Re: [qubes-users] How to delete or upgrade app VMs?

2018-02-20 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2018-02-20 22:48, Kyle Breneman wrote: > I'm running Qubes 3.2. I have the default Fedora 23 template VM, and the > default app VMs built from it, but I also installed a Fedora 26 template > VM. Now I want to delete or upgrade my Fedora 23 app

[qubes-users] How to delete or upgrade app VMs?

2018-02-20 Thread Kyle Breneman
I'm running Qubes 3.2. I have the default Fedora 23 template VM, and the default app VMs built from it, but I also installed a Fedora 26 template VM. Now I want to delete or upgrade my Fedora 23 app VMs, but I cannot figure out how to do this. The "Delete VM" menu option in the Qubes VM Manager

Re: [qubes-users] extract file from image backup

2018-02-20 Thread 'MirrorWay' via qubes-users
Consider using borgbackup. Borgbackup is bandwidth-efficient (only sends deltas), versioned (later backups don't overwrite earlier ones), compressed, deduplicated, and encrypted. Here is an outline of a Qubes 4.0 setup: BACKUP: In dom0, borg reads the source VM's private block device and

[qubes-users] Re: Standalone VMs can't reach network after restoring from backup to fresh 4.0rc4 install

2018-02-20 Thread Sonny Horton
On Tuesday, February 20, 2018 at 2:45:28 PM UTC-7, Yuraeitha wrote: > On Tuesday, February 20, 2018 at 9:06:24 PM UTC+1, Sonny Horton wrote: > > On Tuesday, February 20, 2018 at 12:46:45 PM UTC-7, Yuraeitha wrote: > > > On Tuesday, February 20, 2018 at 6:59:14 PM UTC+1, Sonny Horton wrote: > > > >

[qubes-users] Re: Installing Qubes 4 with petitboot

2018-02-20 Thread qubes-os
Tim: Thanks for the response. Yes, I also tried a Ubuntu DVD which I was able to boot from. I'm running 20160818.g876c81c9 for petitiboot (via a ROM from Raptor Engineering). I tried a USB stick as well and got similar results. For KCMA-D8 and similar users, how are you booting your Qubes

Re: [qubes-users] extract file from image backup

2018-02-20 Thread higginsonjim2
Cheers. Have used rsync before from Debian PC to server PC - but again not sure how to apply within constraint of a VM backup process. I'll have a play - after my day on the hills tomorrow. Cheers -- You received this message because you are subscribed to the Google Groups "qubes-users"

[qubes-users] Re: Yubico FIDO U2F Security Key and Qubes

2018-02-20 Thread brendan . hoar
On Tuesday, February 20, 2018 at 2:58:18 PM UTC-5, Yuraeitha wrote: > wait hold on, just to be sure we're on the same page here. > Why would you bring up sys-usb? Putting a USB controller in sys-usb is > normally for the purpose to use qvm-usb/widget to virtually pass it to > multiple of other

[qubes-users] Re: Yubico FIDO U2F Security Key and Qubes

2018-02-20 Thread Tim W
I know there is a post in the last month about a qubes user on the list using the yubikey as he was having an issue tring to use two different functions without unplugging the Yubikey. He wanted iirc to use it to act as keyboard to send passphrase but then as a 2fa in a appvm. What happened

[qubes-users] Re: Standalone VMs can't reach network after restoring from backup to fresh 4.0rc4 install

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 9:06:24 PM UTC+1, Sonny Horton wrote: > On Tuesday, February 20, 2018 at 12:46:45 PM UTC-7, Yuraeitha wrote: > > On Tuesday, February 20, 2018 at 6:59:14 PM UTC+1, Sonny Horton wrote: > > > I was originally on R3.2 and created 5 Standalone VMs: antergos, kali, > >

Re: [qubes-users] qrexec policies broken after QSB #38 update

2018-02-20 Thread Micah Lee
On 02/20/18 11:25, Chris Laprise wrote: > Since several people are reporting this, I decided to try some simple > qvm-copy tests and have been unable to reproduce the problem on R4.0-rc4. > > I updated with qubes*testing and then restarted per the QSB. I realized that I had enabled the testing

[qubes-users] Re: Standalone VMs can't reach network after restoring from backup to fresh 4.0rc4 install

