Re: [qubes-users] No space left on device

2017-10-13 Thread Franz
On Oct 13, 2017 20:56, "Franz" <169...@gmail.com> wrote:



On Oct 13, 2017 19:32, "Marek Marczykowski-Górecki" <
marma...@invisiblethingslab.com> wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Oct 13, 2017 at 06:27:31PM -0300, Franz wrote:
> whonix was not working so tried to reinstall it for 3.2Qubes with this
> command
>
> $ sudo qubes-dom0-update --enablerepo=qubes-templates-community
> --action=reinstall qubes-template-whonix-ws
>
> However while it worked for whonix-gw I am getting the following error
> for whonix-ws after the long download:
>
>  qfile-agent: Fatal error: File copy: No space left on device; Last
> file: qubes-template-whonix-ws-3.0.6-201608050146.noarch.rpm (error
> type: No space left on device)
> '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates
> /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm'
> failed with exit code 1!
>
>
> No space left on device? Running df -h on dom0 the most used item is:
>
> /dev/dm-1  82%, used 189G available 43G which should be more than
> enough for a less than 700MB download
>
> So where should I look for?

Template (and generally packages) is downloaded to
/var/lib/qubes/updates in dom0. Maybe you have something smaller mounted
there?


There I found only the following: /var/lib/qubes/updates/rpm/
qubes-template-whonix-ws-3.0.6-201...noarch.rpm

Doing
du -h
There gives 191M which is very smaller than the 43G I expected.

But the fact that some space is still available suggests that the template
was fully downloaded and I do not have to download it again. Correct?

You

may want to try --clean option, to clean cache first.


It seems --clean is an option for a command. Which command?


I understood, it is the same update command. But running it, it replies 0
files removed. So it may not help.

Is there a easy way to increase space?


Many thanks


- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZ362XAAoJENuP0xzK19csSFoH/2+mrNpp/Wkq6YprpNvPZVD2
sRmkDaVqCgFDET+ZvoUQV96W3oojZIsBm7l6jT8HLKHuVu2lwQ/KaRyF9ITMU0zt
17uzZTYzIA0Mhh16A3G4xAsX/y/VZw3jU9RWi0hfVIX6BR1da75M8Ey8g7wqAJ12
dflzBdehM4jnBC1X0HTC+EUKuPJ9xSvkbtYXjwGUTMFyOzxZv9cKjSM+br1SuCej
893a3EnMUS0OKkFqg8EhzTy5vh1PrMpL7gjmTX+6H10UyrRNc0RUhsANLwb479T6
Ghct221AoauP5MdvCti3C9I6PO50kKFdISGXtNeXcblQCq7+a8sQBigqqpkEaY8=
=4RQ9
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBWRzLxNZU6MgLC0GNVh_yyxw1y5aWiGvooX%2B%2Bb97H6PA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] No space left on device

2017-10-13 Thread Franz
On Oct 13, 2017 19:32, "Marek Marczykowski-Górecki" <
marma...@invisiblethingslab.com> wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Oct 13, 2017 at 06:27:31PM -0300, Franz wrote:
> whonix was not working so tried to reinstall it for 3.2Qubes with this
> command
>
> $ sudo qubes-dom0-update --enablerepo=qubes-templates-community
> --action=reinstall qubes-template-whonix-ws
>
> However while it worked for whonix-gw I am getting the following error
> for whonix-ws after the long download:
>
>  qfile-agent: Fatal error: File copy: No space left on device; Last
> file: qubes-template-whonix-ws-3.0.6-201608050146.noarch.rpm (error
> type: No space left on device)
> '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates
> /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm'
> failed with exit code 1!
>
>
> No space left on device? Running df -h on dom0 the most used item is:
>
> /dev/dm-1  82%, used 189G available 43G which should be more than
> enough for a less than 700MB download
>
> So where should I look for?

Template (and generally packages) is downloaded to
/var/lib/qubes/updates in dom0. Maybe you have something smaller mounted
there?


There I found only the following:
/var/lib/qubes/updates/rpm/qubes-template-whonix-ws-3.0.6-201...noarch.rpm

Doing
du -h
There gives 191M which is very smaller than the 43G I expected.

But the fact that some space is still available suggests that the template
was fully downloaded and I do not have to download it again. Correct?

You

may want to try --clean option, to clean cache first.


