Jump to content

Search the Community

Showing results for tags 'qubes'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • News & Announcements
    • BlockForums Announcements
    • Denarius Announcements
    • Kronos Wallet Announcements
    • The Crypto News Feed
  • Cryptocurrency Discussions
    • Cryptocurrencies
    • Altcoin Announcements
    • General Discussion
    • Tutorials & Help
  • Denarius Discussions
    • General Discussion
    • Tutorials & Help
    • Marketing & PR
    • Development
    • Mining & Staking
    • Trading & Exchanges
    • Marketplace
  • Programming & Design
    • Development QA
    • Design QA
  • Gaming
    • Bot Downloads & Discussion
    • Gaming Discussion
  • Classifieds
    • Buy Sell and Trade
  • Other Discussions
    • Element 115
    • The Lounge
    • Hardware & IoT
    • Tutorials & Guides
    • Domains & Hosting

Product Groups

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


BTC Address

Found 7 results

  1. How to get Ledger and Metamask running on QubesOS. A reference to all of this. https://www.whonix.org/wiki/Ledger_Hardware_Wallet The idea is to install chromium on a clean Debian, I like to clone an original templatevm so clone debian-10 to debian-10-crypto go to debian-10-crypto terminal sudo apt update sudo apt upgrade sudo apt chromium then we want to edit a rules file sudo adduser user plugdev sudo nano /etc/udev/rules.d/20-hw1.rules and paste this in SUBSYSTEMS=="usb", ATTRS{idVendor}=="2581", ATTRS{idProduct}=="1b7c", MODE="0660", OWNER="user", GROUP="plugdev" SUBSYSTEMS=="usb", ATTRS{idVendor}=="2581", ATTRS{idProduct}=="2b7c", MODE="0660", OWNER="user", GROUP="plugdev" SUBSYSTEMS=="usb", ATTRS{idVendor}=="2581", ATTRS{idProduct}=="3b7c", MODE="0660", OWNER="user", GROUP="plugdev" SUBSYSTEMS=="usb", ATTRS{idVendor}=="2581", ATTRS{idProduct}=="4b7c", MODE="0660", OWNER="user", GROUP="plugdev" SUBSYSTEMS=="usb", ATTRS{idVendor}=="2581", ATTRS{idProduct}=="1807", MODE="0660", OWNER="user", GROUP="plugdev" SUBSYSTEMS=="usb", ATTRS{idVendor}=="2581", ATTRS{idProduct}=="1808", MODE="0660", OWNER="user", GROUP="plugdev" SUBSYSTEMS=="usb", ATTRS{idVendor}=="2c97", ATTRS{idProduct}=="0000", MODE="0660", OWNER="user", GROUP="plugdev" SUBSYSTEMS=="usb", ATTRS{idVendor}=="2c97", ATTRS{idProduct}=="0001", MODE="0660", OWNER="user", GROUP="plugdev" KERNEL=="hidraw*", SUBSYSTEM=="hidraw", MODE="0660", OWNER="user", GROUP="plugdev", ATTRS{idVendor}=="2c97" KERNEL=="hidraw*", SUBSYSTEM=="hidraw", MODE="0660", OWNER="user", GROUP="plugdev", ATTRS{idVendor}=="2581" shutdown debian-10-crypto completely Create AppVM (This is where you will run Ledger Live, Metamask and Chromium) Go to Qube Manager -> Qube -> Create new qube Name: ledger-VM Type: Qube based on a template (AppVM) Template: debian-10-crypto networking: default (sys-firewall) or sys-whonix, or a vpn if you setup a vpn network qube checkmark: launch settings after creation Give this a color In settings, I give some more hard drive space, also go to applications tab and bring the chromium app into the right so its easier to load Run Chromium from this new appVM, type in metamask.io and download the chromium plugin. Setup metamask like usual with new seed or import seed. In metamask you want to get to the menu that says Connect Hardware Wallet. Go there and click the Ledger Icon. Now plug your Ledger in and go to Ethereum app on the device. Pass the usb ledger device through to ledger-VM. I just use the Qubes Devices icon at the top right . Wait about 10 seconds or so and then click connect in metamask. You should see your addresses pop up to use. An easy way to use Ledger Live in this same Qube is by downloading the app from Ledger https://www.ledger.com/ledger-live/download, go into terminal to the Downloads folder and chmod +x the appimage and run that. Do similar as above to connect but instead of going to Ethereum on the device, just stay on the main screen. I would unplug Ledger from usb, plug back in, go to main screen, then pass the USB through to ledger-VM. If wanting to use Metamask after. I unplugged device from USB, plug back in and go into Ethereum app and then pass the USB through. Don't forget to checkout https://ari.finance/ and enable smart contracts on your Ledger.
