Re: [qubes-users] Re: Installing software.. deb-9 lists qubes-r4.list

2019-04-16 Thread unman
On Wed, Apr 17, 2019 at 01:16:57AM +, john s. wrote:
> On 3/23/19 6:31 PM, Jon deps wrote:
> > On 3/19/19 4:59 PM, Steven Walker wrote:
> > > I am still pretty new to Qubes. I have managed to create a new qube,
> > > but I want to install some software for use with this qube. I have
> > > read that it has to be installed to the template and not the actual
> > > qube. As the template has no actual network connection, how do I go
> > > about this?
> > > 
> > > Using 4.0.1, Fedora 29
> > > 
> > > Any help greatly appeciated.
> > > 
> > > Steve
> > > 
> > 
> > pretty sure, there are different ways to skin the cat, though
> > 
> > 
> > the Templates are designed to obtain access indirectly, that is what the
> >  "salt" stuff is they talk about it seems by default to be setup to
> > use  sys-whonix-14  to  install updates  , somewhat magically
> > 
> > you can actually change the netvm without shutting down the templates
> > 
> > generally it's bad form  to give  the templates direct access,  though
> > may you might want to once in while  in order  to troubleshoot something
> > , etc  .testing it the morning ,  you should be able to install non
> > updates without  Direct  access
> > 
> > 
> > 
> > for me  Templates  aren't  worth backing up  , I'm not worried about my
> > system  melting down  much . and anyway  its going to be best to
> > fresh install , which is easy-ist  in Qubes, which is one of the
> > beauties of the technology 
> > 
> > hence, I clone for other reasons
> > 
> > one word of advice  is  keep a paper list of  custom  packages you
> > install so when it goes to Fedora-30  you install fresh and then add
> > back fresh packages ,  your files  will persist,
> > 
> > 
> > my problem  what few files I have end up spread out over  10 App Qubes
> > 
> > 
> 
> 
> 
> If  I do this :
> 
> echo "deb [arch=amd64] https://updates.signal.org/desktop/apt xenial main" |
> sudo tee -a /etc/apt/sources.list.d/signal-xenial.list
> deb [arch=amd64] https://updates.signal.org/desktop/apt xenial main
> 
> 
> 
> 
> then I do NOT need to add anything  to /etc/apt/sources.list.d/qubes-r4.list
> ??
> 
> nor
> 
> /etc/apt/sources.list   ??
> 
> 
> for Debian-9  stretch ?
> 
> 
> ty
> 
> 

That's right.
'man sources.list' gives you chapter and verse.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190417012442.xborbtdc5w7xctsn%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing databases on templates and they need updates.

2019-04-16 Thread unman
On Tue, Apr 16, 2019 at 06:17:08PM -0700, Sergio Matta wrote:
> Dear Qubes People,
> 
> What would be the location indicated for systems databases, since they are 
> installed in the template and can not be modified by the VM? In the case of 
> ldap, which uses /var/lib/ldap, I changed the location setting of DB to 
> /rw/var/lib/ldap. But Qubes must have a strategy for these situations, and 
> what would it be?
> 
> I do not have a problem. My LDAP (to some server operations) is working 
> great. It is just to read your poins of view.
> 
> Thank you.
> 

Look at bind-dirs  - www.qubes-os.org/doc/bind-dirs 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190417012027.cft457enehnrtuis%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] installing databases on templates and they need updates.

2019-04-16 Thread Sergio Matta
Dear Qubes People,

What would be the location indicated for systems databases, since they are 
installed in the template and can not be modified by the VM? In the case of 
ldap, which uses /var/lib/ldap, I changed the location setting of DB to 
/rw/var/lib/ldap. But Qubes must have a strategy for these situations, and what 
would it be?

I do not have a problem. My LDAP (to some server operations) is working great. 
It is just to read your poins of view.

Thank you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/243867c2-3ac7-4857-8a55-fb020f1972da%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installing software.. deb-9 lists qubes-r4.list

2019-04-16 Thread john s.

On 3/23/19 6:31 PM, Jon deps wrote:

On 3/19/19 4:59 PM, Steven Walker wrote:
I am still pretty new to Qubes. I have managed to create a new qube, 
but I want to install some software for use with this qube. I have 
read that it has to be installed to the template and not the actual 
qube. As the template has no actual network connection, how do I go 
about this?


