[qubes-users] manually import VM's
I will be reimaging a QubesOS machine. Will I be able to save the existing VM's manually and import into the fresh Install of Qubes? I would like to do the backup operation without needing to actually boot up the existing OS, and then restore the backed up volumes after an install. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/017c0128-6d4a-4cb1-b00b-fcbc2251e28a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 4.0 backup vm to USB from dom0
@Yuraeitha actually i am experiencing this bug with qvm-backup-restore: https://groups.google.com/forum/#!topic/qubes-users/HZVBAqerLoI Is there a way to manually trigger a refresh of the drop-down menu of available qubes? qvm-backup-restore does not reliably add qubes to the menu of available vm's and my only way to use them is by using qvm-run to be specific, this bug is only happening when trying to restore fedora-25-dvm backed up from qubes 4.0-rc1, all other vm's restoration worked fine -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4c7187ee-dabe-4702-b4e6-8b8a2a559942%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] qvm-backup-restore bug qubes 4.0-rc4
i have successfully backed up and restored several vm's after upgrading from rc-1 to rc-4 there is a bug which happens repeatedly when restoring the fedora-25-dvm domain. I have already restored fedora-25 template successfully. when restore begins the vm is added to the qubes vm menu but soon after it is removed from the menu. vm can still be used using qvm-start drom dom0 but does not appear in the drop down menu of qubes domains. is there a way to manually trigger a refresh for the drop-down menu so that it will detect and add the vm to the list of qubes? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/23fbcd0d-c13b-4af2-8506-5995e44b557a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 4.0 backup vm to USB from dom0
thank you! qvm-backup --help didnt display too much information, so i was mostly guessing at usage, thank you for your thorough answer -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fe6467ae-5e4c-4397-92c0-3e593d27b0e5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 4.0 backup vm to USB from dom0
I have a usb drive attached to sys-usb, lets say its mounted at /mnt on sys-usb and im trying to backup a vm named MyVm from dom0 the command: sudo qvm-backup sys-usb:/mnt MyVm returns the error: The backup directory does not exist how can i make a backup to USB when USB devices are not exposed to dom0? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1aa2b355-6cbc-4b5e-90ba-9b13933eb5d8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] will uninstalling a base template delete a clone of the template?
I recently made a kali template vm by cloning the qubes debian 8 template and converting it to kali. If I were to remove the base debian 8 template from dom0, would this also remove the cloned kali template vm? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/27b13bcc-1e33-4a18-997c-2e28bac33b61%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: qubes 4.0 crate standalone vm failure
fixed from enabling testing updates -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/27428047-b773-46bd-ad5e-e56c6f219d76%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] qubes 4.0 crate standalone vm failure
My cpu supports vt-x, vt-d this works qvm-create [vmname] --class StandaloneVM --label green this does not qvm-start --cdrom :/home/user/Downloads/.iso returns error: Start failed: Internal Error: libxenlight failed to create new domain libxl logs tell me this: Backend for CD devices on HVM guests must be QDisks Unable to set disk defaults for disk 4 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e4664353-632a-45b9-bce9-33eff10d5ee1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 3.2 backup of template VM fails - device out of space
I have a template VM im trying to back up which is rather larger, 185gb or so. Am attempting to backup to an external usb-connected sata drive with about half a terabyte of space on it. Less than 10% into the backup a failure message appears informing me that "device is out of space" where in reality the device has only had a small portion of it's 500GiB used. actual file size of backup after failure is only around 100MiB -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/95f0c6ff-179a-46bd-a981-74b2d181642d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] qubes 3.2 backup fails: device out of space
I have a template VM im trying to back up which is rather larger, 185gb or so. Am attempting to backup to an external usb-connected sata drive with about half a terabyte of space on it. Less than 10% into the backup a failure message appears informing me that "device is out of space" where in reality the device has only had a small portion of it's 500GiB used. actual file size of backup is only around 100MiB -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/06a5574d-80ba-4704-a441-b0df7c5c92c9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes3.2 sys-firewall iptables rules altered upon start of appvm, deletion of previous rules
Nevermind, I should have skimmed through the documentation first. I found /rw/config/qubes-firewall-user-script case closed. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5815a5ff-75cf-4540-9f80-045dce0f9f43%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes3.2 sys-firewall iptables rules altered upon start of appvm, deletion of previous rules
Greetings, I have custom iptables rules for sys-firewall that is applied during sys-firewall startup via /rw/config/rc.local When I startup an app VM it automatically alters the sys-firewall iptables rules entirely and replaces my custom rule set with another set. Is there a way I can preserve my custom rules upon app-vm startup? I only have 2 or 3 custom rules on sys-firewall which allow communication between certain vm's and forwards external port 443 traffic to an app vm. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/86193582-9ee8-4fe1-954f-9ebf610e97a8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes Patch for WPA_SUPPLICANT KRACK exploit
Should I wait for qubes to release a patch or should I grab the Fedora 25 patch for this exploit? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/659e8e64-7de7-46c6-90a4-fd8a94f75847%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 4.0rc1 Bug: adding programs to the VM's quickstart menu not functioning