  2. Guide to installing Qbuntu (Ubuntu 20.04 - Focal Fossa) TemplateVM in Qubes Release 4.0.4-rc1 fedora-32 as of this writing, I did this on a fresh Qubes install on a couple year old Intel I7. This is similar but a better less steps way to create this. Xenial guide located here https://blockforums.org/topic/305-guide-to-installing-qbuntu-ubuntu-1604-xenial-templatevm-in-qubes-402-rc1/ Qubes Homepage - https://www.qubes-os.org/ Clone the vanilla Fedora templatevm, allow network access, and private storage max size 30gb, I called my clone ubuntu-builder. Open up a terminal in the ubuntu-builder templatevm. Import the Qubes master key gpg --import /usr/share/qubes/qubes-master-key.asc Verify its fingerprint, set as ‘trusted’. This is described here. https://www.qubes-os.org/security/verifying-signatures/ Download the Qubes developers’ keys. wget https://keys.qubes-os.org/keys/qubes-developers-keys.asc gpg --import qubes-developers-keys.asc Download the latest stable qubes-builder repository: git clone https://github.com/QubesOS/qubes-builder.git /home/user/qubes-builder/ Verify the integrity of the downloaded repository. The last line should read gpg: Good signature from… cd /home/user/qubes-builder/ git tag -v $(git describe) Run the ‘setup’ script located in ‘/home/user/qubes-builder/’ Make sure you are in directory ‘qubes-builder’ cd /home/user/qubes-builder/ ./setup Y to add whats missing then yes to add missing keys select 4.0 stable dont select current or current-testing yes (to only build the template) select focal fossa+desktop with spacebar and push enter NEED TO CHANGE IMAGE HERE and get all brand new images of the current process, even though its basically the same. select Builder-rpm builder-debian only, nothing else. (need to update to latest focal fossa image below) The last step to build took me a little over an hour for the whole thing. make install-deps make get-sources make qubes-vm make template We have our Ubuntu 20.04 template, now to install it! Qubes-builder should have created an install script, let's make sure it exists: [user@ubuntu-builder qubes-builder]$ ls -altr qubes-src/linux-template-builder/rpm You should see an 'install-template.sh' file there. Now switch back to your dom0 terminal, and install the template: [user@dom0 ~]$ qvm-run --pass-io ubuntu-builder 'cat /home/user/qubes-builder/qubes-src/linux-template-builder/rpm/install-templates.sh' > install-templates.sh Make the copied script executable and run it [user@dom0 ~]$ chmod +x install-templates.sh [user@dom0 ~]$ ./install-templates.sh #make template (clone) just for denarius, why not in dom0 terminal emulator qvm-clone focal-fossa-desktop denarius-crypto To make the user have a password for sudo. Use this https://www.reddit.com/r/Qubes/comments/e39r8l/ubuntu_1804_lts_template_password/ dom0 terminal (change focal-fossa-desktop and newpassword) qvm-run -a --user root focal-fossa-desktop "echo \"user:newpassword\"|chpasswd" dom0 terminal qvm-run -a --user root focal-fossa-desktop "sudo usermod -a -G sudo user" shutdown your focal-fossa-desktop and now try sudo apt update
  3. Guide to installing Qbuntu (Ubuntu 16.04 - Xenial) TemplateVM in Qubes 4.0.2-rc1 fedora-30 as of this writing, I did this on a fresh Qubes install on a Lenovo t450 i7, 8gb ram, 256gb samsung ssd ($280 - ebay) https://www.qubes-os.org/ Some of the initial setup below doesn't work for me as of this writing. Import the Qubes master key gpg --import /usr/share/qubes/qubes-master-key.asc Verify its fingerprint, set as ‘trusted’. This is described here. Download the Qubes developers’ keys. wget https://keys.qubes-os.org/keys/qubes-developers-keys.asc gpg --import qubes-developers-keys.asc Download the