[qubes-users] Installation security : Usb optical vs sata optical vs usb drive

2018-01-01 Thread mmm648
So from the installation security guide I read the following:
"Use a USB optical drive.
Attach a SATA optical drive to a secondary SATA controller, then assign this 
secondary SATA controller to an AppVM."

And for USB Drive:
"Untrustworthy firmware. (Firmware can be malicious even if the drive is new. 
Plugging a drive with rewritable firmware into a compromised machine can also 
compromise the drive. Installing from a compromised drive could compromise even 
a brand new Qubes installation.)"

Do usb optical drives not also have the same problem firmware wise?

What about sata?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0f4ae4ef-1b58-474c-ba10-27b87188b409%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How find out addresses to limit outgoing connections

2018-01-01 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-12-29 21:55, Stumpy wrote:
> I read some posts about firewalls etc but haven't been able to 
> find/limit outgoing connections. I have tried to add domains which 
> seems to have worked (minus a bug or two) but I can't seem to 
> figure out all the domains I need to list.
> 
> example, I use a gmail account, I tried adding say gmail.com and 
> google.com to the list of accepted connections but it still doesn't
> work. I assume there are other domains I need to add but I can't
> figure out how to see what they are. I tried tcpdump and installed
> iptraf in the vm but they strangely don't even show email, just
> amazon aws, akamaitechnolog, and ???.1e100.net but then I tried
> installing umatrix in chrome and it shows various other domains
> (quite a few actually).
> 
> Also, when I try to add domains the firewall window gives me an 
> error port number or service is invalid, but I selected "any" for 
> service and ports? And after adding whatever domains the first
> time and saving/clicking ok, when I try to go back in to further 
> add/modify the firewall I get the error "firewall has been
> modified manually - please use qvm-firewall for any further
> configuration." I haven't had much luck using qvm-firewall beyond
> just the list option.
> 
> In the end, I want to have say a VM for email, where the firewall 
> blocks everything but access to the email service, and do the same 
> for my "banking VM" or "bitcoin wallet vm"
> 
> I'm at a bit of a loss so would be greatful for help.
> 

Take a look at this thread:

https://groups.google.com/d/topic/qubes-users/fSiFkQeoqGE/discussion

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=z3QR
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4571aac8-ebd8-a432-b17a-c899e6f42086%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How find out addresses to limit outgoing connections

2018-01-01 Thread Stumpy
I read some posts about firewalls etc but haven't been able to 
find/limit outgoing connections.
I have tried to add domains which seems to have worked (minus a bug or 
two) but I can't seem to figure out all the domains I need to list.


example, I use a gmail account, I tried adding say gmail.com and 
google.com to the list of accepted connections but it still doesn't 
work. I assume there are other domains I need to add but I can't figure 
out how to see what they are. I tried tcpdump and installed iptraf in 
the vm but they strangely don't even show email, just amazon aws, 
akamaitechnolog, and ???.1e100.net but then I tried installing umatrix 
in chrome and it shows various other domains (quite a few actually).


Also, when I try to add domains the firewall window gives me an error 
port number or service is invalid, but I selected "any" for service and 
ports? And after adding whatever domains the first time and 
saving/clicking ok, when I try to go back in to further add/modify the 
firewall I get the error "firewall has been modified manually - please 
use qvm-firewall for any further configuration." I haven't had much luck 
using qvm-firewall beyond just the list option.


In the end, I want to have say a VM for email, where the firewall blocks 
everything but access to the email service, and do the same for my 
"banking VM" or "bitcoin wallet vm"


I'm at a bit of a loss so would be greatful for help.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/735899610fd060b025b597c76e48b056%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 3.2 GRUB menu not shown after boot

2018-01-01 Thread Robert F.
Hello,

Just installed Qubes 3.2 on a Lenovo ThinkPad Y700.
It tried about 4 times and the SSD hard drive where I installed was not
seen as UEFI bootable. I went to uefi troubleshoot page, followed the steps
there (add mabps, noexitboot on kernel lines) plus creating the
/boot/efi/EFI/BOOT folder and moving xen.cfg -> BOOTX64.cfg ,etc.