2018-02-20 Thread Sonny Horton
On Tuesday, February 20, 2018 at 12:46:45 PM UTC-7, Yuraeitha wrote: > On Tuesday, February 20, 2018 at 6:59:14 PM UTC+1, Sonny Horton wrote: > > I was originally on R3.2 and created 5 Standalone VMs: antergos, kali, > > parrotOS, Ubuntu (desktop), win7 > > > > I upgraded along the way to

[qubes-users] Re: Yubico FIDO U2F Security Key and Qubes

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 8:44:36 PM UTC+1, William Bormann wrote: > > oh, you make a good point. I indeed made an assumption that it was about > > lock-out by the "reading guides" line, and I somehow missed the line > > regarding Google and Facebook services. I must then have

[qubes-users] Re: Yubico FIDO U2F Security Key and Qubes

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 8:44:36 PM UTC+1, William Bormann wrote: > > oh, you make a good point. I indeed made an assumption that it was about > > lock-out by the "reading guides" line, and I somehow missed the line > > regarding Google and Facebook services. I must then have

[qubes-users] Re: Standalone VMs can't reach network after restoring from backup to fresh 4.0rc4 install

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 6:59:14 PM UTC+1, Sonny Horton wrote: > I was originally on R3.2 and created 5 Standalone VMs: antergos, kali, > parrotOS, Ubuntu (desktop), win7 > > I upgraded along the way to various R4.0 release candidates. I skipped rc1 > as it was not usable on my

[qubes-users] Re: Yubico FIDO U2F Security Key and Qubes

2018-02-20 Thread William Bormann
> oh, you make a good point. I indeed made an assumption that it was about > lock-out by the "reading guides" line, and I somehow missed the line > regarding Google and Facebook services. I must then have misunderstood, I > apologize. > > I just tested the Yubi key I got laying around, it

Re: [qubes-users] qrexec policies broken after QSB #38 update

2018-02-20 Thread Chris Laprise
On 02/20/2018 02:03 PM, Micah Lee wrote: I just installed updates in dom0 (current-testing) after QSB #38, and now my qrexec policies are semi-broken. To demonstrate, I just made two new AppVMs, testvm1 and testvm2. I want to copy a file from testvm1 to testvm2: [user@testvm1 ~]$ echo test >

[qubes-users] Re: qrexec policies broken after QSB #38 update

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 8:03:31 PM UTC+1, Micah Lee wrote: > I just installed updates in dom0 (current-testing) after QSB #38, and > now my qrexec policies are semi-broken. > > To demonstrate, I just made two new AppVMs, testvm1 and testvm2. I want > to copy a file from testvm1 to

[qubes-users] qrexec policies broken after QSB #38 update

2018-02-20 Thread Micah Lee
I just installed updates in dom0 (current-testing) after QSB #38, and now my qrexec policies are semi-broken. To demonstrate, I just made two new AppVMs, testvm1 and testvm2. I want to copy a file from testvm1 to testvm2: [user@testvm1 ~]$ echo test > test.txt [user@testvm1 ~]$ qvm-copy test.txt

[qubes-users] Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-20 Thread 'Tom Zander' via qubes-users
On Tuesday, 20 February 2018 19:41:19 CET Marek Marczykowski-Górecki wrote: > > On the 'other' side of qrexec (on dom0) you have perfect control over > > the > > situation and you also don't have any need for recoding or encodings or > > anything like that. It still is just 8 bits data, not

[qubes-users] Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-20 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Feb 20, 2018 at 06:57:34PM +0100, Tom Zander wrote: > On Tuesday, 20 February 2018 16:54:36 CET Marek Marczykowski-Górecki wrote: > > > The thing you have to rememeber is that the escape character never needs > > > to be typed by the user. >

[qubes-users] Standalone VMs can't reach network after restoring from backup to fresh 4.0rc4 install

2018-02-20 Thread Sonny Horton
I was originally on R3.2 and created 5 Standalone VMs: antergos, kali, parrotOS, Ubuntu (desktop), win7 I upgraded along the way to various R4.0 release candidates. I skipped rc1 as it was not usable on my hardware. rc2 was usable with some work, and rc3 has been working great. At each

[qubes-users] Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-20 Thread 'Tom Zander' via qubes-users
On Tuesday, 20 February 2018 16:54:36 CET Marek Marczykowski-Górecki wrote: > > The thing you have to rememeber is that the escape character never needs > > to be typed by the user. > > In QRexec you are defining an API, applications like qvm-run are using > > that API. What the user passes into