Using 4.0.1, Fedora 29

Any help greatly appeciated.

Steve



pretty sure, there are different ways to skin the cat, though


the Templates are designed to obtain access indirectly, that is what the 
  "salt" stuff is they talk about it seems by default to be setup to 
use  sys-whonix-14  to  install updates  , somewhat magically


you can actually change the netvm without shutting down the templates

generally it's bad form  to give  the templates direct access,  though 
may you might want to once in while  in order  to troubleshoot something 
, etc  .testing it the morning ,  you should be able to install non 
updates without  Direct  access




for me  Templates  aren't  worth backing up  , I'm not worried about my 
system  melting down  much . and anyway  its going to be best to 
fresh install , which is easy-ist  in Qubes, which is one of the 
beauties of the technology 


hence, I clone for other reasons

one word of advice  is  keep a paper list of  custom  packages you 
install so when it goes to Fedora-30  you install fresh and then add 
back fresh packages ,  your files  will persist,



my problem  what few files I have end up spread out over  10 App Qubes






If  I do this :

echo "deb [arch=amd64] https://updates.signal.org/desktop/apt xenial 
main" | sudo tee -a /etc/apt/sources.list.d/signal-xenial.list

deb [arch=amd64] https://updates.signal.org/desktop/apt xenial main




then I do NOT need to add anything  to 
/etc/apt/sources.list.d/qubes-r4.list   ??


nor

/etc/apt/sources.list   ??


for Debian-9  stretch ?


ty


--
A895 0C7C A244 8E2E FD77 A3DB 180B 7D4D D158 F8B6

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7c1cf21a-9580-88ce-ec92-49310b99efaa%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] GPU vs NIC: firmware security

2019-04-16 Thread 'awokd' via qubes-users

demioben...@gmail.com wrote on 4/15/19 4:28 AM:

My laptop (Lenovo P51) works fantastically with QubesOS.

It has two GPUs: Intel integrated graphics and a discrete NVIDIA card.  For 
gaming, I am interested in pass-through of one (NOT both) to a VM.

I believe that the integrated graphics controls the internal monitor, and that 
all external monitors are connected to the dedicated graphics card.  Can 
someone confirm this, and can this be changed?

I will not give another VM control of my primary display, for obvious reasons.  
I also consider the VM that I would like to give GPU access to to be highly 
untrustworthy and potentially compromised, since it will be running 
untrustworthy games.  My current plan is to give the gaming VM access to one 
monitor, while I use the other monitor for normal operation of QubesOS.

My main questions are:

* How feasible are firmware attacks on the graphics card, if I choose the 
NVIDIA card?  I trust that the IOMMU will keep me safe from a compromised card, 
but only if the compromise does not persist across reboots.  In the case of the 
integrated graphics, the GPU has no persistent storage, but I am nervous about 
possible compromise of the internal display, which would be fatal.  For the 
dedicated graphics, I am worried that the graphics card’s firmware could be 
overwritten.  Is this possible without PCI configuration space access?

Finally, can NVIDIA cards work with PCI pass-through?

From what I understand about NVIDIA and Qubes, passing them through is 
not possible. You can limit firmware attacks to some extent by hiding 
devices from Xen/Qubes so it doesn't process them.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3bcf296-58d4-17ad-1439-00299e8a61f6%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 4 boot stuck at: "[ OK ] Reached target Basic System. "

2019-04-16 Thread 'awokd' via qubes-users

Ryan Tate wrote on 4/16/19 6:44 PM:
It would be nice if someone from the Qubes team could provide at least some basic tips for Qubes users on how to avoid having our installations completely ruined by what are apparently LVM issues. 


Here's why I'm hoping 4.1 will help: 
https://github.com/QubesOS/qubes-issues/issues/1872#issuecomment-377638842.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f9e9476f-322c-b2ba-5ba9-d21708d0e153%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] status of USB devices in "Qubes Devices" not updated

2019-04-16 Thread 'awokd' via qubes-users

Tomáš Vondra wrote on 4/16/19 12:56 PM:

Hi,

I'm struggling with a strange issue with USB devices for the last couple of days - not 
exactly sure when it started, though. I'm running up to date 4.0 without sys-usb (because 
of USB keyboard etc.) and when I connect a USB disk / SD card I get notifications about 
the device being available, but it's not visible in the "Qubes Devices" list 
(in the tray).