Now, the hard drive where Qubes 3.2 is installed is seen as UEFI bootable
and selected, but when it boots it just hangs in a black screen, without
showing anything at all. The hard drive is LUCKS encrypted. I tried to
press any key, waited a reasonable about of time, nothing changes, it's
just the black screen.

Thank you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGn7Kap5-Q-O4hpaWH52D1LLa6EawtR3vxjdFLg%3DzfeAYb2d%3Dg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help verifying install files: how to verify the Release 3 Signing Key?

2018-01-01 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-01-01 10:44, Kyle Breneman wrote:
> I have successfully verified the fingerprint for the Qubes Master 
> Signing Key.  I have verified the Release 3 ISO signature using
> the Qubes Release 3 Signing Key. How do I verify that the Release
> 3 signing key is good? Do I somehow use the Qubes Master Signing
> Key to verify the authenticity of the Release 3 Signing Key?

Yes. The Release 3 Signing Key is signed by the Qubes Master Signing
Key, and you can check this signature in order to verify that the
Release 3 Signing Key is authentic.

> If so, please explain how to do this with gpg4win? Thanks!
> 

I don't use gpg4win, so I'm afraid I can't provide instructions for
that program. However, I can show you how to do it in GnuPG (on
Linux). Perhaps gpg4win has a way to accept GnuPG commands, or perhaps
this will help you search for the equivalent gpg4win instructions.

Here's how I'd do it in GnuPG:

==

$ gpg2 --check-signatures C52261BE0A823221D94CA1D1CB11CA1D03FA5082
pub   rsa4096 2014-11-19 [SC]
  C52261BE0A823221D94CA1D1CB11CA1D03FA5082
uid   [  full  ] Qubes OS Release 3 Signing Key
sig!3CB11CA1D03FA5082 2014-11-19  Qubes OS Release 3 Signing Key
sig! DDFA1A3E36879494 2014-11-19  Qubes Master Signing Key

gpg: 2 good signatures

$ gpg2 --fingerprint DDFA1A3E36879494
pub   rsa4096 2010-04-01 [SC]
  427F 11FD 0FAA 4B08 0123  F01C DDFA 1A3E 3687 9494
uid   [ultimate] Qubes Master Signing Key

==

First, we check the signatures on the Release 3 Signing Key and find
that there are two good signatures: one from the Release 3 Signing Key
itself and one from a key named "Qubes Master Signing Key." Since
anyone can create a key with this name, we then check that the full
fingerprint of the key claiming to be the Qubes Master Signing Key
matches the fingerprint we've obtained and verified through multiple
independent channels.

In this case, the signature check shows us the long-form ID of each
signing key, which is probably not easy to forge (much harder than the
short-form, at least), but it's still safer to check the full
fingerprint.

Since I've already set the trust level of the Qubes Master Signing Key
to "ultimate" in this keyring, the Release 3 Signing Key automatically
has a trust level of "full" (given the default trust model) because
it's signed by the Qubes Master Signing Key.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=NqUe
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a4e63d86-2bf3-b4c7-4d95-dd9e6a7ee001%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help verifying install files: how to verify the Release 3 Signing Key?

2018-01-01 Thread Chris Laprise

On 01/01/2018 11:44 AM, Kyle Breneman wrote:

I have successfully verified the fingerprint for the Qubes Master Signing Key.  
I have verified the Release 3 ISO signature using the Qubes Release 3 Signing 
Key. How do I verify that the Release 3 signing key is good? Do I somehow use 
the Qubes Master Signing Key to verify the authenticity of the Release 3 
Signing Key? If so, please explain how to do this with gpg4win? Thanks!



Hi Kyle,

After you import both the master and signing keys, you can check them 
with 'gpg --check-sigs' which should have output like this:

pub   rsa4096 2017-03-06 [SC]
  5817A43B283DE5A9181A522E1848792F9E2795E9
uid   [ unknown] Qubes OS Release 4 Signing Key
sig!31848792F9E2795E9 2017-03-06  Qubes OS Release 4 Signing Key
sig! DDFA1A3E36879494 2017-03-08  Qubes Master Signing Key



(I have the Qubes 4 key but its otherwise the same.)

