Re: [qubes-users] No space left on device
On Oct 13, 2017 20:56, "Franz" <169...@gmail.com> wrote: On Oct 13, 2017 19:32, "Marek Marczykowski-Górecki" < marma...@invisiblethingslab.com> wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Oct 13, 2017 at 06:27:31PM -0300, Franz wrote: > whonix was not working so tried to reinstall it for 3.2Qubes with this > command > > $ sudo qubes-dom0-update --enablerepo=qubes-templates-community > --action=reinstall qubes-template-whonix-ws > > However while it worked for whonix-gw I am getting the following error > for whonix-ws after the long download: > > qfile-agent: Fatal error: File copy: No space left on device; Last > file: qubes-template-whonix-ws-3.0.6-201608050146.noarch.rpm (error > type: No space left on device) > '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates > /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' > failed with exit code 1! > > > No space left on device? Running df -h on dom0 the most used item is: > > /dev/dm-1 82%, used 189G available 43G which should be more than > enough for a less than 700MB download > > So where should I look for? Template (and generally packages) is downloaded to /var/lib/qubes/updates in dom0. Maybe you have something smaller mounted there? There I found only the following: /var/lib/qubes/updates/rpm/ qubes-template-whonix-ws-3.0.6-201...noarch.rpm Doing du -h There gives 191M which is very smaller than the 43G I expected. But the fact that some space is still available suggests that the template was fully downloaded and I do not have to download it again. Correct? You may want to try --clean option, to clean cache first. It seems --clean is an option for a command. Which command? I understood, it is the same update command. But running it, it replies 0 files removed. So it may not help. Is there a easy way to increase space? Many thanks - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJZ362XAAoJENuP0xzK19csSFoH/2+mrNpp/Wkq6YprpNvPZVD2 sRmkDaVqCgFDET+ZvoUQV96W3oojZIsBm7l6jT8HLKHuVu2lwQ/KaRyF9ITMU0zt 17uzZTYzIA0Mhh16A3G4xAsX/y/VZw3jU9RWi0hfVIX6BR1da75M8Ey8g7wqAJ12 dflzBdehM4jnBC1X0HTC+EUKuPJ9xSvkbtYXjwGUTMFyOzxZv9cKjSM+br1SuCej 893a3EnMUS0OKkFqg8EhzTy5vh1PrMpL7gjmTX+6H10UyrRNc0RUhsANLwb479T6 Ghct221AoauP5MdvCti3C9I6PO50kKFdISGXtNeXcblQCq7+a8sQBigqqpkEaY8= =4RQ9 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qBWRzLxNZU6MgLC0GNVh_yyxw1y5aWiGvooX%2B%2Bb97H6PA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] No space left on device
On Oct 13, 2017 19:32, "Marek Marczykowski-Górecki" < marma...@invisiblethingslab.com> wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Oct 13, 2017 at 06:27:31PM -0300, Franz wrote: > whonix was not working so tried to reinstall it for 3.2Qubes with this > command > > $ sudo qubes-dom0-update --enablerepo=qubes-templates-community > --action=reinstall qubes-template-whonix-ws > > However while it worked for whonix-gw I am getting the following error > for whonix-ws after the long download: > > qfile-agent: Fatal error: File copy: No space left on device; Last > file: qubes-template-whonix-ws-3.0.6-201608050146.noarch.rpm (error > type: No space left on device) > '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates > /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' > failed with exit code 1! > > > No space left on device? Running df -h on dom0 the most used item is: > > /dev/dm-1 82%, used 189G available 43G which should be more than > enough for a less than 700MB download > > So where should I look for? Template (and generally packages) is downloaded to /var/lib/qubes/updates in dom0. Maybe you have something smaller mounted there? There I found only the following: /var/lib/qubes/updates/rpm/qubes-template-whonix-ws-3.0.6-201...noarch.rpm Doing du -h There gives 191M which is very smaller than the 43G I expected. But the fact that some space is still available suggests that the template was fully downloaded and I do not have to