[qubes-users] manually import VM's

2018-09-25 Thread cyberian
I will be reimaging a QubesOS machine.  Will I be able to save the existing 
VM's manually and import into the fresh Install of Qubes?  
I would like to do the backup operation without needing to actually boot up the 
existing OS, and then restore the backed up volumes after an install.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/017c0128-6d4a-4cb1-b00b-fcbc2251e28a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 4.0 backup vm to USB from dom0

2018-02-11 Thread cyberian
@Yuraeitha
actually i am experiencing this bug with qvm-backup-restore:

https://groups.google.com/forum/#!topic/qubes-users/HZVBAqerLoI

Is there a way to manually trigger a refresh of the drop-down menu of available 
qubes?  qvm-backup-restore does not reliably add qubes to the menu of available 
vm's and my only way to use them is by using qvm-run

to be specific, this bug is only happening when trying to restore fedora-25-dvm 
backed up from qubes 4.0-rc1, all other vm's restoration worked fine

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4c7187ee-dabe-4702-b4e6-8b8a2a559942%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qvm-backup-restore bug qubes 4.0-rc4

2018-02-10 Thread cyberian
i have successfully backed up and restored several vm's after upgrading from 
rc-1 to rc-4
there is a bug which happens repeatedly when restoring the fedora-25-dvm 
domain.  I have already restored fedora-25 template successfully.
when restore begins the vm is added to the qubes vm menu but soon after it is 
removed from the menu.
vm can still be used using qvm-start drom dom0 but does not appear in the drop 
down menu of qubes domains.
is there a way to manually trigger a refresh for the drop-down menu so that it 
will detect and add the vm to the list of qubes?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/23fbcd0d-c13b-4af2-8506-5995e44b557a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0 backup vm to USB from dom0

2018-02-10 Thread cyberian
thank you!
qvm-backup --help 
didnt display too much information, so i was mostly guessing at usage, thank 
you for your thorough answer

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe6467ae-5e4c-4397-92c0-3e593d27b0e5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 backup vm to USB from dom0

2018-02-09 Thread cyberian
I have a usb drive attached to sys-usb, lets say its mounted at /mnt on sys-usb 
and im trying to backup a vm named MyVm
from dom0 the command:

sudo qvm-backup sys-usb:/mnt MyVm

returns the error: 

The backup directory does not exist

how can i make a backup to USB when USB devices are not exposed to dom0?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1aa2b355-6cbc-4b5e-90ba-9b13933eb5d8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] will uninstalling a base template delete a clone of the template?

2017-11-25 Thread cyberian
I recently made a kali template vm by cloning the qubes debian 8 template and 
converting it to kali.

If I were to remove the base debian 8 template from dom0, would this also 
remove the cloned kali template vm?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27b13bcc-1e33-4a18-997c-2e28bac33b61%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: qubes 4.0 crate standalone vm failure

2017-11-25 Thread cyberian
fixed from enabling testing updates

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27428047-b773-46bd-ad5e-e56c6f219d76%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qubes 4.0 crate standalone vm failure

2017-11-25 Thread cyberian
My cpu supports vt-x, vt-d

this works
qvm-create [vmname] --class StandaloneVM --label green

this does not
qvm-start  --cdrom :/home/user/Downloads/.iso

returns error:
Start failed: Internal Error: libxenlight failed to create new domain

libxl logs tell me this:
Backend for CD devices on HVM guests must be QDisks
Unable to set disk defaults for disk 4

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e4664353-632a-45b9-bce9-33eff10d5ee1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 3.2 backup of template VM fails - device out of space

2017-11-16 Thread cyberian
I have a template VM im trying to back up which is rather larger, 185gb or so.  

Am attempting to backup to an external usb-connected sata drive with about half 
a terabyte of space on it.