This lists the Qubes master key under the uid for the Qubes release key, 
showing the release key has been signed by the master. The exclamation 
mark after "sig" means the signature has been verified as good.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f29d5a14-c5ae-fed9-7dda-2d2bf183c870%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Detached LUKS header

2018-01-01 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-01-01 11:14, spi...@gmail.com wrote:
>> I haven't personally tried it, but I can't immediately think of 
>> anything preventing it. You won't be able to do it via the GUI 
>> installer, but you should be able to do it from the command-line.
>> I suggest taking inspiration from here:
>> 
>> https://www.qubes-os.org/doc/custom-install/
>> 
> 
> I did look at this link as I already said.

Oh, I didn't know you were referring to that document. I thought you
meant that you clicked on the "custom" button in the GUI installer or
something.

> But the thing is that there are no info on how to install it 
> without using the GUI. I guess I could look into the installer
> code, but I didn't try it for now
> 

Yeah, I see what you mean. I don't know whether there's a way to
complete the installation without the GUI, and I can't recall anyone
discussing it on the list. However, the Qubes installer is mostly the
same as the Fedora installer, so if there's a way to do it when
installing Fedora, there's a good chance the same method would apply
in Qubes.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=/whK
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e41694b8-cb1f-0c2d-64ce-223ed3ab2863%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to add Web-Shortcut to Menu of an AppVM

2018-01-01 Thread '[799]' via qubes-users
Hello,

I would like to enter a new menu item to the Appmenu of a Fedora 25 based AppVM.
The menu should contain a link to our corporate Mailserver (https:///owa).

I have thereof installed "menulibre" (sudo yum -y install menulibre) and 
created a new desktop entry under the Office Section, but it won't show up in 
the qubes app menu.
I have synced the application within the applications Tab under VM Settings.

I have also tried to manually add the desktop file:

nano open-corporate-webmail.desktop

[Desktop Entry]
Encoding=UTF-8
Name=Open Corporate Webmail
Icon=my-icon
Type=Application
Categories=Office;
Exec=xdg-open https://example.com/owa/

Following the documentation about adding menu files I have run:

xdg-desktop-menu install open-corporate-webmail.desktop

Unfortunately both ways (menulibre and manual creation of desktop file) didn't 
solve the task.

... Thereof the Question:
How can I add a web Shortcut to an application menu of an AppVM?

Kind regards

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7SRQxQbrEv_YnX3dN0EgJdP_eKjnpcWIQNz2Hcc-yigy7KbHgMQHLoV4_pn6YGc3kJypAjYLoIDm-uHIdAHfHJktO9CLFEGWKYfuxOy_ZP8%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Install Rtlwifi new

2018-01-01 Thread davidmizr2015
thanks

What I do is to open the terminal and folow the steps that you can see here, 
https://akshaycv006.wordpress.com/2017/01/12/installing-realtek-rtl8723be-driver-for-ubuntu-debian-or-fedora/,
 I try in ubuntu and works good.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f0ef02fb-6ce4-4166-b356-0c865d9f8559%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Install Rtlwifi new

2018-01-01 Thread davidmizr2015
On Sunday, December 31, 2017 at 11:39:43 AM UTC-7, davidm...@gmail.com wrote:
> Hi, I'm tring to istall the RTlwifi new driver in "sys-net", you can see the 
> driver here, "https://github.com/lwfinger/rtlwifi_new;, I have to install 
> this driver using "SUDO MAKE" and "SUDO MAKE INSTALL", sudo make works good, 
> but when I try "sudo make install" the system send this error.
> 
> 
> THE ERROR
> "/net/wireless/realtek/rtlwifi/rtl_pci.ko' Read-only  file system
> "Make file:65: recipe for target "install" failed
> make *** [install] error 1"
> 
> thank you very much, I really like this operating system, it is the best
> 
> but I need to install this drivers
> 
> Thanks
> 
> please help me

Thanks

What I do is to open the terminal and folow the steps that you can see here, 
https://akshaycv006.wordpress.com/2017/01/12/installing-realtek-rtl8723be-driver-for-ubuntu-debian-or-fedora/,
 I try in ubuntu and works good.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/26b366d9-b97e-4229-ba28-5b3dfc07d286%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Running rkt containers directly on zen?