latest stable qubes-builder repository: git clone https://github.com/QubesOS/qubes-builder.git /home/user/qubes-builder/ Verify the integrity of the downloaded repository. The last line should read gpg: Good signature from… cd /home/user/qubes-builder/ git tag -v $(git describe) Install the remaining dependencies make install-deps Run the ‘setup’ script located in ‘/home/user/qubes-builder/’ Make sure you are in directory ‘qubes-builder’ cd /home/user/qubes-builder/ ./setup Basic Idea (but does not work, don't even bother trying to decipher their ubuntu guide as its for someone who somehow knows how to do this already) https://www.qubes-os.org/doc/building-archlinux-template/ Reddit Guide (copying some of the steps from this old guide with some edits to work on Qubes 4.0 as this was written for Qubes 3.2) https://www.reddit.com/r/Qubes/comments/5vzg04/idiots_guide_to_installing_qbuntu_ubuntu_1604/ #gpg stuff from qubes themselves reference: https://wiki.qubes.rocks/Security/VerifyingSignatures Lets Begin Clone your fedora-30 vanilla template into a temporary 'builder' we will use to create Ubuntu templates. [user@dom0 ~]$ qvm-clone fedora-30 ubuntu-builder Edit the VM Settings for the newly created template 'ubuntu-builder' (via Qubes Manager GUI), enable 'Allow network access' & increase 'Private storage max size' to 30GB, then start a terminal in ubuntu-builder and initialize GPG [user@ubuntu-builder ~]$ gpg Break out of "type your message..." with CTRL+C, import Qubes master key [user@ubuntu-builder ~]$ gpg --recv-keys 0x36879494 Set trust level for qubes master key [user@ubuntu-builder ~]$ gpg --edit-key 36879494 gpg> trust >Your decision? 5 >Do you really want to set this key to ultimate trust? Y gpg> quit Now retrieve and import Qubes developer keys [user@ubuntu-builder ~]$ wget http://keys.qubes-os.org/keys/qubes-developers-keys.asc [user@ubuntu-builder ~]$ gpg --import qubes-developers-keys.asc #install nano [user@ubuntu-builder ~]$ sudo dnf install nano Install the packages we need to retrieve and run qubes-builder [user@ubuntu-builder ~]$ sudo dnf install git createrepo rpm-build rpm-sign make python-sh rpmdevtools rpm-sign dialog Retrieve the qubes-builder from GIT repository [user@ubuntu-builder ~]$ git clone https://github.com/QubesOS/qubes-builder [user@ubuntu-builder ~]$ cd qubes-builder Edit default config to enable debian_builder only in setup script (example used VI but you can use text editor of your choice, like nano installed above) [user@ubuntu-builder qubes-builder]$ vi example-configs/qubes-os-r4.0.conf (to check our current version installed, go to Qube Manager -> About -> Qubes OS) Change these lines to look like this DIST_DOM0 ?= fc30 DISTS_VM ?= hint: DOM0 distro being fc30 in this Qubes install, & remove "fc30 buster" from above save and exit (shift-z-z if using vi) Setup qubes-builder and compile the template Run the qubes-builder setup script [user@ubuntu-builder qubes-builder]$ ./setup Y to add whats missing then yes to add missing keys this failed on me the first time, I ctrl+c and reran ./setup again, did Y again, and it found the keys that were missing after selecting YES, had to even shutdown the qube and try again as it kept glitching out trying to retrieve keys select 4.0 stable dont select current or current-testing (wtf? is this madness) yes (to only build the template) select xenial+desktop with spacebar and push enter select Builder-rpm builder-debian only, nothing else. (I was using the guide to test installing Bionic 18.04 for screenshots) #now you are back at the command prompt and type these in, one by one. The last 2 will take some time so go to Denarius discord and chat with us while waiting. https://discord.gg/7zcwXJN