Re: [qubes-users] 'locking' a vm possible? (to prevent accidental shutdown)

2024-04-16 Thread Boryeu Mao
Thank you very much for the help. Time for a crash course on qubes-core-admin. On Mon, Apr 15, 2024 at 9:30 AM Rusty Bird wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Rusty Bird: > > Boryeu Mao: > > > An attempt to shutdown `sys-firewall` in `Qube M

[qubes-users] 'locking' a vm possible? (to prevent accidental shutdown)

2024-04-14 Thread Boryeu Mao
An attempt to shutdown `sys-firewall` in `Qube Manager` receive a warning about running processes in the qube; similarly on command line `qvm-shutdown sys-firewall` fails with an error. Is it possible to designate an appVM to behave similarly so it won't get shutdown accidentally? -- You

[qubes-users] Re: help: errors in fedora-39-minimal upgrade

2024-02-21 Thread Boryeu Mao
Some useful information at https://github.com/QubesOS/qubes-issues/issues/8806 On Saturday, February 17, 2024 at 9:08:44 PM UTC-8 Boryeu Mao wrote: > I attempted to upgrade the fedora-39-minimal template as follows: > > sudo qubesctl --show-output --skip-dom0 > --targets=fedor

[qubes-users] help: errors in fedora-39-minimal upgrade

2024-02-17 Thread Boryeu Mao
I attempted to upgrade the fedora-39-minimal template as follows: sudo qubesctl --show-output --skip-dom0 --targets=fedora-39-minimal-clone-1 state.sls update.qubes-vm But the process results in errors (see attached file qubesctl-f39). This is for R4.2. Please help. Thank you. -- You

Re: [qubes-users] Re: question on 'service-name' for the new (R4.2) qrexec policy

2024-02-13 Thread Boryeu Mao
Thanks very much -- the details helped a lot. Case closed. On Tuesday, February 13, 2024 at 5:21:05 AM UTC-8 Rusty Bird wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Boryeu Mao: > > > For R4.1.2 I had some RPC calls with + and - characters in

[qubes-users] Re: question on 'service-name' for the new (R4.2) qrexec policy

2024-02-12 Thread Boryeu Mao
Correction - only + is considered as invalid character. On Monday, February 12, 2024 at 4:56:27 PM UTC-8 Boryeu Mao wrote: > For R4.1.2 I had some RPC calls with + and - characters in the file > name. These are considered as invalid characters to be part of service > names in the n

[qubes-users] question on 'service-name' for the new (R4.2) qrexec policy

2024-02-12 Thread Boryeu Mao
For R4.1.2 I had some RPC calls with + and - characters in the file name. These are considered as invalid characters to be part of service names in the new qrexec policy format (e.g. in /etc/qubes/policy.d/30-user.policy). Using wild card * works, but I wonder if there is any way to keep these

[qubes-users] Re: looking for qubes package(s) to install in debian-12-minimal

2024-02-10 Thread Boryeu Mao
Upon a bit of searching, the main package needed is pinentry-gnome3, with four additional packages: gcr libgcr-base-3-1 libgcr-ui-3-1 libgck-1-0 for my AppVM. On Friday, February 9, 2024 at 4:47:28 PM UTC-8 Boryeu Mao wrote: > PS. The AppVM sends the gpg passphrase request to dom0 w

[qubes-users] Re: looking for qubes package(s) to install in debian-12-minimal

2024-02-09 Thread Boryeu Mao
PS. The AppVM sends the gpg passphrase request to dom0 when the following command is run in dom0: qvm-run --pass-io AppVM 'gpg --quiet -d some-file' On Friday, February 9, 2024 at 1:05:16 PM UTC-8 Boryeu Mao wrote: > I have a debian-12 based AppVM that forwards gpg passphr

[qubes-users] looking for qubes package(s) to install in debian-12-minimal

2024-02-09 Thread Boryeu Mao
I have a debian-12 based AppVM that forwards gpg passphrase request to dom0 in a pop-up dialog window. When the template is changed to debian-12-minimal, the pop-up request no longer shows up in dom0, presumably because some qubes package(s) need to be installed? Any configuration changes

Re: [qubes-users] Issuing the command 'qvm-run --user=user some-dom kill -9 some-pid' on dom0 returns a message...

2023-07-22 Thread Boryeu Mao
some-dom: command failed with code: 137. When SIGTERM is used to kill the process, the code 143 (128+15) is returned instead of 137. On Sat, Jul 22, 2023 at 6:55 AM Rusty Bird wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Boryeu Mao: > > of ``some-dom: comman

[qubes-users] Issuing the command 'qvm-run --user=user some-dom kill -9 some-pid' on dom0 returns a message...