download it again. Correct? You may want to try --clean option, to clean cache first. It seems --clean is an option for a command. Which command? Many thanks - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJZ362XAAoJENuP0xzK19csSFoH/2+mrNpp/Wkq6YprpNvPZVD2 sRmkDaVqCgFDET+ZvoUQV96W3oojZIsBm7l6jT8HLKHuVu2lwQ/KaRyF9ITMU0zt 17uzZTYzIA0Mhh16A3G4xAsX/y/VZw3jU9RWi0hfVIX6BR1da75M8Ey8g7wqAJ12 dflzBdehM4jnBC1X0HTC+EUKuPJ9xSvkbtYXjwGUTMFyOzxZv9cKjSM+br1SuCej 893a3EnMUS0OKkFqg8EhzTy5vh1PrMpL7gjmTX+6H10UyrRNc0RUhsANLwb479T6 Ghct221AoauP5MdvCti3C9I6PO50kKFdISGXtNeXcblQCq7+a8sQBigqqpkEaY8= =4RQ9 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qB4cPAn4ejOD8Q%3D%3DZdwAh28%3DnD-OMon3FgeOmMd8%3DHDMg%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Install a CentOS HVM with a debug-window = mo seamless mode
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Oct 13, 2017 at 01:11:05AM -0400, '[799]' via qubes-users wrote: > Hello, > > I'd like to switch from using VMware Workstation to Qubes to test/specific > software for customers. > > I want to setup a CentOS HVM and created a HVM, attached a CentOS minimal ISO > and installed it without any problem. > After restart I was unable to get a Terminal window as qrexec is not > installed. > I tried to boot into a normal "HVM-window" by disabling seamless mode and > enabling Debug mode, but I could get any window. Did you switched "guiagent_installed" and/or "qrexec_installed" properties? Both should be set to "false", unless you really installed those components inside. > Questions: > > a) how can I get a terminal window to install additional applications Without qubes packages inside, the only option is emulated VGA window - make sure both guiagent_installed and qrexec_installed are set to false. > b) can I install the missing Qubes parts later on to get seamless mode > working and to launch applications from dom0 (qrexec...) Not easily. Theoretically both qrexec and gui agent should just work, but in practice packages shipping them depends on specific system configuration - for example system being installed on /dev/xvda, without partition table. This is improved for Qubes OS 4.0 - packages are split into smaller parts and it is possible to install just parts you want, without the whole system reconfiguring stuff. Also, for Qubes OS 4.0 recently we've got repository with CentOS 7 packages: https://yum.qubes-os.org/r4.0/current-testing/vm/centos7/ I hope there will also pre-built template available soon. But for now, if you're brave enough, you can add the above repository (key for package verification is here: https://github.com/QubesOS/qubes-builder-centos/blob/master/keys/RPM-GPG-KEY-qubes-4-centos) and install qubes-core-agent-qrexec and qubes-gui-agent. Make a VM backup first... > c) is it possible to create a standalone HVM based on an existing Qubes > template? Yes, qvm-create --standalone --template TEMPLATE_NAME ... - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJZ37a4AAoJENuP0xzK19csW3MH+wZhVWtLc3AGra2EYn/OzIRq QHPGFE3tE3J5/3MSKRUJYJrpnSLw2Ce4+Cw9D7QIYm7f2QdKs2rYzixqZQHFkdeS iFprJf9WcdP2YFAAZK81RHCENlMoWJYfgAWDm/XBwD7rZGojmVCs7Yb1LFWFoo8U WIkXTSbnv+VAWGzdg5dfh12hZEgk8SOQpkMOf+ozIayy9wzYH2S3HEK04idgCmEi H0w/xsbdus6AApkCEYohx2zw4HuyB8RvqQRHik3hI5vl/NPI9HWeQlx/nlT+Gdl+ nsI9elRme1Bo6CtHjsteHG5wUnmG3zcAe2s9fGUTtSLTI0gaMVlcO0UfB4vpU8A= =QfUj -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20171013231104.GH10749%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] No space left on device
