 2. How to prevent race conditions, e.g., copy from VM to dom0 happens before text is copied from selection in the VM. Maybe there is some solution. Regards, Vít Šesták 'v6ak

Re: [qubes-devel] Distinct inter/intra vm clipboard shortcuts

2017-06-03 Thread Vít Šesták
be a challenge due to potential race conditions. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-deve

[qubes-devel] Future-proofing qubes-secpack

2017-06-03 Thread Vít Šesták
Well, blockchain could be probably also used as a proof of freshness: Just add some Blockchain-related data to the signed message. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from

[qubes-devel] Re: Qubes inter VM FS

2017-06-03 Thread Vít Šesták
I don't see any extra exposure for dom0 there. Yes, there is some qrexec call managed by dom0 (but handles by another AppVM) and this adds some (very very marginal, thanks to qrexec simplicity) risk compared to not allowing any qrexec call. However, there already are some other qrexec calls

Re: [qubes-devel] change the default templates which are pre-installed with qubes

2017-03-19 Thread Vít Šesták
applications, it does not seem to matter if I am using a 1GiB template or, say, 100GiB template. The extra apps are unused, so I don't care about them. * Package clash – I don't share this experience. * Uninstalling – well, if you read the questions, you can get it. Regards, Vít Šesták 'v6ak' -- You

[qubes-devel] T-shirts at 33C3!

2016-12-27 Thread Vít Šesták
Cool. Are you planning to make them available also for those that don't attend CCC? Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, sen

Re: [qubes-devel] Accessibility on Qubes OS

2016-12-27 Thread Vít Šesták
interacts with dom0. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this g

Re: [qubes-devel] Accessibility on Qubes OS

2016-12-25 Thread Vít Šesták
forgot it.  Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this g

Re: [qubes-devel] Accessibility on Qubes OS

2016-12-24 Thread Vít Šesták
, at least some focus-stealing notification would also help. Focus-stealing is poartially discussed in seemingly unrelated issue https://github.com/QubesOS/qubes-issues/issues/1455 . Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "

Re: [qubes-devel] Re: Qubes vm.swappiness=0

2016-12-14 Thread Vít Šesták
nt: Assume that there is no use case for large vm.swappiness in Qubes: f(usage_mem)/(1-swappiness/100) b) Complex variant: Assume one might want higher swappiness, so add some upper limit: min(f(usage_mem+usage_swap), f(usage_mem)/(1-swappiness/100)) Does this sound reasonable? Regards,

Re: [qubes-devel] Re: Qubes vm.swappiness=0

2016-12-14 Thread Vít Šesták
t may force something else to be swapped out). So I think this > problem still applies to some degree. > Why it would do so? If there is some extra memory and vm.swappiness==0, I can't see a scenario for that (except those unrelated to swap). Regards, Vít Šesták 'v6ak' -- Yo

Re: [qubes-devel] Re: Qubes vm.swappiness=0

2016-12-10 Thread Vít Šesták
. b. My favourite hack sudo swapoff -a && sudo swapon -a would not work well. Maybe some alternative could be found, though. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this gro

[qubes-devel] Qubes 4.0 development status update

2016-12-04 Thread Vít Šesták
state of this countermeasure? Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.co

Re: [qubes-devel] Qubes vm.swappiness=0

2016-12-04 Thread Vít Šesták
My experience with swapiness (on non-Qubes): When having high swapiness, it uses swap more than actually needed, sligtly slowing the system down. OTOH, when having swapiness=0, it runs smoothly until RAM limit is reached. Then, it suddenly freezes for few minutes. Qubes doesn't look like

[qubes-devel] Re: Upcoming Xen Advisories?

2016-11-15 Thread Vít Šesták
. If it is a critical issue, there will be a QSB for it. Moreover, we still don't know the severity. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, sen

[qubes-devel] Qubes Security Bulletin #26

2016-09-22 Thread Vít Šesták
On Qubes 3.2, I have qubes-gui-dom0 and no update is available through qubes-dom0-update. BTW, after the update, is itt enough to kill (and restart by some command) all guid processes? -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To

Re: [qubes-devel] 3.2-RC3 Yellow window borders have poorly visible titles with Breeze on KWin

2016-09-11 Thread Vít Šesták
Thanks for the info. On Sunday, September 11, 2016 at 9:00:46 PM UTC+2, Marek Marczykowski-Górecki wrote: > > Take a look at discussion here: > https://github.com/QubesOS/qubes-issues/issues/1784 > I went through the discussion. Is there anything specific I should note? In short: no,

Re: [qubes-devel] 3.2-RC3 Yellow window borders have poorly visible titles with Breeze on KWin

2016-09-11 Thread Vít Šesták
not break anything. If Plastik works OK for others, I'll have to find out what is broken on my machine. If Plastik is not supposed to work well ATM, I'll probably send a pull request.) Regards, Vít Šesták 'v6ak' On Wednesday, September 7, 2016 at 11:42:44 PM UTC+2, Vít Šesták wrote: > > It

Re: [qubes-devel] 3.2-RC3 Yellow window borders have poorly visible titles with Breeze on KWin

2016-09-07 Thread Vít Šesták
ancient KDE and without much details, but it still seems somewhat relevant. I hope I'll do more about this later. Regards, Vít Šesták 'v6ak' On Wednesday, September 7, 2016 at 3:46:29 PM UTC+2, Marek Marczykowski-Górecki wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > >

Re: [qubes-devel] 3.2-rc3 KWin in XFCE does not show VM name and color

2016-09-07 Thread Vít Šesták
, as it is rather designed to work with a specific narrow range of KWin versions. BTW, advantage of non-checking the KDE version might come with KDE 6, which would also break the condition :) So, should I make a pull request for this? Regards, Vít Šesták 'v6ak' -- You received this message because you

[qubes-devel] 3.2-RC3 Yellow window borders have poorly visible titles with Breeze on KWin

2016-09-06 Thread Vít Šesták
When I use KWin with Breeze theme, the yellow window titles have white text, which is poorly readable. Could this be changed to, say, black text? Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubs

[qubes-devel] 3.2-rc3 KWin in XFCE does not show VM name and color

2016-09-06 Thread Vít Šesták
Hello, In 3.0 and 3.1, I used KWin with XFCE and it worked well. In 3.2-rc3, it does not show VM name in the title and does not color borders. Why? This happens for both Plastik and Breeze. In pure KDE, it works OK. Regards, Vít Šesták 'v6ak' -- You received this message because you

[qubes-devel] Re: [3.0] Microphone in HVMs

2016-05-26 Thread Vít Šesták
.) It does not work for Windows, though. Regards, Vít Šesták 'v6ak' On Tuesday, May 24, 2016 at 1:45:47 AM UTC+2, Iestyn Best wrote: > > Hi, > > I like trying to revitalize old discussion topics. ;) I hope there is not > a problem with me doing so. > > I am curious to see if