make install-deps make get-sources make qubes-vm make template We have our Ubuntu 16.04 template, now to install it! Qubes-builder should have created an install script, let's make sure it exists: [user@ubuntu-builder qubes-builder]$ ls -altr qubes-src/linux-template-builder/rpm You should see an 'install-template.sh' file there. Now switch back to your dom0 terminal, and install the template: [user@dom0 ~]$ qvm-run --pass-io ubuntu-builder 'cat /home/user/qubes-builder/qubes-src/linux-template-builder/rpm/install-templates.sh' > install-templates.sh Make the copied script executable and run it [user@dom0 ~]$ chmod +x install-templates.sh [user@dom0 ~]$ ./install-templates.sh #make template (clone) just for denarius, why not in dom0 terminal emulator qvm-clone xenial-desktop denarius-crypto goto qubes-settings for denarius-crypto qube and add your network (I used sys-whonix running tor), run terminal and start to compile the wallet I am choosing color purple background to break out any crypto stuff so I know be careful ignore any errors (pulse audio) #compile denarius QT in template: denarius-crypto sudo apt-get update -y && sudo apt-get upgrade -y sudo apt-get install -y git unzip build-essential libssl-dev libdb++-dev libboost-all-dev libqrencode-dev libminiupnpc-dev libevent-dev autogen automake libtool libqt5gui5 libqt5core5a libqt5dbus5 qttools5-dev qttools5-dev-tools qt5-default git clone https://github.com/carsenk/denarius cd denarius git checkout master git pull qmake "USE_QRCODE=1" "USE_UPNP=1" denarius-qt.pro make -j2 sudo cp Denarius /usr/local/bin #setup appvm with name reference: https://www.qubes-os.org/doc/managing-appvm-shortcuts/ sudo nano /usr/share/applications/denarius.desktop [Desktop Entry] Version=3.3.9.2 Type=Application Terminal=false Icon=/home/user/denarius/src/qt/res/icons/denarius-256.png Name=Denarius GenericName=wallet Comment=Denarius Categories=crypto;cryptocurrency; Exec=Denarius in dom0 run qvm-sync-appmenus denarius-crypto now you can add Denarius to your app selection list in the template select denarius from your template: denarius-crypto and start syncing eet Â
  4. How to install bionic-builder template for Ubuntu 18.04 in Qubes OS 4.0.2-rc1, Qbuntu Clone your fedora-30 vanilla template into a temporary 'builder' we will use to create Ubuntu templates. Top left button -> Terminal Emulator [user@dom0 ~]$ qvm-clone fedora-30 ubuntu-builder go into the bionic-builder template and pick your network (sys-firewall), and give yourself 30gb for private storage. Open the terminal for this template and begin. [user@ubuntu-builder ~]$ gpg I missed the receive keys screenshot [user@ubuntu-builder ~]$ gpg --recv-keys 0x36879494 [user@ubuntu-builder ~]$ gpg --edit-key 36879494 gpg> trust >Your decision? 5 >Do you really want to set this key to ultimate trust? Y gpg> quit [user@ubuntu-builder ~]$ wget http://keys.qubes-os.org/keys/qubes-developers-keys.asc [user@ubuntu-builder ~]$ gpg --import qubes-developers-keys.asc [user@ubuntu-builder ~]$ sudo dnf install nano [user@ubuntu-builder ~]$ sudo dnf install git createrepo rpm-build rpm-sign make python-sh rpmdevtools rpm-sign dialog [user@ubuntu-builder ~]$ git clone https://github.com/QubesOS/qubes-builder [user@ubuntu-builder ~]$ cd qubes-builder [user@ubuntu-builder qubes-builder]$ nano example-configs/qubes-os-r4.0.conf [user@ubuntu-builder qubes-builder]$ ./setup select Y to anything missing Select Yes to keys that don't exist. Select Yes to add, this one glitches out for me, but worked first try writing this. Just keep rerunning ./setup over and over until this passes through. If this still won't work, change the pgp.mit.edu server to something else in the setup file. nano