Re: [qubes-users] Qubes not working on Thinkpad T480

2019-09-23 Thread 'awokd' via qubes-users
evan.landers5...@gmail.com:
> Hi all,
> 
> I recently installed Qubes Release 4.0.2-rc1 on my Thinkpad 480 and the 
> system won't boot at all.  I have had this issue with previous versions of 
> Qubes on this laptop as well.  Does anybody know of a possible fix?

Have you seen https://www.qubes-os.org/doc/uefi-troubleshooting/? Where
in the process does it stop booting?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/db072445-8740-430e-2121-451a3823cb55%40danwin1210.me.


[qubes-users] Re: Copying text to/from Dom0

2019-09-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 9/23/19 4:49 AM, duc...@disroot.org wrote:
> Andrew David Wong:
>> On 9/22/19 6:39 AM, duc...@disroot.org wrote:
>>> In the official documentation "Copying from (and to) dom0",
>>> there is no mention at all of how to copy text via the
>>> clipboard from a domain to dom0. What is the method to use?
>> 
>> 
>> https://www.qubes-os.org/doc/copy-from-dom0/#copying-to-dom0
>> 
>> 
> 
> Hi,
> 
> That's the document I was referencing, but it doesn't mention using
> the clipboard, only files. It seemed to me that passing plain text
> by the clipboard to dom0 was going to be more secure than passing a
> complete file, so assumed that would be the preferred method. Does
> such a mechanism not exist then?
> 
> Thanks.
> 

Correct. The warning against copying files into dom0 also applies to
copying text into dom0. I'll update the document to reflect this.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=Uwb0
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9764bc2c-5f3c-560d-db7c-8852d5ae3a50%40qubes-os.org.


Re: [qubes-users] Making a DispVM permanent

2019-09-23 Thread brendan . hoar
On Monday, September 23, 2019 at 11:57:22 AM UTC-4, steve.coleman wrote:
>
> On 2019-09-21 07:27, tetrahedra via qubes-users wrote: 
> > Is there a way to turn currently-running DispVM instance into a regular 
> > permanent AppVM, which I can delete later? 
>
> I'm not sure it this helps or not, but you could try pausing the dispvm 
> and restart it when you need it. I don't know what happens if the 
> machine reboots in the mean time, but that paused vm should stop using 
> memory and cpu thus allowing you to use those resources elsewhere. 
>

Just to clarify: while pausing a Qubes VM does relinquish the CPU usage, it 
does not relinquish the memory used. Instead, it just freezes the memory 
allocation to the current amount until you unpause the VM.

An additional caution for VMs that support memory balancing is that if the 
memory pressure has changed significantly from the time that the VM has 
paused, when you unpause it, there's a chance that it may fail the next 
memory request with xen and be terminated immediately.

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/657bb674-665e-4057-b770-97e3f9123a2b%40googlegroups.com.


[qubes-users] Qubes not working on Thinkpad T480

2019-09-23 Thread evan . landers5905
Hi all,

I recently installed Qubes Release 4.0.2-rc1 on my Thinkpad 480 and the 
system won't boot at all.  I have had this issue with previous versions of 
Qubes on this laptop as well.  Does anybody know of a possible fix?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/456b610c-a230-4e47-bfdc-71c4ddbe2d67%40googlegroups.com.


[qubes-users] Bad/expired certs in qubes repo mirror dgplug.org

2019-09-23 Thread brendan . hoar
Report below:

[MIRROR] qubes-template-fedora-30-minimal-4.0.1-201907160147.noarch.rpm: 
> Curl error (60): SSL peer certificate or SSH remote key was not OK for 
> https://mirrors.dgplug.org/qubes/repo/yum/r4.0/templates-itl/rpm/qubes-template-fedora-30-minimal-4.0.1-201907160147.noarch.rpm
>  
> [SSL certificate problem: certificate has expired]
> [MIRROR] qubes-template-debian-10-4.0.1-201907141704.noarch.rpm: Curl 
> error (60): SSL peer certificate or SSH remote key was not OK for 
> https://mirrors.dgplug.org/qubes/repo/yum/r4.0/templates-itl-testing/rpm/qubes-template-debian-10-4.0.1-201907141704.noarch.rpm
>  
> [SSL certificate problem: certificate has expired]
> [MIRROR] qubes-template-debian-9-minimal-4.0.1-201901271906.noarch.rpm: 
> Curl error (60): SSL peer certificate or SSH remote key was not OK for 
> https://mirrors.dgplug.org/qubes/repo/yum/r4.0/templates-itl/rpm/qubes-template-debian-9-minimal-4.0.1-201901271906.noarch.rpm
>  
> [SSL certificate problem: certificate has expired]
> (1/6): qubes-template-debian-9-minimal-4.0.1-20 606 kB/s | 196 MB 
> 05:31
> [MIRROR] qubes-template-debian-10-minimal-4.0.1-201907141704.noarch.rpm: 
> Curl error (60): SSL peer certificate or SSH remote key was not OK for 
> https://mirrors.dgplug.org/qubes/repo/yum/r4.0/templates-itl-testing/rpm/qubes-template-debian-10-minimal-4.0.1-201907141704.noarch.rpm
>  
> [SSL certificate problem: certificate has expired]
>

-Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/71c8ea74-b541-4c92-aa7b-71fa64e945f1%40googlegroups.com.