However, if I kill the qui-devices process in dom0, it gets automatically 
restarted after a couple of seconds and the devices are there and I can attach 
them to a VM. But then again - the status of the device does not change, it's 
still listed with the plus sign, so I can't detach it from the VM. So I kill 
the process again, it gets restarted, this time it's correctly listed with the 
eject button.

I wonder what went wrong. Any ideas?


There are some bug fixes coming. If you want to test the newest code, 
see 
https://github.com/QubesOS/qubes-issues/issues/4915#issuecomment-476683080.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0133ab15-f62f-cb6e-7a7c-a9b84509fa58%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Updated HCL report - Dell Precision 5520

2019-04-16 Thread Nicklas Williams
On Tuesday, April 16, 2019 at 2:17:45 AM UTC-7, awokd wrote:
> Came across the right way to do this. See the "Change xen configuration 
> directly in an iso image" section under 
> https://www.qubes-os.org/doc/uefi-troubleshooting/#change-installer-kernel-parameters-in-uefi.

I tried to change that file multiple different ways.  Ultimately, I was able to 
edit the ISO file with GVIM on windows but then I got the dracut timeout error 
when I tried to boot from it in UEFI.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b503ace-0701-46b9-982c-db86a9362a55%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] manually import VM's

2019-04-16 Thread 'awokd' via qubes-users

Chris Laprise wrote on 4/16/19 9:48 PM:

Perhaps you could define the secondary storage as a Qubes storage pool, 
then create empty vms in that pool. Finally, mv/lvrename/snapshot/ln 
(your choice, depending on type of storage and preference) your existing 
volumes as necessary.


Thank you, lvrename did the trick. Probably would have helped if I had 
specified it was set up as an LVM pool I added back in with qvm-pool.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9abd568-0856-4d2e-e30b-9a2d3ad240a7%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] manually import VM's

2019-04-16 Thread Chris Laprise

On 4/16/19 5:56 AM, 'awokd' via qubes-users wrote:

awokd wrote on 9/26/18 9:55 PM:

cyberian@national.shitposting.agency wrote on 9/25/18 7:05 PM:
I will be reimaging a QubesOS machine.  Will I be able to save the 
existing VM's manually and import into the fresh Install of Qubes?
I would like to do the backup operation without needing to actually 
boot up the existing OS, and then restore the backed up volumes after 
an install.


No easy way I know of. Could mount the LVM qube partitions and backup 
just the data you want to keep, but that wouldn't include the VM 
definitions.


Anyone have a better approach? I have some large VMs on secondary 
storage that have lost their qube configuration. I can recreate 
definitions easily enough, but want to attach their root and private 
volumes without a full, slow copy step.




Perhaps you could define the secondary storage as a Qubes storage pool, 
then create empty vms in that pool. Finally, mv/lvrename/snapshot/ln 
(your choice, depending on type of storage and preference) your existing 
volumes as necessary.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b25b9c0-b197-0949-3a6d-edf0bd2ed90a%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 4 boot stuck at: "[ OK ] Reached target Basic System. "

2019-04-16 Thread Ryan Tate
It would be nice if someone from the Qubes team could provide at least some 
basic tips for Qubes users on how to avoid having our installations completely 
ruined by what are apparently LVM issues. This case is at least the sixth I'm 
aware of counting myself of a Qubes system totally unable to even boot and 
requiring a restore.

Every time now that I do a backup or restore I have to live in white knuckle 
fear that something might go wrong and I will lose again my system and have to 
restore again, a process that can be laborious and error prone not to mention 
simply time consuming.