It seems --clean is an option for a command. Which command?

Many thanks


- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZ362XAAoJENuP0xzK19csSFoH/2+mrNpp/Wkq6YprpNvPZVD2
sRmkDaVqCgFDET+ZvoUQV96W3oojZIsBm7l6jT8HLKHuVu2lwQ/KaRyF9ITMU0zt
17uzZTYzIA0Mhh16A3G4xAsX/y/VZw3jU9RWi0hfVIX6BR1da75M8Ey8g7wqAJ12
dflzBdehM4jnBC1X0HTC+EUKuPJ9xSvkbtYXjwGUTMFyOzxZv9cKjSM+br1SuCej
893a3EnMUS0OKkFqg8EhzTy5vh1PrMpL7gjmTX+6H10UyrRNc0RUhsANLwb479T6
Ghct221AoauP5MdvCti3C9I6PO50kKFdISGXtNeXcblQCq7+a8sQBigqqpkEaY8=
=4RQ9
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qB4cPAn4ejOD8Q%3D%3DZdwAh28%3DnD-OMon3FgeOmMd8%3DHDMg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Install a CentOS HVM with a debug-window = mo seamless mode

2017-10-13 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Oct 13, 2017 at 01:11:05AM -0400, '[799]' via qubes-users wrote:
> Hello,
> 
> I'd like to switch from using VMware Workstation to Qubes to test/specific 
> software for customers.
> 
> I want to setup a CentOS HVM and created a HVM, attached a CentOS minimal ISO 
> and installed it without any problem.
> After restart I was unable to get a Terminal window as qrexec is not 
> installed.
> I tried to boot into a normal "HVM-window" by disabling seamless mode and 
> enabling Debug mode, but I could get any window.

Did you switched "guiagent_installed" and/or "qrexec_installed"
properties? Both should be set to "false", unless you really installed
those components inside.

> Questions:
> 
> a) how can I get a terminal window to install additional applications

Without qubes packages inside, the only option is emulated VGA window -
make sure both guiagent_installed and qrexec_installed are set to false.

> b) can I install the missing Qubes parts later on to get seamless mode 
> working and to launch applications from dom0 (qrexec...)

Not easily. Theoretically both qrexec and gui agent should just work,
but in practice packages shipping them depends on specific system
configuration - for example system being installed on /dev/xvda, without
partition table. This is improved for Qubes OS 4.0 - packages are split into
smaller parts and it is possible to install just parts you want, without
the whole system reconfiguring stuff.
Also, for Qubes OS 4.0 recently we've got repository with CentOS 7
packages:
https://yum.qubes-os.org/r4.0/current-testing/vm/centos7/

I hope there will also pre-built template available soon.

But for now, if you're brave enough, you can add the above repository
(key for package verification is here:
https://github.com/QubesOS/qubes-builder-centos/blob/master/keys/RPM-GPG-KEY-qubes-4-centos)
and install qubes-core-agent-qrexec and qubes-gui-agent. Make a VM
backup first...

> c) is it possible to create a standalone HVM based on an existing Qubes 
> template?

Yes, qvm-create --standalone --template TEMPLATE_NAME ...

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZ37a4AAoJENuP0xzK19csW3MH+wZhVWtLc3AGra2EYn/OzIRq
QHPGFE3tE3J5/3MSKRUJYJrpnSLw2Ce4+Cw9D7QIYm7f2QdKs2rYzixqZQHFkdeS
iFprJf9WcdP2YFAAZK81RHCENlMoWJYfgAWDm/XBwD7rZGojmVCs7Yb1LFWFoo8U
WIkXTSbnv+VAWGzdg5dfh12hZEgk8SOQpkMOf+ozIayy9wzYH2S3HEK04idgCmEi
H0w/xsbdus6AApkCEYohx2zw4HuyB8RvqQRHik3hI5vl/NPI9HWeQlx/nlT+Gdl+
nsI9elRme1Bo6CtHjsteHG5wUnmG3zcAe2s9fGUTtSLTI0gaMVlcO0UfB4vpU8A=
=QfUj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171013231104.GH10749%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] No space left on device

