-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-02-20 22:48, Kyle Breneman wrote:
> I'm running Qubes 3.2. I have the default Fedora 23 template VM, and the
> default app VMs built from it, but I also installed a Fedora 26 template
> VM. Now I want to delete or upgrade my Fedora 23 app V
I'm running Qubes 3.2. I have the default Fedora 23 template VM, and the
default app VMs built from it, but I also installed a Fedora 26 template
VM. Now I want to delete or upgrade my Fedora 23 app VMs, but I cannot
figure out how to do this. The "Delete VM" menu option in the Qubes VM
Manager
Consider using borgbackup.
Borgbackup is bandwidth-efficient (only sends deltas), versioned (later backups
don't overwrite earlier ones), compressed, deduplicated, and encrypted.
Here is an outline of a Qubes 4.0 setup:
BACKUP:
In dom0, borg reads the source VM's private block device and comput
On Tuesday, February 20, 2018 at 2:45:28 PM UTC-7, Yuraeitha wrote:
> On Tuesday, February 20, 2018 at 9:06:24 PM UTC+1, Sonny Horton wrote:
> > On Tuesday, February 20, 2018 at 12:46:45 PM UTC-7, Yuraeitha wrote:
> > > On Tuesday, February 20, 2018 at 6:59:14 PM UTC+1, Sonny Horton wrote:
> > > >
Tim:
Thanks for the response.
Yes, I also tried a Ubuntu DVD which I was able to boot from.
I'm running 20160818.g876c81c9 for petitiboot (via a ROM from Raptor
Engineering).
I tried a USB stick as well and got similar results.
For KCMA-D8 and similar users, how are you booting your Qubes
Cheers.
Have used rsync before from Debian PC to server PC - but again not sure how to
apply within constraint of a VM backup process.
I'll have a play - after my day on the hills tomorrow.
Cheers
--
You received this message because you are subscribed to the Google Groups
"qubes-users" grou
On Tuesday, February 20, 2018 at 2:58:18 PM UTC-5, Yuraeitha wrote:
> wait hold on, just to be sure we're on the same page here.
> Why would you bring up sys-usb? Putting a USB controller in sys-usb is
> normally for the purpose to use qvm-usb/widget to virtually pass it to
> multiple of other V
I know there is a post in the last month about a qubes user on the list using
the yubikey as he was having an issue tring to use two different functions
without unplugging the Yubikey. He wanted iirc to use it to act as keyboard to
send passphrase but then as a 2fa in a appvm. What happened is
On Tuesday, February 20, 2018 at 9:06:24 PM UTC+1, Sonny Horton wrote:
> On Tuesday, February 20, 2018 at 12:46:45 PM UTC-7, Yuraeitha wrote:
> > On Tuesday, February 20, 2018 at 6:59:14 PM UTC+1, Sonny Horton wrote:
> > > I was originally on R3.2 and created 5 Standalone VMs: antergos, kali,
> >
On 02/20/18 11:25, Chris Laprise wrote:
> Since several people are reporting this, I decided to try some simple
> qvm-copy tests and have been unable to reproduce the problem on R4.0-rc4.
>
> I updated with qubes*testing and then restarted per the QSB.
I realized that I had enabled the testing re
On Tuesday, February 20, 2018 at 12:46:45 PM UTC-7, Yuraeitha wrote:
> On Tuesday, February 20, 2018 at 6:59:14 PM UTC+1, Sonny Horton wrote:
> > I was originally on R3.2 and created 5 Standalone VMs: antergos, kali,
> > parrotOS, Ubuntu (desktop), win7
> >
> > I upgraded along the way to various
On Tuesday, February 20, 2018 at 8:44:36 PM UTC+1, William Bormann wrote:
> > oh, you make a good point. I indeed made an assumption that it was about
> > lock-out by the "reading guides" line, and I somehow missed the line
> > regarding Google and Facebook services. I must then have misunderstoo
On Tuesday, February 20, 2018 at 8:44:36 PM UTC+1, William Bormann wrote:
> > oh, you make a good point. I indeed made an assumption that it was about
> > lock-out by the "reading guides" line, and I somehow missed the line
> > regarding Google and Facebook services. I must then have misunderstoo
On Tuesday, February 20, 2018 at 6:59:14 PM UTC+1, Sonny Horton wrote:
> I was originally on R3.2 and created 5 Standalone VMs: antergos, kali,
> parrotOS, Ubuntu (desktop), win7
>
> I upgraded along the way to various R4.0 release candidates. I skipped rc1
> as it was not usable on my hardware
> oh, you make a good point. I indeed made an assumption that it was about
> lock-out by the "reading guides" line, and I somehow missed the line
> regarding Google and Facebook services. I must then have misunderstood, I
> apologize.
>
> I just tested the Yubi key I got laying around, it work
On 02/20/2018 02:03 PM, Micah Lee wrote:
I just installed updates in dom0 (current-testing) after QSB #38, and
now my qrexec policies are semi-broken.