[MyHVM] > VM Settings > Applications no longer will add selected applications to the dom0 VM drop down menu in Qubes 4.0 Expected: going into VM preferences and choosing programs to appear in the Qubes drop down menu for selected VM should cause the applications to be added to the quickstart tray Result: selected applications are not added to the quickstart tray. Reboot does not resolve. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/82533be2-5869-4f85-9940-d7e20fad286a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 4.0rc1 - Resize HVM disk size
Solved: Resizing disks is now done in GUI from the Qubes drop-down menu in dom0 under [MyHVM] > VM Settings -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a8e3401d-98c3-452f-b2c8-8275ae6061f0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 4.0rc1 - Resize HVM disk size
Just wanted to bump this. How are HVM disks resized on Qubes 4.0rc1? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ff067ee7-8928-42c9-907c-d75198a64da3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Options for securing /boot
Leo Gaspard, I have read about AEM but have never used it, it seems like it is geared towards protecting from USB's with malicious firmware on them. Does AEM actually verify the integrity of /boot before using? This is what I am looking for, either a method of encrypting /boot or even better, a secure method to verify its integrity during boot -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/77614078-04f4-42b1-b57b-b22bd54103d9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Options for securing /boot
I dont dual boot, as implied earlier. I have had suspicious activity happen before in Qubes3.2 at a certain location several times; errors from Xen saying that my machine is not returning all of its memory and while viewing Xen logs I have seen the creation of domains which I surely did not do myself. I currently have upgraded to 4.0rc1 and love the choice to use HVM over PV. The reason I was thinking about is the scenario that I use a disposable, live-boot linux the next time I go to this location. If the live-boot linux session were hijacked somehow, the Qubes /boot volume would be exposed. Now with the release of Qubes 4.0 I would probably be better off just using Qubes, but if I could encrypt /boot I think I would be better off using the disposable live-boot method. I like the idea suggested by Unman, this is exactly what I wanted to do with Grub2, I just did not want to break anything in Qubes by doing so. Has anyone had any experience using Grub2 to encrypt the /boot partition and can confirm that it wont break anything with Qubes? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8bb2b2a5-38dc-42a1-83b9-0e3c91d920a6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: to firejail or not to firejail
>the free privilege escalation qubes gives malicious apps I dont believe Qubes gives malicious apps free privilege escalation, but if you want a password to be required for privilege escalation on the default user, or any user, you should just be able to require password for sudo i believe its in the documentation here: https://www.qubes-os.org/doc/vm-sudo/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1cca2b2b-a7c9-44d1-982b-4bdffe6208a9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 4.0rc1 - Resize HVM disk size
The directions on Qubes website used to resize an HVM disk do not work on Qubes4.0rc1 /var/lib/qubes/appvms// has no root.img file in it. the only file in the directory is icon.png How do I resize an HVM disk on 4.0rc1 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6ee08a87-d555-482f-90ab-41563114c0ff%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Options for securing /boot
Does Qubes offer a method of securing /boot? not just against USB evil maid attacks, but from tampering in general? for example, while a laptop is off, what would stop a malicious user from live booting to an arbitrary distro and altering kernel or xen images located on the unencrypted /boot partition? Does qubes offer options for encrypting /boot? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1735810b-d749-43de-a80d-54c8cc2f362c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Is it possible to add ricing tools for basic Qubes 3.2 repo?
please don't add ricing tools to Qubes. Absolutely unnecessary. I would prefer not to see people posting onto image boards screenfetches of a riced out QubesOS with or without an animu girl backdrop. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ee7d4e95-ac0b-4736-9817-0f50eae8f93b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Issues with Qubes 4.0
I would just like to start off by saying I am a huge fan of Qubes and I am glad the decision was made to utilize HVM's instead of PV's. I just wanted to contribute some issues I have encountered with Qubes 4.0: Issue 1: Copying files from dom0 seems to be broken. qvm-copy-to-vm hangs and never completes. sending a SIGINT results in error message popup: qfile-unpacker: Fatal error: Child process exited abnormally(error type: File exists). Python trace on terminal shows this error occuring during function load_entry_point in script qvm-run. Despite the error message that File exists, it does not exist on target machine and fails to copy. Issue 2: bridging usb thumb drives fails to work I can succesfully access an SD card in an arbitrary domain by bridging the USB device, but this does not work with a normal USB thumb drive. sys-usb successfully recognizes that block devices have been attached via USB port and dom0 recognizes that the devices are present as well. When I attempt to bridge the devices to a machine the target HVM fails to recognize any block devices are attached and the only change to /dev/ is the addition of a usbmon file. The attached block devices fail to transfer to the target HVM and remain present in sys-usb Also, it would be useful if the final release version came with lvm2 already installed. Issue 3: fails to properly shutdown when invoking shutdown -h now from dom0 terminal will eventually display 'reached target shutdown' but will never actually power off the machine (dell inspiron 5558) when using the GUI shutdown option the shutdown process gets stuck in an infinite loop and requires power button to shut off. loop displays two messages repeating in quick succession. They move too quick for me to read but are similar to this: ioctl fail - (some message that is too quick to read) error (something) LUKS-... The combination of issues 1 and 2 make it impossible for me to retrieve any of my files from my USB backup into the proper domains. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/85386505-0348-423a-a520-babcc4e0db32%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.