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Oct 13, 2017 at 06:27:31PM -0300, Franz wrote: > whonix was not working so tried to reinstall it for 3.2Qubes with this > command > > $ sudo qubes-dom0-update --enablerepo=qubes-templates-community > --action=reinstall qubes-template-whonix-ws > > However while it worked for whonix-gw I am getting the following error > for whonix-ws after the long download: > > qfile-agent: Fatal error: File copy: No space left on device; Last > file: qubes-template-whonix-ws-3.0.6-201608050146.noarch.rpm (error > type: No space left on device) > '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates > /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' > failed with exit code 1! > > > No space left on device? Running df -h on dom0 the most used item is: > > /dev/dm-1 82%, used 189G available 43G which should be more than > enough for a less than 700MB download > > So where should I look for? Template (and generally packages) is downloaded to /var/lib/qubes/updates in dom0. Maybe you have something smaller mounted there? You may want to try --clean option, to clean cache first. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJZ362XAAoJENuP0xzK19csSFoH/2+mrNpp/Wkq6YprpNvPZVD2 sRmkDaVqCgFDET+ZvoUQV96W3oojZIsBm7l6jT8HLKHuVu2lwQ/KaRyF9ITMU0zt 17uzZTYzIA0Mhh16A3G4xAsX/y/VZw3jU9RWi0hfVIX6BR1da75M8Ey8g7wqAJ12 dflzBdehM4jnBC1X0HTC+EUKuPJ9xSvkbtYXjwGUTMFyOzxZv9cKjSM+br1SuCej 893a3EnMUS0OKkFqg8EhzTy5vh1PrMpL7gjmTX+6H10UyrRNc0RUhsANLwb479T6 Ghct221AoauP5MdvCti3C9I6PO50kKFdISGXtNeXcblQCq7+a8sQBigqqpkEaY8= =4RQ9 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20171013223207.GG10749%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] wifi problems- trying to install rtlwifi_new driver
Hi guys, before qubes os I had ubuntu 17.04 and I had wifi problems until I installed the driver "rtlwifi_new" on github (https://github.com/lwfinger/rtlwifi_new). After the installation it worked. With fedora 24 I didn`t have problems with the internet connection but with the netvm, which runs now at fedora 25, I have the same problems like I had on ubuntu. So I decided to download the "rtlwifi_new" at the fedora template 25. Than I copied to the netvm. I don`t know to install that driver and I need your help! Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/34675b26-d2af-4546-902e-c3e1b4085a4a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] No space left on device
whonix was not working so tried to reinstall it for 3.2Qubes with this command $ sudo qubes-dom0-update --enablerepo=qubes-templates-community --action=reinstall qubes-template-whonix-ws However while it worked for whonix-gw I am getting the following error for whonix-ws after the long download: qfile-agent: Fatal error: File copy: No space left on device; Last file: qubes-template-whonix-ws-3.0.6-201608050146.noarch.rpm (error type: No space left on device) '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed with exit code 1! No space left on device? Running df -h on dom0 the most used item is: /dev/dm-1 82%, used 189G available 43G which should be more than enough for a less than 700MB download So where should I look for? Best Fran -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qD8wqrArSUv1xVSU_%3D4cfNORzP5fWtG%2BnX9nLkMsVU08g%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Disposable service VMs in 4.0rc1
On 10/13/2017 03:27 PM, Marek Marczykowski-Górecki wrote: On Fri, Oct 13, 2017 at 02:48:59PM +0200, David Hobach wrote: On 10/13/2017 02:24 PM, David Hobach wrote: The second instance will not start. The point is in Qubes 4.0 you can create DisposableVM, which have no persistent data (like private.img or root.img), but is persistent in terms of metadata (name, devices etc). I'm also curious whether starting a VM with a dependency to a stopped dvm-template will start a dvm or the template itself? What about VM autostart during boot? This all should work like with any other VM. The only difference is that VM restart revert VM data to the original state. I haven't tried exactly this configuration, but it should be something like this: # allow to create DispVMs based on sys-net; you can also use other VM # here, like fedora-25-dvm qvm-prefs sys-net template_for_dispvms true # create disposable netvm; all properties will be inherited from # sys-net (including 'autostart', 'provides_network' etc) qvm-create --class DispVM --template sys-net -l red disp-sys-net # detach network devices from sys-net and attach to disp-sys-net qvm-pci del sys-net dom0:02_00.0 qvm-pci add disp-sys-net dom0:02_00.0 # and set disp-sys-net as netvm, wherever you want qvm-prefs sys-firewall netvm disp-sys-net Thanks for the explanations! So basically with 4.0rc1 uniquely named & single instance dispVMs were introduced. That's awesome & quite some news by itself, thanks! At first sight I hadn't noticed it as the term dispVM may refer to generic dispVM instances disp[XYZ] or their templates as well. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d6c6ba0a-3258-cf69-415e-f1ce14d93590%40hackingthe.net. For more options, visit https://groups.google.com/d/optout. smime.p7s Description: S/MIME Cryptographic Signature
Re: [qubes-users] Can't login to VM after upgrade to fedora 26
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Oct 12, 2017 at 10:37:29PM -0700, nicholas roveda wrote: > I've upgraded a fedora-25 template in R4.0 rc1/current-testing to fedora-26 > and now the VM stops at login(tty1). > It doesn't let me login as 'user', but only as root and after few seconds > being root, the VM shutdowns. > > Upgrade commands: > `sudo dnf clean all` > `sudo dnf --best --allowerasing --releasever=26 distro-sync` Do you remember what packages got removed? I guess you removed qubes-core-agent during the process. Do you have enabled current-testing repository permanently (enabled=1 in /etc/yum.repos.d/...)? If not, the above command lack --enablerepo=qubes*current-testing In any case, there is also prebuilt fedora-26 template available, you can install it with qubes-dom0-update qubes-template-fedora-26. You can see list of templates here: https://yum.qubes-os.org/r4.0/templates-itl/rpm/ https://yum.qubes-os.org/r4.0/templates-community/rpm/ > Is there any way to fix the Template? > And what about the trimming, since `qvm-trim-template` is gone? It isn't needed anymore, thanks to LVM thin provisioning. You may want to call `fstrim -v /` in the template after updating. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJZ3zTnAAoJENuP0xzK19cs5TEH/i1rfyv1tWf3YnyIM0eRz/Lk VU8iIo8yQI3azIuIB3nW56whMY1ZERDkBMnxwnR1wSopr9iU2GB0cU2jjMvrJS8U s3c8ydJR8eP9ZYyETavhup555EC38WQi6Iet4rdTHDBcM2ugdlBY5BjWsg52BFrP enQMpFRTj5wQRdiE0/4eeCOPQ/vz3fGMqeFCmUxvHbyJ2aaKXlIWxTDsu8CmUvdA seLCk1L8TqNF1cXN021k9jYe9A5Iz60zRjTdqB4vlZ19afySVNg17x6l4ndS/r/q nUUOXd9PvKFqH58+yJGTQL5vNkRyufzUW6vbkLr+xcww2hRmbOEQQ/f1R3zsm6w= =/Ket -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20171013135714.GE10749%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Disposable service VMs in 4.0rc1
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Oct 13, 2017 at 02:48:59PM +0200, David Hobach wrote: > On 10/13/2017 02:24 PM, David Hobach wrote: > > Hi all, > > > > did anyone test disposable VMs for sys-net, sys-firewall and sys-usb in > > 4.0rc1 yet? > > > > Especially since the installed defaults appear to be non-disposable if I > > recall correctly. > > > > According to [1] this is meant to be working though for at least sys-net > > & sys-usb. It doesn't say anything about sys-firewall, i.e. I'm not so > > sure whether that will break some Qubes core mechanics... This should work, but of course all changes in made directly there will be lost after restart. So, for example setting wifi password using network manager. This is one of the reasons why default setup still use non-disposable VMs there. > Plus what happens with your network card when you start the second instance > of a sys-net dvm? The second instance will not start. The point is in Qubes 4.0 you can create DisposableVM, which have no persistent data (like private.img or root.img), but is persistent in terms of metadata (name, devices etc). > > I'm also curious whether starting a VM with a dependency to a stopped > > dvm-template will start a dvm or the template itself? What about VM > > autostart during boot? This all should work