To demonstrate, I just made two new AppVMs, testvm1 and testvm2. I want
to copy a file from testvm1 to testvm2:
[user@testvm1 ~]$ echo test > te
On Tuesday, February 20, 2018 at 8:03:31 PM UTC+1, Micah Lee wrote:
> I just installed updates in dom0 (current-testing) after QSB #38, and
> now my qrexec policies are semi-broken.
>
> To demonstrate, I just made two new AppVMs, testvm1 and testvm2. I want
> to copy a file from testvm1 to testvm2
I just installed updates in dom0 (current-testing) after QSB #38, and
now my qrexec policies are semi-broken.
To demonstrate, I just made two new AppVMs, testvm1 and testvm2. I want
to copy a file from testvm1 to testvm2:
[user@testvm1 ~]$ echo test > test.txt
[user@testvm1 ~]$ qvm-copy test.txt
On Tuesday, 20 February 2018 19:41:19 CET Marek Marczykowski-Górecki wrote:
> > On the 'other' side of qrexec (on dom0) you have perfect control over
> > the
> > situation and you also don't have any need for recoding or encodings or
> > anything like that. It still is just 8 bits data, not encoded
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 20, 2018 at 06:57:34PM +0100, Tom Zander wrote:
> On Tuesday, 20 February 2018 16:54:36 CET Marek Marczykowski-Górecki wrote:
> > > The thing you have to rememeber is that the escape character never needs
> > > to be typed by the user.
>
I was originally on R3.2 and created 5 Standalone VMs: antergos, kali,
parrotOS, Ubuntu (desktop), win7
I upgraded along the way to various R4.0 release candidates. I skipped rc1 as
it was not usable on my hardware. rc2 was usable with some work, and rc3 has
been working great. At each upgra
On Tuesday, 20 February 2018 16:54:36 CET Marek Marczykowski-Górecki wrote:
> > The thing you have to rememeber is that the escape character never needs
> > to be typed by the user.
> > In QRexec you are defining an API, applications like qvm-run are using
> > that API. What the user passes into qv
Backing up everything and then being able to select an odd file if ever
needed just seems a simpler concept to me!
> My preference is to have "BACKUP" even of VM's on separate PC (as per my
> CLONEZILLA images) but though one can apparently use SSH to send files
> through to separate SERVER PC, I
Thanks for comments.
For info - have used Debian for around 10 years till I swapped to Qubes around
1 year ago. Windows before that. I use CLONEZILLA as it gives easy
backup/restore for my old (Occasional use Os's) + QUBES + my wife's UBUNTU.
In extreme case of needing an individual old file (
On 02/20/2018 10:53 AM, Yuraeitha wrote:
On Tuesday, February 20, 2018 at 3:21:23 PM UTC+1, Bernhard wrote:
Apologies, missed your post donoban. But looping the backup seems
interesting, I suppose it must be possible with the decryption too. >
Yes, it is. I backup by data that way since Q4 - t
I use GMail and Thunderbird for email, and Firefox as my browser. I do
email and GitHub from a different domain that is more trusted than
others (it’s blue).
I would love to restrict its networking abilities by using firewall
rules or a filtering proxy. Sadly, I have not been able to do that
wit
I'm getting the same bug as reported at
https://github.com/QubesOS/qubes-issues/issues/2018
The bug was originally reported against r3.1 and fedora-23-minimal, and fixed
in r3.2 and fedora-24-minimal. However, I'm getting it on r3.2, using fedora-26
(full, not minimal) for both my USB VM and my
On Tuesday, February 20, 2018 at 6:00:21 PM UTC+7, Yuraeitha wrote:
> On Tuesday, February 20, 2018 at 10:51:55 AM UTC+1, msg...@gmail.com wrote:
> > On Tuesday, February 20, 2018 at 2:49:30 PM UTC+7, Yuraeitha wrote:
> > > On Monday, February 19, 2018 at 3:37:39 PM UTC+1, msg...@gmail.com wrote:
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 20, 2018 at 04:27:16PM +0100, 'Tom Zander' via qubes-devel wrote:
> On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote:
> > On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel
> wrote:
> > > On Tuesday, 20
On Tuesday, February 20, 2018 at 3:21:23 PM UTC+1, Bernhard wrote:
> > > Apologies, missed your post donoban. But looping the backup seems
> interesting, I suppose it must be possible with the decryption too. >
> Yes, it is. I backup by data that way since Q4 - the qubes-backup may
> be more "hand
On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote:
> On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel
wrote:
> > On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki
wrote:
> > > We've decided to deprecate the '$' character from qrexec-related
>
> > Apologies, missed your post donoban. But looping the backup seems
interesting, I suppose it must be possible with the decryption too. >
Yes, it is. I backup by data that way since Q4 - the qubes-backup may
be more "handy", but I prefer knowing every single detail on encryption,
etc myself. Yo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
After upgrading Qubes 3.2 with the patches all seems fine.