2017-10-13 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Oct 13, 2017 at 06:27:31PM -0300, Franz wrote:
> whonix was not working so tried to reinstall it for 3.2Qubes with this
> command
> 
> $ sudo qubes-dom0-update --enablerepo=qubes-templates-community
> --action=reinstall qubes-template-whonix-ws
> 
> However while it worked for whonix-gw I am getting the following error
> for whonix-ws after the long download:
> 
>  qfile-agent: Fatal error: File copy: No space left on device; Last
> file: qubes-template-whonix-ws-3.0.6-201608050146.noarch.rpm (error
> type: No space left on device)
> '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates
> /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm'
> failed with exit code 1!
> 
> 
> No space left on device? Running df -h on dom0 the most used item is:
> 
> /dev/dm-1  82%, used 189G available 43G which should be more than
> enough for a less than 700MB download
> 
> So where should I look for?

Template (and generally packages) is downloaded to
/var/lib/qubes/updates in dom0. Maybe you have something smaller mounted
there? You may want to try --clean option, to clean cache first.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZ362XAAoJENuP0xzK19csSFoH/2+mrNpp/Wkq6YprpNvPZVD2
sRmkDaVqCgFDET+ZvoUQV96W3oojZIsBm7l6jT8HLKHuVu2lwQ/KaRyF9ITMU0zt
17uzZTYzIA0Mhh16A3G4xAsX/y/VZw3jU9RWi0hfVIX6BR1da75M8Ey8g7wqAJ12
dflzBdehM4jnBC1X0HTC+EUKuPJ9xSvkbtYXjwGUTMFyOzxZv9cKjSM+br1SuCej
893a3EnMUS0OKkFqg8EhzTy5vh1PrMpL7gjmTX+6H10UyrRNc0RUhsANLwb479T6
Ghct221AoauP5MdvCti3C9I6PO50kKFdISGXtNeXcblQCq7+a8sQBigqqpkEaY8=
=4RQ9
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171013223207.GG10749%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] wifi problems- trying to install rtlwifi_new driver

2017-10-13 Thread frkla1234
Hi guys,

before qubes os I had ubuntu 17.04 and I had wifi problems until I installed 
the driver "rtlwifi_new" on github (https://github.com/lwfinger/rtlwifi_new). 
After the installation it worked.

With fedora 24 I didn`t have problems with the internet connection but with the 
netvm, which runs now at fedora 25, I have the same problems like I had on 
ubuntu. So I decided to download the "rtlwifi_new" at the fedora template 25. 
Than I copied to the netvm. 

I don`t know to install that driver and I need your help!

Thanks!





-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/34675b26-d2af-4546-902e-c3e1b4085a4a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] No space left on device

2017-10-13 Thread Franz
whonix was not working so tried to reinstall it for 3.2Qubes with this
command

$ sudo qubes-dom0-update --enablerepo=qubes-templates-community
--action=reinstall qubes-template-whonix-ws

However while it worked for whonix-gw I am getting the following error
for whonix-ws after the long download:

 qfile-agent: Fatal error: File copy: No space left on device; Last
file: qubes-template-whonix-ws-3.0.6-201608050146.noarch.rpm (error
type: No space left on device)
'/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates
/usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm'
failed with exit code 1!


No space left on device? Running df -h on dom0 the most used item is:

/dev/dm-1  82%, used 189G available 43G which should be more than
enough for a less than 700MB download

So where should I look for?

Best

Fran

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qD8wqrArSUv1xVSU_%3D4cfNORzP5fWtG%2BnX9nLkMsVU08g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disposable service VMs in 4.0rc1

2017-10-13 Thread David Hobach

On 10/13/2017 03:27 PM, Marek Marczykowski-Górecki wrote:

On Fri, Oct 13, 2017 at 02:48:59PM +0200, David Hobach wrote:

On 10/13/2017 02:24 PM, David Hobach wrote:

The second instance will not start. The point is in Qubes 4.0 you can
create DisposableVM, which have no persistent data (like private.img or
root.img), but is persistent in terms of metadata (name, devices etc).


I'm also curious whether starting a VM with a dependency to a stopped
dvm-template will start a dvm or the template itself? What about VM
autostart during boot?


This all should work like with any other VM. The only difference is that
VM restart revert VM data to the original state.