Re: [qubes-users] extract file from image backup

2018-02-20 Thread higginsonjim2
Thanks for comments. For info - have used Debian for around 10 years till I swapped to Qubes around 1 year ago. Windows before that. I use CLONEZILLA as it gives easy backup/restore for my old (Occasional use Os's) + QUBES + my wife's UBUNTU. In extreme case of needing an individual old file

Re: [qubes-users] extract file from image backup

2018-02-20 Thread Chris Laprise
On 02/20/2018 10:53 AM, Yuraeitha wrote: On Tuesday, February 20, 2018 at 3:21:23 PM UTC+1, Bernhard wrote: Apologies, missed your post donoban. But looping the backup seems interesting, I suppose it must be possible with the decryption too. > Yes, it is. I backup by data that way since Q4  -

[qubes-users] HTTP proxy & firewall woes

2018-02-20 Thread Demi M. Obenour
I use GMail and Thunderbird for email, and Firefox as my browser.  I do email and GitHub from a different domain that is more trusted than others (it’s blue). I would love to restrict its networking abilities by using firewall rules or a filtering proxy.  Sadly, I have not been able to do that

[qubes-users] USB VM based on fedora-26 doesn't pass block devices

2018-02-20 Thread Kelly Dean
I'm getting the same bug as reported at https://github.com/QubesOS/qubes-issues/issues/2018 The bug was originally reported against r3.1 and fedora-23-minimal, and fixed in r3.2 and fedora-24-minimal. However, I'm getting it on r3.2, using fedora-26 (full, not minimal) for both my USB VM and

[qubes-users] Re: Start VMs on boot before user login (Qubes OS 4.0rc4)

2018-02-20 Thread msgheap
On Tuesday, February 20, 2018 at 6:00:21 PM UTC+7, Yuraeitha wrote: > On Tuesday, February 20, 2018 at 10:51:55 AM UTC+1, msg...@gmail.com wrote: > > On Tuesday, February 20, 2018 at 2:49:30 PM UTC+7, Yuraeitha wrote: > > > On Monday, February 19, 2018 at 3:37:39 PM UTC+1, msg...@gmail.com wrote:

[qubes-users] Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-20 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Feb 20, 2018 at 04:27:16PM +0100, 'Tom Zander' via qubes-devel wrote: > On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote: > > On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel > wrote: > > > On Tuesday, 20

Re: [qubes-users] extract file from image backup

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 3:21:23 PM UTC+1, Bernhard wrote: > > > Apologies, missed your post donoban. But looping the backup seems > interesting, I suppose it must be possible with the decryption too. > > Yes, it is. I backup by data that way since Q4  - the qubes-backup may > be more

[qubes-users] Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-20 Thread 'Tom Zander' via qubes-users
On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote: > On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel wrote: > > On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki wrote: > > > We've decided to deprecate the '$' character from qrexec-related >

Re: [qubes-users] extract file from image backup

2018-02-20 Thread Bernhard
> > Apologies, missed your post donoban. But looping the backup seems interesting, I suppose it must be possible with the decryption too. > Yes, it is. I backup by data that way since Q4  - the qubes-backup may be more "handy", but I prefer knowing every single detail on encryption, etc myself.

Re: [qubes-users] QSB #38: Qrexec policy bypass and possible information leak

2018-02-20 Thread donoban
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, After upgrading Qubes 3.2 with the patches all seems fine. -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEznLCgPSfWTT+LPrmFBMQ2OPtCKUFAlqMLisACgkQFBMQ2OPt CKW0nw/8D/T+ShxOuAVnlG38T6f/LZ8Hx/1tlVe7Ad+Keihe7+eP/t8HDQmO1kpw

Re: [qubes-users] extract file from image backup

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 2:52:38 PM UTC+1, donoban wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 02/20/2018 02:16 PM, higginsonj...@gmail.com wrote: > > Not sure if what I want to achieve is possible but I'll try and > > summarise below. > > > > With other distros

[qubes-users] Re: extract file from image backup

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 2:16:52 PM UTC+1, higgin...@gmail.com wrote: > Not sure if what I want to achieve is possible but I'll try and summarise > below. > > With other distros that I run (WIN10, Ubuntu, Debian) as well as QUBES - I > make full disk images using CLONEZILLA and retain

Re: [qubes-users] extract file from image backup

2018-02-20 Thread donoban
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 02/20/2018 02:16 PM, higginsonj...@gmail.com wrote: > Not sure if what I want to achieve is possible but I'll try and > summarise below. > > With other distros that I run (WIN10, Ubuntu, Debian) as well as > QUBES - I make full disk images using

