On 17 May 2018 12:47:26 BST, awokd <[email protected]> wrote: >On Thu, May 17, 2018 6:03 am, Alex wrote: >> Hi all, >> >> In migrating multiple systems to Qubes 4.0 I noticed that sys-usb was >> unable to mount the LUKS encrypted hard drive that contained my Qubes >> backup. Looking into the logs I realised the process was getting >killed by >> oom-killer, which is invoked when the system has ran out of memory. >> >> Increasing the default allocated memory of sys-usb from 300MB to >500MB >> solved this issue. >> >> @devs: I would recommend fixing this default value out of the box. > >You shouldn't mount encrypted drives on sys-usb. Use qvm-block to >attach >the partition to a different VM, then mount it there.
Can you elaborate? 1. What's the security benefit? 2. What are the steps to correctly restore by Qubes backups from a USB disk? 3. Is there anything in the backup tool UI that guides users towards the workflow you describe? Thanks Alex -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/BA4D494A-111F-4B38-9756-112DB81CD44B%40gmail.com. For more options, visit https://groups.google.com/d/optout.