I haven't tried exactly this configuration, but it should be something
like this:

 # allow to create DispVMs based on sys-net; you can also use other VM
 # here, like fedora-25-dvm
 qvm-prefs sys-net template_for_dispvms true

 # create disposable netvm; all properties will be inherited from
 # sys-net (including 'autostart', 'provides_network' etc)
 qvm-create --class DispVM --template sys-net -l red disp-sys-net

 # detach network devices from sys-net and attach to disp-sys-net
 qvm-pci del sys-net dom0:02_00.0
 qvm-pci add disp-sys-net dom0:02_00.0

 # and set disp-sys-net as netvm, wherever you want
 qvm-prefs sys-firewall netvm disp-sys-net


Thanks for the explanations!

So basically with 4.0rc1 uniquely named & single instance dispVMs were 
introduced. That's awesome & quite some news by itself, thanks!


At first sight I hadn't noticed it as the term dispVM may refer to 
generic dispVM instances disp[XYZ] or their templates as well.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d6c6ba0a-3258-cf69-415e-f1ce14d93590%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.


smime.p7s
Description: S/MIME Cryptographic Signature


Re: [qubes-users] Can't login to VM after upgrade to fedora 26

2017-10-13 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Oct 12, 2017 at 10:37:29PM -0700, nicholas roveda wrote:
> I've upgraded a fedora-25 template in R4.0 rc1/current-testing to fedora-26 
> and now the VM stops at login(tty1).
> It doesn't let me login as 'user', but only as root and after few seconds 
> being root, the VM shutdowns.
> 
> Upgrade commands:
> `sudo dnf clean all`
> `sudo dnf --best --allowerasing --releasever=26 distro-sync`

Do you remember what packages got removed? I guess you removed
qubes-core-agent during the process. Do you have enabled current-testing
repository permanently (enabled=1 in /etc/yum.repos.d/...)? If not,
the above command lack --enablerepo=qubes*current-testing

In any case, there is also prebuilt fedora-26 template available, you
can install it with qubes-dom0-update qubes-template-fedora-26.

You can see list of templates here:
https://yum.qubes-os.org/r4.0/templates-itl/rpm/
https://yum.qubes-os.org/r4.0/templates-community/rpm/

> Is there any way to fix the Template?
> And what about the trimming, since `qvm-trim-template` is gone?

It isn't needed anymore, thanks to LVM thin provisioning.
You may want to call `fstrim -v /` in the template after updating.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZ3zTnAAoJENuP0xzK19cs5TEH/i1rfyv1tWf3YnyIM0eRz/Lk
VU8iIo8yQI3azIuIB3nW56whMY1ZERDkBMnxwnR1wSopr9iU2GB0cU2jjMvrJS8U
s3c8ydJR8eP9ZYyETavhup555EC38WQi6Iet4rdTHDBcM2ugdlBY5BjWsg52BFrP
enQMpFRTj5wQRdiE0/4eeCOPQ/vz3fGMqeFCmUxvHbyJ2aaKXlIWxTDsu8CmUvdA
seLCk1L8TqNF1cXN021k9jYe9A5Iz60zRjTdqB4vlZ19afySVNg17x6l4ndS/r/q
nUUOXd9PvKFqH58+yJGTQL5vNkRyufzUW6vbkLr+xcww2hRmbOEQQ/f1R3zsm6w=
=/Ket
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171013135714.GE10749%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disposable service VMs in 4.0rc1

2017-10-13 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Oct 13, 2017 at 02:48:59PM +0200, David Hobach wrote:
> On 10/13/2017 02:24 PM, David Hobach wrote:
> > Hi all,
> > 
> > did anyone test disposable VMs for sys-net, sys-firewall and sys-usb in
> > 4.0rc1 yet?
> > 
> > Especially since the installed defaults appear to be non-disposable if I
> > recall correctly.
> > 
> > According to [1] this is meant to be working though for at least sys-net
> > & sys-usb. It doesn't say anything about sys-firewall, i.e. I'm not so
> > sure whether that will break some Qubes core mechanics...

This should work, but of course all changes in made directly there will
be lost after restart. So, for example setting wifi password using
network manager. This is one of the reasons why default setup still use
non-disposable VMs there.

> Plus what happens with your network card when you start the second instance
> of a sys-net dvm?

The second instance will not start. The point is in Qubes 4.0 you can
create DisposableVM, which have no persistent data (like private.img or
root.img), but is persistent in terms of metadata (name, devices etc).

> > I'm also curious whether starting a VM with a dependency to a stopped
> > dvm-template will start a dvm or the template itself? What about VM
> > autostart during boot?

