On 17 May 2018 12:47:26 BST, awokd <[email protected]> wrote:
>On Thu, May 17, 2018 6:03 am, Alex wrote:
>> Hi all,
>>
>> In migrating multiple systems to Qubes 4.0 I noticed that sys-usb was
>> unable to mount the LUKS encrypted hard drive that contained my Qubes
>> backup. Looking into the logs I realised the process was getting
>killed by
>> oom-killer, which is invoked when the system has ran out of memory.
>>
>> Increasing the default allocated memory of sys-usb from 300MB to
>500MB
>> solved this issue.
>>
>> @devs: I would recommend fixing this default value out of the box.
>
>You shouldn't mount encrypted drives on sys-usb. Use qvm-block to
>attach
>the partition to a different VM, then mount it there.

Can you elaborate?

1. What's the security benefit?
2. What are the steps to correctly restore by Qubes backups from a USB disk?
3. Is there anything in the backup tool UI that guides users towards the 
workflow you describe?

Thanks

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/BA4D494A-111F-4B38-9756-112DB81CD44B%40gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to