Less than 10% into the backup a failure message appears informing me that 
"device is out of space" where in reality the device has only had a small 
portion of it's 500GiB used.

actual file size of backup after failure is only around 100MiB

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/95f0c6ff-179a-46bd-a981-74b2d181642d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qubes 3.2 backup fails: device out of space

2017-11-16 Thread cyberian
I have a template VM im trying to back up which is rather larger, 185gb or so.  

Am attempting to backup to an external usb-connected sata drive with about half 
a terabyte of space on it.

Less than 10% into the backup a failure message appears informing me that 
"device is out of space" where in reality the device has only had a small 
portion of it's 500GiB used.

actual file size of backup is only around 100MiB

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/06a5574d-80ba-4704-a441-b0df7c5c92c9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes3.2 sys-firewall iptables rules altered upon start of appvm, deletion of previous rules

2017-11-11 Thread cyberian
Nevermind, I should have skimmed through the documentation first. I found 
/rw/config/qubes-firewall-user-script
case closed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5815a5ff-75cf-4540-9f80-045dce0f9f43%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes3.2 sys-firewall iptables rules altered upon start of appvm, deletion of previous rules

2017-11-11 Thread cyberian
Greetings,

I have custom iptables rules for sys-firewall that is applied during 
sys-firewall startup via /rw/config/rc.local

When I startup an app VM it automatically alters the sys-firewall iptables 
rules entirely and replaces my custom rule set with another set.

Is there a way I can preserve my custom rules upon app-vm startup?

I only have 2 or 3 custom rules on sys-firewall which allow communication 
between certain vm's and forwards external port 443 traffic to an app vm.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86193582-9ee8-4fe1-954f-9ebf610e97a8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes Patch for WPA_SUPPLICANT KRACK exploit

2017-10-16 Thread cyberian
Should I wait for qubes to release a patch or should I grab the Fedora 25 patch 
for this exploit?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/659e8e64-7de7-46c6-90a4-fd8a94f75847%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0rc1 Bug: adding programs to the VM's quickstart menu not functioning

2017-08-29 Thread cyberian
[MyHVM] > VM Settings > Applications  no longer will add selected applications 
to the dom0 VM drop down menu in Qubes 4.0

Expected: going into VM preferences and choosing programs to appear in the 
Qubes drop down menu for selected VM should cause the applications to be added 
to the quickstart tray

Result:  selected applications are not added to the quickstart tray.  Reboot 
does not resolve.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82533be2-5869-4f85-9940-d7e20fad286a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0rc1 - Resize HVM disk size

2017-08-29 Thread cyberian
Solved:

Resizing disks is now done in GUI from the Qubes drop-down menu in dom0 under 
[MyHVM] > VM Settings

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a8e3401d-98c3-452f-b2c8-8275ae6061f0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0rc1 - Resize HVM disk size

2017-08-29 Thread cyberian
Just wanted to bump this.

How are HVM disks resized on Qubes 4.0rc1?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ff067ee7-8928-42c9-907c-d75198a64da3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Options for securing /boot

2017-08-29 Thread cyberian
Leo Gaspard,

I have read about AEM but have never used it, it seems like it is geared 
towards protecting from USB's with malicious firmware on them.

Does AEM actually verify the integrity of /boot before using?  This is what I 
am looking for, either a method of encrypting /boot or even better, a secure 
method to verify its integrity during boot

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77614078-04f4-42b1-b57b-b22bd54103d9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Options for securing /boot

2017-08-29 Thread cyberian
I dont dual boot, as implied earlier.  I have had suspicious activity happen 
before in Qubes3.2 at a certain location several times; errors from Xen saying 
that my machine is not returning all of its memory and while viewing Xen logs I 
have seen the creation of domains which I surely did not do myself.

I currently have upgraded to 4.0rc1 and love the choice to use HVM over PV.

The reason I was thinking about is the scenario that I use a disposable, 
live-boot linux the next time I go to this location.  If the live-boot linux 
session were hijacked somehow, the Qubes /boot volume would be exposed.

Now with the release of Qubes 4.0 I would probably be better off just using 
Qubes, but if I could encrypt /boot I think I would be better off using the 
disposable live-boot method.