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEznLCgPSfWTT+LPrmFBMQ2OPtCKUFAlqMLisACgkQFBMQ2OPt
CKW0nw/8D/T+ShxOuAVnlG38T6f/LZ8Hx/1tlVe7Ad+Keihe7+eP/t8HDQmO1kpw
JJdkeOvDNEM+uUS9frEtKTDV
On Tuesday, February 20, 2018 at 2:52:38 PM UTC+1, donoban wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 02/20/2018 02:16 PM, higginsonj...@gmail.com wrote:
> > Not sure if what I want to achieve is possible but I'll try and
> > summarise below.
> >
> > With other distros that
On Tuesday, February 20, 2018 at 2:16:52 PM UTC+1, higgin...@gmail.com wrote:
> Not sure if what I want to achieve is possible but I'll try and summarise
> below.
>
> With other distros that I run (WIN10, Ubuntu, Debian) as well as QUBES - I
> make full disk images using CLONEZILLA and retain th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 02/20/2018 02:16 PM, higginsonj...@gmail.com wrote:
> Not sure if what I want to achieve is possible but I'll try and
> summarise below.
>
> With other distros that I run (WIN10, Ubuntu, Debian) as well as
> QUBES - I make full disk images using
Not sure if what I want to achieve is possible but I'll try and summarise below.
With other distros that I run (WIN10, Ubuntu, Debian) as well as QUBES - I make
full disk images using CLONEZILLA and retain them on a spare PC, running as a
local server.
All full disk restores work fine, includin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel wrote:
> On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki wrote:
> > We've decided to deprecate the '$' character from qrexec-related usage.
> > Instead, to de
On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki wrote:
> We've decided to deprecate the '$' character from qrexec-related usage.
> Instead, to denote special tokens, we will use the '@' character,
> which we believe is less likely to be interpreted in a special way
> by the rel
On Tuesday, February 20, 2018 at 10:51:55 AM UTC+1, msg...@gmail.com wrote:
> On Tuesday, February 20, 2018 at 2:49:30 PM UTC+7, Yuraeitha wrote:
> > On Monday, February 19, 2018 at 3:37:39 PM UTC+1, msg...@gmail.com wrote:
> > > On Monday, February 19, 2018 at 7:29:37 PM UTC+7, Yuraeitha wrote:
>
On Tuesday, February 20, 2018 at 10:51:55 AM UTC+1, msg...@gmail.com wrote:
> On Tuesday, February 20, 2018 at 2:49:30 PM UTC+7, Yuraeitha wrote:
> > On Monday, February 19, 2018 at 3:37:39 PM UTC+1, msg...@gmail.com wrote:
> > > On Monday, February 19, 2018 at 7:29:37 PM UTC+7, Yuraeitha wrote:
>
On Tuesday, February 20, 2018 at 10:30:45 AM UTC+1, Tim W wrote:
> On Sunday, February 18, 2018 at 3:17:39 PM UTC-5, Yuraeitha wrote:
> > On Sunday, February 18, 2018 at 3:51:00 AM UTC+1, William Bormann wrote:
> > > On a lark, I purchased a Yubico FIDO U2F Security key. It's an
> > > inexpensive
On Tuesday, February 20, 2018 at 2:49:30 PM UTC+7, Yuraeitha wrote:
> On Monday, February 19, 2018 at 3:37:39 PM UTC+1, msg...@gmail.com wrote:
> > On Monday, February 19, 2018 at 7:29:37 PM UTC+7, Yuraeitha wrote:
> > > On Monday, February 19, 2018 at 1:00:13 PM UTC+1, msg...@gmail.com wrote:
> >
On Tuesday, February 20, 2018 at 12:24:09 AM UTC+1, wyory wrote:
> Hi,
>
> I can't get anything to run using 'qvm-run' on the sys-vms (sys-usb,
> sys-net, sys-whonix). Is this intentional? I'd like to get xterm on
> sys-usb to run some disk diagnostics on an external drive using 'smartctl.'
>
> A
On Sunday, February 18, 2018 at 3:17:39 PM UTC-5, Yuraeitha wrote:
> On Sunday, February 18, 2018 at 3:51:00 AM UTC+1, William Bormann wrote:
> > On a lark, I purchased a Yubico FIDO U2F Security key. It's an inexpensive
> > USB token that can be used for two-factor authentication for Gmail and
On Monday, February 19, 2018 at 7:41:55 PM UTC+1, Glen H wrote:
> On Monday, February 19, 2018 at 1:05:09 AM UTC-5, Yuraeitha wrote:
> > On Monday, February 19, 2018 at 6:08:44 AM UTC+1, Glen H wrote:
> > > On Sunday, February 18, 2018 at 9:59:24 AM UTC-5, Daniel Moerner wrote:
> > > > On Saturday,
On Monday, February 19, 2018 at 1:25:51 PM UTC-5, qube...@go-bailey.com wrote:
> I have a new KCMA-D8 based machine with petitboot installed. When I
> attempt to boot from the Qubes 4 DVD, the install media is not
> recognized by petitboot. Other installation media that I've tried, like
> a Ubun
47 matches
Mail list logo