like with any other VM. The only difference is that VM restart revert VM data to the original state. I haven't tried exactly this configuration, but it should be something like this: # allow to create DispVMs based on sys-net; you can also use other VM # here, like fedora-25-dvm qvm-prefs sys-net template_for_dispvms true # create disposable netvm; all properties will be inherited from # sys-net (including 'autostart', 'provides_network' etc) qvm-create --class DispVM --template sys-net -l red disp-sys-net # detach network devices from sys-net and attach to disp-sys-net qvm-pci del sys-net dom0:02_00.0 qvm-pci add disp-sys-net dom0:02_00.0 # and set disp-sys-net as netvm, wherever you want qvm-prefs sys-firewall netvm disp-sys-net - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJZ3y3iAAoJENuP0xzK19csjlYIAIAZ42rTS8pQucjPCGRKdqx0 zq0TeDpFnbprfVhWKhjqpunwcycTYh+iNe/RaDUBF6gp07J2E6PKu1OYWGBLPuXx pdh8LDXu9rldNkRAlc+oeFacnH6cK5lo46qwr90uD59SfXaJ36eTMJavwnHqDbE+ gvxJ3YzbtEM3NMl+IT4zm7jLMD78KG9LyttlWusibElEGPj0EL/+AKg74QzzI+qw DPa5+uaBpEfjPKg6C9XVXgGri7CuqKrSQsZ0XmHL6F36ardMjLKztP1fJhyL426w 8Nfs3wvfyac+zOXezMEV4bP6TwdF9EeTUnjTJ1VI5kyPZLaRJsQDQEnN65l4Jb0= =Am1Y -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20171013132717.GC10749%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Disposable service VMs in 4.0rc1
On 10/13/2017 02:24 PM, David Hobach wrote: Hi all, did anyone test disposable VMs for sys-net, sys-firewall and sys-usb in 4.0rc1 yet? Especially since the installed defaults appear to be non-disposable if I recall correctly. According to [1] this is meant to be working though for at least sys-net & sys-usb. It doesn't say anything about sys-firewall, i.e. I'm not so sure whether that will break some Qubes core mechanics... Plus what happens with your network card when you start the second instance of a sys-net dvm? I'm also curious whether starting a VM with a dependency to a stopped dvm-template will start a dvm or the template itself? What about VM autostart during boot? KR David [1] https://blog.invisiblethings.org/2017/10/03/core3.html "This provides lots of flexibility, e.g. it’s easy to create a customized DispVM for signing PDF documents, or various disposable service VMs, such as Net- and VPN- VMs. One just creates a normal AppVM, sets everything up there, e.g. loads keys, configures VPNs, connects to known WiFi networks, and then shuts down the AppVM and in place of it starts a DispVM based on that AppVM." -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e47f5b1b-4897-de22-7a3d-757705c8b302%40hackingthe.net. For more options, visit https://groups.google.com/d/optout. smime.p7s Description: S/MIME Cryptographic Signature
[qubes-users] Disposable service VMs in 4.0rc1
Hi all, did anyone test disposable VMs for sys-net, sys-firewall and sys-usb in 4.0rc1 yet? Especially since the installed defaults appear to be non-disposable if I recall correctly. According to [1] this is meant to be working though for at least sys-net & sys-usb. It doesn't say anything about sys-firewall, i.e. I'm not so sure whether that will break some Qubes core mechanics... I'm also curious whether starting a VM with a dependency to a stopped dvm-template will start a dvm or the template itself? What about VM autostart during boot? KR David [1] https://blog.invisiblethings.org/2017/10/03/core3.html "This provides lots of flexibility, e.g. it’s easy to create a customized DispVM for signing PDF documents, or various disposable service VMs, such as Net- and VPN- VMs. One just creates a normal AppVM, sets everything up there, e.g. loads keys, configures VPNs, connects to known WiFi networks, and then shuts down the AppVM and in place of it starts a DispVM based on that AppVM." -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bc278a29-4d57-e116-c19f-8c35ce392785%40hackingthe.net. For more options, visit https://groups.google.com/d/optout. smime.p7s Description: S/MIME Cryptographic Signature