I like the idea suggested by Unman, this is exactly what I wanted to do with 
Grub2, I just did not want to break anything in Qubes by doing so.

Has anyone had any experience using Grub2 to encrypt the /boot partition and 
can confirm that it wont break anything with Qubes?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8bb2b2a5-38dc-42a1-83b9-0e3c91d920a6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: to firejail or not to firejail

2017-08-28 Thread cyberian
>the free privilege escalation qubes gives malicious apps
I dont believe Qubes gives malicious apps free privilege escalation, but if you 
want a password to be required for privilege escalation on the default user, or 
any user, you should just be able to require password for sudo i believe its in 
the documentation here: https://www.qubes-os.org/doc/vm-sudo/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1cca2b2b-a7c9-44d1-982b-4bdffe6208a9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0rc1 - Resize HVM disk size

2017-08-28 Thread cyberian
The directions on Qubes website used to resize an HVM disk do not work on 
Qubes4.0rc1

/var/lib/qubes/appvms// has no root.img file in it.  the only file in 
the directory is icon.png

How do I resize an HVM disk on 4.0rc1

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ee08a87-d555-482f-90ab-41563114c0ff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Options for securing /boot

2017-08-26 Thread cyberian
Does Qubes offer a method of securing /boot? not just against USB evil maid 
attacks, but from tampering in general?

for example, while a laptop is off, what would stop a malicious user from live 
booting to an arbitrary distro and altering kernel or xen images located on the 
unencrypted /boot partition?

Does qubes offer options for encrypting /boot?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1735810b-d749-43de-a80d-54c8cc2f362c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is it possible to add ricing tools for basic Qubes 3.2 repo?

2017-08-24 Thread cyberian
please don't add ricing tools to Qubes.  

Absolutely unnecessary.

I would prefer not to see people posting onto image boards screenfetches of a 
riced out QubesOS with or without an animu girl backdrop.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee7d4e95-ac0b-4736-9817-0f50eae8f93b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Issues with Qubes 4.0

2017-08-24 Thread cyberian
I would just like to start off by saying I am a huge fan of Qubes and I am glad 
the decision was made to utilize HVM's instead of PV's.

I just wanted to contribute some issues I have encountered with Qubes 4.0:


Issue 1: Copying files from dom0 seems to be broken.  

qvm-copy-to-vm hangs and never completes.  sending a SIGINT results in error 
message popup: qfile-unpacker: Fatal error: Child process exited 
abnormally(error type: File exists).  Python trace on terminal shows this error 
occuring during function load_entry_point in script qvm-run.

Despite the error message that File exists, it does not exist on target machine 
and fails to copy.


Issue 2: bridging usb thumb drives fails to work

I can succesfully access an SD card in an arbitrary domain by bridging the USB 
device, but this does not work with a normal USB thumb drive.

sys-usb successfully recognizes that block devices have been attached via USB 
port and dom0 recognizes that the devices are present as well.  When I attempt 
to bridge the devices to a machine the target HVM fails to recognize any block 
devices are attached and the only change to /dev/ is the addition of a usbmon 
file.  The attached block devices fail to transfer to the target HVM and remain 
present in sys-usb

Also, it would be useful if the final release version came with lvm2 already 
installed.


Issue 3: fails to properly shutdown

when invoking shutdown -h now from dom0 terminal will eventually display 
'reached target shutdown' but will never actually power off the machine (dell 
inspiron 5558)

when using the GUI shutdown option the shutdown process gets stuck in an 
infinite loop and requires power button to shut off. loop displays two messages 
repeating in quick succession.  They move too quick for me to read but are 
similar to this: 

ioctl fail - (some message that is too quick to read)
error (something) LUKS-...



The combination of issues 1 and 2 make it impossible for me to retrieve any of 
my files from my USB backup into the proper domains.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/85386505-0348-423a-a520-babcc4e0db32%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.