2018-01-01 Thread Naja Melan
Hi,

While searching on the internet I stumbled onto this:

https://github.com/rkt/stage1-xen

Would this work on qubes? Anyone already doing it?

Also found some stuff about rumprun unikernels allowing directly running any 
posix app on xen. It seems awfully quiet about such initiatives, which puzzles 
me because surely being able to run applications in total isolation without the 
overhead (memory, disk, cpu) of a full linux install is very interesting for 
something like qubes right?

What is the current state of affairs? 

Naja Melan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4df77270-1ac2-2d7d-63d1-9fc8eb372cbb%40autistici.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Detached LUKS header

2018-01-01 Thread spiegs
> I haven't personally tried it, but I can't immediately think of
> anything preventing it. You won't be able to do it via the GUI
> installer, but you should be able to do it from the command-line. I
> suggest taking inspiration from here:
> 
> https://www.qubes-os.org/doc/custom-install/
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> 

I did look at this link as I already said.
But the thing is that there are no info on how to install it 
without using the GUI. I guess I could look into the installer code,
but I didn't try it for now

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f52f9bf8-530b-4fef-9cb1-e066e2e11bcf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Help verifying install files: how to verify the Release 3 Signing Key?

2018-01-01 Thread Kyle Breneman
I have successfully verified the fingerprint for the Qubes Master Signing Key.  
I have verified the Release 3 ISO signature using the Qubes Release 3 Signing 
Key. How do I verify that the Release 3 signing key is good? Do I somehow use 
the Qubes Master Signing Key to verify the authenticity of the Release 3 
Signing Key? If so, please explain how to do this with gpg4win? Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0eeda219-044f-4743-a30c-daf77edc819c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot remove/create VM exists and doesn't exist

2018-01-01 Thread 'awokd' via qubes-users
On Mon, January 1, 2018 1:44 pm, Lorenzo Guerra wrote:
> Mine is just a guess: have you tried with something like 'virsh -c
> xen:/// undefine win7' and then, if some references to your vm remains in
> qubes.xml or the Application menus, manually remove them?

Sounds like that worked for Max. "Destroy" doesn't also undefine?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/00858659be624fd070ebd387bcc7275f.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot remove/create VM exists and doesn't exist

2018-01-01 Thread Lorenzo Guerra
Mine is just a guess: have you tried with something like 'virsh -c xen:/// 
undefine win7' and then, if some references to your vm remains in qubes.xml or 
the Application menus, manually remove them?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ec4523e-6eef-445c-9bb7-4f77a61200a9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot remove/create VM exists and doesn't exist [SOLVED]

2018-01-01 Thread 'Max Andersen' via qubes-users


On 01/01/2018 01:40 PM, Max Andersen wrote:
>
> On 01/01/2018 11:52 AM, awokd wrote:
>> On Mon, January 1, 2018 10:41 am, Max Andersen wrote:
>>> Hi awokd
>>>
>>>
 Den 1. jan. 2018 kl. 11.32 skrev awokd :


> On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users
> wrote:
>
>
>
> libvirtError: operation failed: domain 'win7' already exists with
> uuid 
>
 Sometimes a reboot clears up discrepancies like that for me.

>>> I’m sorry, I tried that, after restarting the libvirtd service and that
>>> didn’t work.
>>>
>> Can try to rename Win7 to Win7b. There is also a "virsh destroy" but
>> ordinarily you shouldn't have to use that.
> I cannot rename or do a simple list with qvm-prefs. Only with virsh, so
> there must be a discrepancy between the 2.
>
> qvm-ls shows no win7, but virsh does.
>
> Sincerely
> Max
I started up the virsh shell, typed 'undefine win7', and started all
over. That worked.