setup GPG_KEY_SERVER = 'ha.pool.sks-keyservers.net ' Select Qubes Release 4.0 Select Stable Select none of these options Build Template Only? Yes Select your OS template, this example is using Bionic+desktop Select builder-rpm and builder-debian Get Source? Yes Wait while this gets what the source files. This screen gives us what to do next. make install-deps make get-sources make qubes-vm make template [user@ubuntu-builder qubes-builder]$ ls -altr qubes-src/linux-template-builder/rpm Go to your dom0 terminal and move the install-templates.sh file over [user@dom0 ~]$ qvm-run --pass-io ubuntu-builder 'cat /home/user/qubes-builder/qubes-src/linux-template-builder/rpm/install-templates.sh' > install-templates.sh [user@dom0 ~]$ chmod +x install-templates.sh ./install-templates.sh After this was done, I cloned this into a crypto version to play around in. This is a cryptocurrency related site after all. qvm-clone bionic-desktop bionic-crypto After that, I then deleted the bionic-builder templateVM from Qube Manager to save some disk space.
  5. How to create standalone qube from debian-10-crypto template Name: Coinomi type: Standalone qube copied from a template template: debian-10-crypto networking: default (sys-firewall) go to firefox for this new qube and download Coinomi wallet for linux open terminal and cd ~/Downloads cp coinomi-wallet-<version>.tar.gz ~/ cd ~ tar -xzvf coinomi-wallet-<version>.tar.gz link the Coinomi exec to your usr/local/bin folder sudo ln -s ~/Coinomi/Coinomi /usr/local/bin now we want to use coinomi-wallet.desktop to setup the easy click menu copy the contents of that file to /usr/share/applications/coinomi-wallet.desktop sudo nano /usr/share/applications/coinomi-wallet.desktop coinomi-wallet.desktop [Desktop Entry] Name=Coinomi Wallet Type=Application Categories=Financial Exec=Coinomi Icon=/home/user/Coinomi/icons.png MineType=text/html; Keywords=Bitcoin;Coinomi;Crypto;Denarius; save this go back to your Coinomi Qube -> qube settings -> applications -> refresh applications Launch Coinomi Wallet from the Coinomi Qube NOTE: I have no idea where the default icon is located
  6. A guide on how to setup Windows 10 in Qubes 4.0.2-rc1, and then how to login using RDP in a Fedora Qube for clipboard anf file sharing. If you are finding this tutorial, I am going to skip some of the basic how to install Windows 10 shenanigans, as that's a bit redundant. First read through the original guide a few times to get a feel for this. https://groups.google.com/d/msg/qubes-users/dB_OU87dJWA/X2WWa1y-BQAJ What I did was get the Win10 ISO from MS download tool and put that windows.ISO file on a usb drive. https://www.microsoft.com/en-us/software-download/windows10 I then took this file and put it inside a qube's download folder. Once there we use the official Qubes docs. Choose your qube and folder the ISO was placed in for the last step here. https://www.qubes-os.org/doc/windows-vm/ Create a new Qube: Name: Win10, Color: red Standalone Qube not based on a template Networking: sys-firewall (default) Launch settings after creation: check Click “OKâ€�. Settings: Basic: System storage: 30000+ MB Advanced: Include in memory balancing: uncheck Initial memory: 4096+ MB Kernel: None Mode: HVM Click "Apply". Click "Boot from CDROM": "from file in qube": Select the qube that has the ISO. Select ISO by clicking"¦". Click 'OK" to boot into the windows installer. Setup Windows 10 as usual, each time the Qube resets the VM will close, keep starting up again until you get to the login screen. Make sure to put some type of password in as we will use this username and password to login through RDP later in the guide. Setup RDP in Windows 10. Enable Remote Desktop in