[qubes-users] extract file from image backup

2018-02-20 Thread higginsonjim2
Not sure if what I want to achieve is possible but I'll try and summarise below. With other distros that I run (WIN10, Ubuntu, Debian) as well as QUBES - I make full disk images using CLONEZILLA and retain them on a spare PC, running as a local server. All full disk restores work fine,

[qubes-users] Re: Start VMs on boot before user login (Qubes OS 4.0rc4)

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 10:51:55 AM UTC+1, msg...@gmail.com wrote: > On Tuesday, February 20, 2018 at 2:49:30 PM UTC+7, Yuraeitha wrote: > > On Monday, February 19, 2018 at 3:37:39 PM UTC+1, msg...@gmail.com wrote: > > > On Monday, February 19, 2018 at 7:29:37 PM UTC+7, Yuraeitha wrote: >

[qubes-users] Re: Start VMs on boot before user login (Qubes OS 4.0rc4)

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 10:51:55 AM UTC+1, msg...@gmail.com wrote: > On Tuesday, February 20, 2018 at 2:49:30 PM UTC+7, Yuraeitha wrote: > > On Monday, February 19, 2018 at 3:37:39 PM UTC+1, msg...@gmail.com wrote: > > > On Monday, February 19, 2018 at 7:29:37 PM UTC+7, Yuraeitha wrote: >

[qubes-users] Re: Yubico FIDO U2F Security Key and Qubes

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 10:30:45 AM UTC+1, Tim W wrote: > On Sunday, February 18, 2018 at 3:17:39 PM UTC-5, Yuraeitha wrote: > > On Sunday, February 18, 2018 at 3:51:00 AM UTC+1, William Bormann wrote: > > > On a lark, I purchased a Yubico FIDO U2F Security key. It's an > > >

[qubes-users] Re: Start VMs on boot before user login (Qubes OS 4.0rc4)

2018-02-20 Thread msgheap
On Tuesday, February 20, 2018 at 2:49:30 PM UTC+7, Yuraeitha wrote: > On Monday, February 19, 2018 at 3:37:39 PM UTC+1, msg...@gmail.com wrote: > > On Monday, February 19, 2018 at 7:29:37 PM UTC+7, Yuraeitha wrote: > > > On Monday, February 19, 2018 at 1:00:13 PM UTC+1, msg...@gmail.com wrote: > >

[qubes-users] Re: Qubes OS 4.0RC4 can't get xterm from sys-usb, sys-net, sys-whonix

2018-02-20 Thread Yuraeitha
On Tuesday, February 20, 2018 at 12:24:09 AM UTC+1, wyory wrote: > Hi, > > I can't get anything to run using 'qvm-run' on the sys-vms (sys-usb, > sys-net, sys-whonix). Is this intentional? I'd like to get xterm on > sys-usb to run some disk diagnostics on an external drive using 'smartctl.' > >

[qubes-users] Re: Yubico FIDO U2F Security Key and Qubes

2018-02-20 Thread Tim W
On Sunday, February 18, 2018 at 3:17:39 PM UTC-5, Yuraeitha wrote: > On Sunday, February 18, 2018 at 3:51:00 AM UTC+1, William Bormann wrote: > > On a lark, I purchased a Yubico FIDO U2F Security key. It's an inexpensive > > USB token that can be used for two-factor authentication for Gmail and

[qubes-users] Re: Installing Win7 on a Dell

2018-02-20 Thread Yuraeitha
On Monday, February 19, 2018 at 7:41:55 PM UTC+1, Glen H wrote: > On Monday, February 19, 2018 at 1:05:09 AM UTC-5, Yuraeitha wrote: > > On Monday, February 19, 2018 at 6:08:44 AM UTC+1, Glen H wrote: > > > On Sunday, February 18, 2018 at 9:59:24 AM UTC-5, Daniel Moerner wrote: > > > > On

[qubes-users] Re: Installing Qubes 4 with petitboot

2018-02-20 Thread Tim W
On Monday, February 19, 2018 at 1:25:51 PM UTC-5, qube...@go-bailey.com wrote: > I have a new KCMA-D8 based machine with petitboot installed. When I > attempt to boot from the Qubes 4 DVD, the install media is not > recognized by petitboot. Other installation media that I've tried, like > a