Thank you for your efforts, awokd

Sincerely
Max

>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1aaded14-36e1-08f1-88ea-5268d0afc196%40militant.dk.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Install Rtlwifi new

2018-01-01 Thread 'Tom Zander' via qubes-users
On Sunday, 31 December 2017 20:57:36 GMT davidmizr2...@gmail.com wrote:
> I can see e permission problem here
> "/net/wireless/realtek/rtlwifi/rtl_pci.ko' Read-only  file system,

That is not a permission problem.

Nobody can write to a read-only filesystem.
Try to make sure that you configured your compile correctly. The path 
starting with /net makes little sense to me.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4847878.CPfFngQe5g%40mail.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot remove/create VM exists and doesn't exist

2018-01-01 Thread 'Max Andersen' via qubes-users


On 01/01/2018 11:52 AM, awokd wrote:
> On Mon, January 1, 2018 10:41 am, Max Andersen wrote:
>> Hi awokd
>>
>>
>>> Den 1. jan. 2018 kl. 11.32 skrev awokd :
>>>
>>>
 On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users
 wrote:



 libvirtError: operation failed: domain 'win7' already exists with
 uuid 

>>> Sometimes a reboot clears up discrepancies like that for me.
>>>
>> I’m sorry, I tried that, after restarting the libvirtd service and that
>> didn’t work.
>>
> Can try to rename Win7 to Win7b. There is also a "virsh destroy" but
> ordinarily you shouldn't have to use that.

I cannot rename or do a simple list with qvm-prefs. Only with virsh, so
there must be a discrepancy between the 2.

qvm-ls shows no win7, but virsh does.

Sincerely
Max



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ef665cec-2311-5be6-8547-15419fbc664e%40militant.dk.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot remove/create VM exists and doesn't exist

2018-01-01 Thread 'awokd' via qubes-users
On Mon, January 1, 2018 10:41 am, Max Andersen wrote:
> Hi awokd
>
>
>> Den 1. jan. 2018 kl. 11.32 skrev awokd :
>>
>>
>>> On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users
>>> wrote:
>>>
>>>
>>>
>>> libvirtError: operation failed: domain 'win7' already exists with
>>> uuid 
>>>
>>
>> Sometimes a reboot clears up discrepancies like that for me.
>>
>
> I’m sorry, I tried that, after restarting the libvirtd service and that
> didn’t work.
>
Can try to rename Win7 to Win7b. There is also a "virsh destroy" but
ordinarily you shouldn't have to use that.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd36716e51b486a5cd363270c7336762.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot remove/create VM exists and doesn't exist

2018-01-01 Thread 'Max Andersen' via qubes-users
Hi awokd

> Den 1. jan. 2018 kl. 11.32 skrev awokd :
> 
>> On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users wrote:
>> 
>> 
>> libvirtError: operation failed: domain 'win7' already exists with uuid
>> 
> 
> Sometimes a reboot clears up discrepancies like that for me.

I’m sorry, I tried that, after restarting the libvirtd service and that didn’t 
work.

Thank you for your reply

Soncerely
Max

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51441858-AD36-414F-840C-52046DE0E02A%40militant.dk.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot remove/create VM exists and doesn't exist

2018-01-01 Thread 'awokd' via qubes-users
On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users wrote:

>
> libvirtError: operation failed: domain 'win7' already exists with uuid
> 

Sometimes a reboot clears up discrepancies like that for me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/867e7da61904820085593b6b53e644da.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes freezing (hangs) always in less than 1 hour

2018-01-01 Thread 'awokd' via qubes-users
On Sun, December 31, 2017 8:31 pm, Sameer Vao wrote:

> freezes completely (hangs) normally within 15 minutes after booting,
> needing a hard reboot. Theres no specific thing - sometimes moving the

If you haven't already, try running "sudo qubes-dom0-update" as soon as
you get in to Qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37d1bc4d34e000b223353355618580ac.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.