Settings > System Next we need a Fedora qube running freerdp and a firewall qube. I cloned the Fedora 30 template and sys-firewall templates. Because sys-firewall is based off of the Fedora 30 template lets install freerdp in there, I also installed nano since I prefer that to edit files. open up terminal in fedora-30 templateVM. sudo dnf --refresh install freerdp sudo dnf install nano Clone the sys-firewall qube and I called mine sys-firewall-RDP so I knew which one to mess around with. Clone fedora-30 templateVM and use sys-firewall-RDP for your network, call it whatever, fedora-RDP for eaxmple. Lets get the firewall to talk between Win10 qube and our new fedora-RDP qube. We need the IP addresses of both of these qubes for the next step. Open a terminal in sys-firewall-RDP qube. Example Qube A - fedora-RDP (10.137.0.31) Qube B - Win10 (10.137.0.30) sudo nano /rw/config/qubes-firewall-user-script iptables -I FORWARD 2 -s 10.137.0.30 -d 10.137.0.31 -j ACCEPT iptables -I FORWARD 2 -s 10.137.0.31 -d 10.137.0.30 -j ACCEPT save this and next file to edit sudo nano /rw/config/rc.local iptables -I INPUT -s 10.137.0.30 -j ACCEPT iptables -I INPUT -s 10.137.0.31 -j ACCEPT Restart the sys-firewall-RDP qube. Open fedora-RDP terminal and Win10 qubes. I was able to ping 10.137.0.30 from fedora-RDP and now we are getting close. a sample run of freerdp xfreerdp /u:<USERNAME> /p:<PASSWORD> /v:<WIN10 QUBE IP>:3389 or xfreerdp /u:buzzkillb /p:denariusrocks /v:10.137.0.30:3389 Some magic should happen and now you RDP'd into Windows 10. Lets add clipboard sharing and file sharing. xfreerdp /u:buzzkillb /p:denariusrocks /v:10.137.0.30:3389 /drive:software,/home/user/Downloads /clipboard this will create a Windows shared folder called software in the fedora-RDP qube and share with /home/user/Downloads and also allow copy and paste text. lets just show some extra power of this. regedit this to 1 in your Windows 10 Qube. https://getadmx.com/?Category=Windows_10_2016&Policy=Microsoft.Policies.TerminalServer-Server::TS_ALLOW_APPS xfreerdp /u:buzzkillb /p:denariusrocks /v:10.137.0.30:3389 /drive:software,/home/user/Downloads /clipboard /app:"C:\Windows\explorer.exe" This line will open a windows of just the Windows File Explorer. I ended up creating a start.sh file with these lines like this. start.sh #!/bin/sh xfreerdp /u:buzzkillb /p:denariusrocks /v:10.137.0.30:3389 /drive:software,/home/user/Downloads /clipboard /app:"C:\Windows\explorer.exe" What would be sweet is putting start.sh into /usr/local/bin and creating a desktop icon in the fedora-RDP qube, to pull these things up like they are in typical Qubes format. I will add more as I play around with this. Next will also be how to run a GPU for games.
  7. I am using the Ubuntu 16.04 template I created for this. https://denariustalk.org/index.php?/topic/305-guide-to-installing-qbuntu-ubuntu-1604-xenial-templatevm-in-qubes-402-rc1/ Now create an AppVM. Top left button -> Create Qubes VM. Name and Label: VerusCoin-Agama Type: Qubes based on a template (AppVM) template: whichever linux template you created to run Agama from networking: sys-firewall or sys-whonix checkmark launch settings after creation. Give this 2gb ram at least. Go to firefox from this AppVM and download the latest Agama wallet. Go to the Files from this AppVM and double click the appimage in the /Downloads folder. When it prompts to install, say yes. Go to the top left button and click Terminal Emulator because we want to configure dom0. In there type qvm-sync-appmenus VerusCoin-Agama now go back to your VerusCoin qube settings, go to the applications tab and then you can bring the Agama app to the right side so this gets added to the menu.
×
×
  • Create New...