Some simple instructions on how to do whatever needs to be done to keep this 
from happening -- defensively re-size dom0 or other Qubes? clear temp files out 
of certain dir used by the backup process? twiddle some settings? -- would be 
incredibly calming. I have a 1TB drive here so it seems unnecessary that my 
machine dies because of some shuffling of VM resizing issues. Can't I just 
allocate a ton of space to whatever this lvm process is?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7741d00a-02f8-46e9-8a14-134eb61c2448%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes backup UI stalls badly

2019-04-16 Thread Mike Keehan
On Tue, 16 Apr 2019 12:21:54 -0400
Ryan Tate  wrote:

> Today I went to backup my machine using Qubes backup GUI and near the
> end (?) the progress bar was at 100% but the Finish button was not
> clickable. I waited maybe half an hour, an hour, and tried closing
> the window. I got an error message saying the window was not
> responding and asking if I wanted to force close. I said No. Now
> (maybe 15 minutes later) the window is completely blank.
> 
> I have previously been left without a bootable Qubes machine because
> I cancelled a Qubes restore. I am worried I am about to be in the
> same state. Is there anywhere I can check to see if there are big
> stray files left behind in dom0 and not cleaned up? Can I check if
> I’m about to have lvm issues?
> 
> Also, this is not the first time Qubes Backup has behaved oddly. I
> also commonly get it stuck at 99% for hours so I give up and force
> close. Other times, it proceeds pretty quickly to 100% and I get the
> Finish button clickable.
> 
> The backup is only about 90GB (uncompressed, but compressed it is
> somewhere closer to 50GB) and is coming off a speedy internal drive
> to a decent USB3 external disk. No idea why I am having these issues.
> 

It was a combination of issues on my machine that caused the same thing,

1. I do not have the lvm disk setup,
2. Backing up live vms.

As long as I only back up vms that are off, it all works perfectly.
I found this answered by Marek after searching for a while.

I have restored OK too, but have only done this once.  It worked fine.

Mike.
 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190416193238.2479a8a9.mike%40keehan.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes backup UI stalls badly

2019-04-16 Thread Ryan Tate
Today I went to backup my machine using Qubes backup GUI and near the end (?) 
the progress bar was at 100% but the Finish button was not clickable. I waited 
maybe half an hour, an hour, and tried closing the window. I got an error 
message saying the window was not responding and asking if I wanted to force 
close. I said No. Now (maybe 15 minutes later) the window is completely blank.

I have previously been left without a bootable Qubes machine because I 
cancelled a Qubes restore. I am worried I am about to be in the same state. Is 
there anywhere I can check to see if there are big stray files left behind in 
dom0 and not cleaned up? Can I check if I’m about to have lvm issues?

Also, this is not the first time Qubes Backup has behaved oddly. I also 
commonly get it stuck at 99% for hours so I give up and force close. Other 
times, it proceeds pretty quickly to 100% and I get the Finish button clickable.

The backup is only about 90GB (uncompressed, but compressed it is somewhere 
closer to 50GB) and is coming off a speedy internal drive to a decent USB3 
external disk. No idea why I am having these issues.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/F818D561-8782-4CB2-BB7B-A717BBA3BF70%40ryantate.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Message signed with OpenPGP


[qubes-users] E' DAVVERO DA ARRESTARE IL PEDOFILO ED ASSASSINO DANIELE MINOTTI (CRIMINALISSIMO AVV DI RAPALLO E GE

2019-04-16 Thread VAMOS, VAMOS, VAMOS A GANAR!
E' DAVVERO DA ARRESTARE IL PEDOFILO ED ASSASSINO DANIELE MINOTTI 
(CRIMINALISSIMO AVV DI RAPALLO E GENOVA.. RAPALLO.. OVE ORGANIZZA TRAME 
ASSASSINE ED OMICIDI NAZISTI E MAFIOSI, INSIEME "AL RAPALLESE" DI RESIDENZA, 
PEZZO DI MERDA, HITLERIANO, RAZZISTA, KU KLUK KLANISTA, RICICLA SOLDI MAFIOSI, 
SEMPRE PIU' PEDERASTA ANCHE LUI: PIERSILVIO BERLUSCONI)! E' DA FERMARE STRA 
SUBITO: L ' AVVOCATO SATANISTA, NAZISTA, ^SATA-N-AZISTA^, PEDOFILO ED OMICIDA 
DANIELE MINOTTI DI GENOVA, RAPALLO! VERME RAZZISTA, KU KLUK KLANISTA, MEGA 
RICICLA SOLDI MAFIOSI! AGENTE SEGRETO IN COPERTO DI TIPO HITLERIANO ED 
ASSASSINO!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f9253ca-2b35-47a6-96fd-3fe56419e81f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] status of USB devices in "Qubes Devices" not updated

2019-04-16 Thread Tomáš Vondra
Hi,

I'm struggling with a strange issue with USB devices for the last couple of 
days - not exactly sure when it started, though. I'm running up to date 4.0 
without sys-usb (because of USB keyboard etc.) and when I connect a USB disk / 
SD card I get notifications about the device being available, but it's not 
visible in the "Qubes Devices" list (in the tray).