This all should work like with any other VM. The only difference is that
VM restart revert VM data to the original state.

I haven't tried exactly this configuration, but it should be something
like this:

# allow to create DispVMs based on sys-net; you can also use other VM
# here, like fedora-25-dvm
qvm-prefs sys-net template_for_dispvms true

# create disposable netvm; all properties will be inherited from
# sys-net (including 'autostart', 'provides_network' etc)
qvm-create --class DispVM --template sys-net -l red disp-sys-net

# detach network devices from sys-net and attach to disp-sys-net
qvm-pci del sys-net dom0:02_00.0
qvm-pci add disp-sys-net dom0:02_00.0

# and set disp-sys-net as netvm, wherever you want
qvm-prefs sys-firewall netvm disp-sys-net


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZ3y3iAAoJENuP0xzK19csjlYIAIAZ42rTS8pQucjPCGRKdqx0
zq0TeDpFnbprfVhWKhjqpunwcycTYh+iNe/RaDUBF6gp07J2E6PKu1OYWGBLPuXx
pdh8LDXu9rldNkRAlc+oeFacnH6cK5lo46qwr90uD59SfXaJ36eTMJavwnHqDbE+
gvxJ3YzbtEM3NMl+IT4zm7jLMD78KG9LyttlWusibElEGPj0EL/+AKg74QzzI+qw
DPa5+uaBpEfjPKg6C9XVXgGri7CuqKrSQsZ0XmHL6F36ardMjLKztP1fJhyL426w
8Nfs3wvfyac+zOXezMEV4bP6TwdF9EeTUnjTJ1VI5kyPZLaRJsQDQEnN65l4Jb0=
=Am1Y
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171013132717.GC10749%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disposable service VMs in 4.0rc1

2017-10-13 Thread David Hobach

On 10/13/2017 02:24 PM, David Hobach wrote:

Hi all,

did anyone test disposable VMs for sys-net, sys-firewall and sys-usb in 
4.0rc1 yet?


Especially since the installed defaults appear to be non-disposable if I 
recall correctly.


According to [1] this is meant to be working though for at least sys-net 
& sys-usb. It doesn't say anything about sys-firewall, i.e. I'm not so 
sure whether that will break some Qubes core mechanics...


Plus what happens with your network card when you start the second 
instance of a sys-net dvm?


I'm also curious whether starting a VM with a dependency to a stopped 
dvm-template will start a dvm or the template itself? What about VM 
autostart during boot?


KR
David

[1] https://blog.invisiblethings.org/2017/10/03/core3.html
"This provides lots of flexibility, e.g. it’s easy to create a 
customized DispVM for signing PDF documents, or various disposable 
service VMs, such as Net- and VPN- VMs. One just creates a normal AppVM, 
sets everything up there, e.g. loads keys, configures VPNs, connects to 
known WiFi networks, and then shuts down the AppVM and in place of it 
starts a DispVM based on that AppVM."




--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e47f5b1b-4897-de22-7a3d-757705c8b302%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.


smime.p7s
Description: S/MIME Cryptographic Signature


[qubes-users] Disposable service VMs in 4.0rc1

2017-10-13 Thread David Hobach

Hi all,

did anyone test disposable VMs for sys-net, sys-firewall and sys-usb in 
4.0rc1 yet?


Especially since the installed defaults appear to be non-disposable if I 
recall correctly.


According to [1] this is meant to be working though for at least sys-net 
& sys-usb. It doesn't say anything about sys-firewall, i.e. I'm not so 
sure whether that will break some Qubes core mechanics...


I'm also curious whether starting a VM with a dependency to a stopped 
dvm-template will start a dvm or the template itself? What about VM 
autostart during boot?


KR
David

[1] https://blog.invisiblethings.org/2017/10/03/core3.html
"This provides lots of flexibility, e.g. it’s easy to create a 
customized DispVM for signing PDF documents, or various disposable 
service VMs, such as Net- and VPN- VMs. One just creates a normal AppVM, 
sets everything up there, e.g. loads keys, configures VPNs, connects to 
known WiFi networks, and then shuts down the AppVM and in place of it 
starts a DispVM based on that AppVM."


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bc278a29-4d57-e116-c19f-8c35ce392785%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.


smime.p7s
Description: S/MIME Cryptographic Signature