2023-07-21 Thread Boryeu Mao
of ``some-dom: command failed with code: 137``, which I have been ignoring since the job with ``some-pid`` did get killed. What could be the meaning of the code 137 and its significance? Thanks in advance. -- You received this message because you are subscribed to the Google Groups

[qubes-users] capturing X selection event

2023-06-16 Thread Boryeu Mao
In an AppVM based on Debian-11 template, I would like a `bash` script running in `xfce Terminal` to catch an X selection `paste` event in `firefox-esr` - is that possible, and where to look? Thanks in advance. -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] qubes HCL report HP_EliteBook 845 G8

2023-05-04 Thread Boryeu Mao
Am having occasional crashing after lid-closing suspend with Rysen-powered Dell Inspiron… will try xfce button then lid closing. Many thanks for the hint. On Thursday, May 4, 2023, haaber wrote: > Dear all, > > Update of my HCL report: suspend to memory via xfce button works fine, > but often

Re: [qubes-users] 'qvm-copy' and 'qvm-copy-to-vm' in AppVM

2023-04-08 Thread Boryeu Mao
Maybe the 'qvm-copy-to-vm' version could be made to place the 1st argument in the Target field of the pop-up window, such that only a CR is required to complete the operation? On Friday, March 24, 2023 at 8:41:54 AM UTC-7 Boryeu Mao wrote: > Yes, 'qvm-copy' alone would ensure the secur

Re: [qubes-users] 'qvm-copy' and 'qvm-copy-to-vm' in AppVM

2023-03-24 Thread Boryeu Mao
Yes, 'qvm-copy' alone would ensure the security of copying/moving files between AppVM's. Thanks. On Fri, Mar 24, 2023 at 5:43 AM unman wrote: > qvm-copy-to-vm is deprecated and will be removed. > -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] 'qvm-copy' and 'qvm-copy-to-vm' in AppVM

2023-03-23 Thread Boryeu Mao
> behind a keyboard/mouse. I ran into this as well, then realized the risk I > was creating running this from a script. > > GL > > > On Thu, Mar 23, 2023, 16:50 Boryeu Mao wrote: > >> I'd expected 'qvm-copy-to-vm' to accept the 1st argument as target-vm and >>

[qubes-users] 'qvm-copy' and 'qvm-copy-to-vm' in AppVM

2023-03-23 Thread Boryeu Mao
I'd expected 'qvm-copy-to-vm' to accept the 1st argument as target-vm and get on with copying, but for me both commands request the target-vm in a pop-up window -- so what is the point of having 'qvm-copy-to-vm' at all, if I am not missing something really simple? Thanks -- You received this

Re: [qubes-users] placement of windows after re-logging in

2022-09-06 Thread Boryeu Mao
Thank you much. Time to catch up a little on lua. (Found a really nice tutorial in www.linux-magazine.com, circa 2017, which also mentioned a couple of alternatives.) On Tuesday, September 6, 2022, Sven Semmler wrote: > I do that with devilspie2 (lua script telling XFCE where I want each >

[qubes-users] placement of windows after re-logging in

2022-09-05 Thread Boryeu Mao
When logging back in, the windows in the workspace are re-opened - is it possible to have them positioned just as they were before the last logging out? I have R.4.1.1 with xfce. Thanks in advance. -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] Qubes OS 4.1.1 has been released!

2022-07-20 Thread Boryeu Mao
>From Qubes-OS 4.1.0 I updated dom0 today, and see the 5.15 kernel at reboot, and xen-4.14.5-6 etc. However, the 'release' info in the file /etc/qubes-release and from the 'About' tab in Qubes Manager still says R4.1 -- is this any indication that my update did not fully bring the system to

[qubes-users] Re: capturing the content of a shell from a disposable VM

2022-06-12 Thread Boryeu Mao
Found an answer :) sudo qubes-dom0-update --console --show-output Sorry for the false alarm. On Sun, Jun 12, 2022 at 2:27 PM Boryeu Mao wrote: > Running a dom0 update ('sudo qubes-dom0-update') in a disposable VM (per > Solomon1732 in > https://forum.qubes-os.org/t/qubes-dom0-upd

[qubes-users] capturing the content of a shell from a disposable VM

2022-06-12 Thread Boryeu Mao
for this purpose? Any help or pointers to help overcome this part of my Qubes OS learning curve is much appreciated. Thanks boryeu mao -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails fro

[qubes-users] 'Sleep/Wake' for an AMD laptop, and related questions

2022-03-26 Thread Boryeu Mao
I started using Qubes (r 4.0.4) and am on 4.1. Everything works well except 'sleep/wake', which my laptop (Dell, ryzen 3450u) is capable of (on Debian 11). Two related general questions: (1) Is it correct to think that there is no easy fixes, as suggested in some on-line discussions, and it