However, if I kill the qui-devices process in dom0, it gets automatically 
restarted after a couple of seconds and the devices are there and I can attach 
them to a VM. But then again - the status of the device does not change, it's 
still listed with the plus sign, so I can't detach it from the VM. So I kill 
the process again, it gets restarted, this time it's correctly listed with the 
eject button.

I wonder what went wrong. Any ideas?

Tomas

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/963cff37-ab58-426e-b688-ec2a6b74e812%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Intel Nuc Qubes R4 installer boot problem

2019-04-16 Thread Michael MENG
I got exactly same error on nuc8, only uefi no legacy boot, headache, 
anyone can help?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/74b18efd-3509-45e6-a5cd-01686279fc67%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] manually import VM's

2019-04-16 Thread 'awokd' via qubes-users

awokd wrote on 9/26/18 9:55 PM:

cyberian@national.shitposting.agency wrote on 9/25/18 7:05 PM:
I will be reimaging a QubesOS machine.  Will I be able to save the 
existing VM's manually and import into the fresh Install of Qubes?
I would like to do the backup operation without needing to actually 
boot up the existing OS, and then restore the backed up volumes after 
an install.


No easy way I know of. Could mount the LVM qube partitions and backup 
just the data you want to keep, but that wouldn't include the VM 
definitions.


Anyone have a better approach? I have some large VMs on secondary 
storage that have lost their qube configuration. I can recreate 
definitions easily enough, but want to attach their root and private 
volumes without a full, slow copy step.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/96c3cb9b-7b71-4e6e-0484-cd306d799ea8%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 4 boot stuck at: "[ OK ] Reached target Basic System. "

2019-04-16 Thread 'awokd' via qubes-users

awokd wrote on 4/4/19 6:56 PM:

cube...@tutamail.com wrote on 4/4/19 6:32 PM:


Hi,
Yes, I've tried the command "vgchange -ay" and it gives me error message:
"Check of pool qubes_dom0/pool00 failed (status:1). Manual repair 
required!

1 logical volume(s) in volume group "qubes_dom0" now active. "

That single active volume is 'swap'.
All other lv'sn (which I have 86) have "LV Status" set to "NOT 
available", and I can't turn them back to active. Also vgchange wasn't 
able to activate them.


Is there any other way to to get to the lv's of the LUKS encrypted 
qubes disk?


  Are there are any dedicated LUKS / LVM2 recovery tools (somebody 
mentioned 'scalpel' but I have't tried it yet)?
I would be grateful for any hints into good direction of retrieving 
data from my luks encrypted qubes disk.


You can try qtpie's procedure in 
https://www.mail-archive.com/qubes-users@googlegroups.com/msg19011.html.


This one just bit me as well. Last I checked a month ago or so, I 
thought I still had something like 250GB free in my primary lvm pool. 
Maybe I was looking at the wrong line. I remember a Qubes notification 
popped up unexpectedly around a week ago, but it disappeared before I 
could read it. Didn't notice if the tray icon was any different 
afterwards, but maybe it should start flashing or have a large red X 
over it any time the pool containing root remains nearly full. I hope 
this LVM failure mode is improved in 4.1. Recovery is painful.


I was only able to repair some of the LVM metadata with the above linked 
procedure. The rest was corrupted. Luckily my critical VMs were among 
the survivors so I could copy out their private volumes before the 
reinstall, and had a recent enough backup of the rest. Hope you managed 
to salvage some too.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2a1db9b-3d20-4521-e5a6-9f1af8cadb63%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Updated HCL report - Dell Precision 5520

2019-04-16 Thread 'awokd' via qubes-users
Came across the right way to do this. See the "Change xen configuration 
directly in an iso image" section under 
https://www.qubes-os.org/doc/uefi-troubleshooting/#change-installer-kernel-parameters-in-uefi.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a81d4292-5945-309e-7b8f-393fee4a213e%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.