Re: [qubes-users] How to tell what AppVMs are on the ssd part of my LVM and which are on the regular drive?

2019-09-23 Thread 'awokd' via qubes-users
Stumpy:

> I was thinking about reinstalling and wanted to ask about restoring
> backups and overwiting or something similar templates and pre-existing
> appvms? Normally when i restore if i restore something where there is a
> template/appvm with the same name it will rename the newly restored
> vm/template. Is there a way say like on install to restore all the
> templates/appvms i currently have?
> 
Easiest way I found is to rename or delete the existing templates before
a restore, but if you haven't done a bunch of customization you might as
well use the fresh ones instead.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/83127a3b-ceed-3b37-5e3b-676b2e36756d%40danwin1210.me.


Re: [qubes-users] Making a DispVM permanent

2019-09-23 Thread Steve Coleman

On 2019-09-21 07:27, tetrahedra via qubes-users wrote:

Is there a way to turn currently-running DispVM instance into a regular 
permanent AppVM, which I can delete later?




I'm not sure it this helps or not, but you could try pausing the dispvm 
and restart it when you need it. I don't know what happens if the 
machine reboots in the mean time, but that paused vm should stop using 
memory and cpu thus allowing you to use those resources elsewhere.


For a more long term storage you might look at the new backup software 
that is in development (Sparsebak). The current qubes backup will only 
save the starting state of a running dispvm, but the new backup system 
might possibly store the current state. You could try to pause the 
dispvm, make a hot backup with sparsebak, and then if you loose your 
dispvm due to an inadvertent shutdown, then try restoring the prior 
state from that backup.


Another possibility, pause the dispvm then clone it. I was successful at 
restarting the clone by running gnome-terminal from the Qubes Manager, 
but when I exited the terminal app the clone shutdown and disappeared 
like a normal dispvm.  You could also pause the clone rather than 
shutting it down, and simply try playing the shell game by cloning as a 
checkpoint, and only start the clone if you loose the original dispvm 
due to power failure, etc.


Perhaps there is a qubes property that could change that dispvm 
auto-remove behavior?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2e6d2f6e-67a8-78c2-5c66-ceeb776eaa91%40jhuapl.edu.


Re: [qubes-users] Re: Copying text to/from Dom0

2019-09-23 Thread Bernhard




That's the document I was referencing, but it doesn't mention using the
clipboard, only files. It seemed to me that passing plain text by the
clipboard to dom0 was going to be more secure than passing a complete
file, so assumed that would be the preferred method. Does such a
mechanism not exist then?

There is a reason. Look for example here:

https://security.stackexchange.com/questions/113627/what-is-the-risk-of-copy-and-pasting-linux-commands-from-a-website-how-can-some
https://unix.stackexchange.com/questions/15101/how-to-avoid-escape-sequence-attacks-in-terminals

better write/copy in a file, check it carefully and transfer then. And check 
again. Many other attacks are possible..

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c3fbe112-3fb8-d9db-3611-a2c4d09034c1%40web.de.


Re: [qubes-users] How to tell what AppVMs are on the ssd part of my LVM and which are on the regular drive?

2019-09-23 Thread Stumpy

On 2019-09-22 11:18, 'awokd' via qubes-users wrote:

Stumpy:


This time i did not go the secondary storage route as I was having a
miserable time trying to get it to work, for whatever reason I seem to
understand diagrams of LVM but when it comes to putting the whole thing
together, esp via terminal, i am not getting it.
So as a result, this time during the install I just selected both
drives... so i guess its in raid0?


Run "sudo pvs". If both physical volumes are in the same VG (probably
qubes_dom0), I believe that's the case.


So if i should reisntall, then I would need to install onto one drive,
then try to the secondary storage method?


Yes; I am happy to help if you get stuck.


Is there a way to use
something like the blivet-gui?


Maybe, but the less unnecessary software installed in dom0, the better...



I was thinking about reinstalling and wanted to ask about restoring 
backups and overwiting or something similar templates and pre-existing 
appvms? Normally when i restore if i restore something where there is a 
template/appvm with the same name it will rename the newly restored 
vm/template. Is there a way say like on install to restore all the 
templates/appvms i currently have?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/858db601-3e54-62f0-7aad-74c943388af7%40posteo.net.


[qubes-users] Re: Copying text to/from Dom0

2019-09-23 Thread duc01k
Andrew David Wong:
> On 9/22/19 6:39 AM, duc...@disroot.org wrote:
>> In the official documentation "Copying from (and to) dom0", there
>> is no mention at all of how to copy text via the clipboard from a
>> domain to dom0. What is the method to use?
> 
> 
> https://www.qubes-os.org/doc/copy-from-dom0/#copying-to-dom0
> 
> 

Hi,

That's the document I was referencing, but it doesn't mention using the
clipboard, only files. It seemed to me that passing plain text by the
clipboard to dom0 was going to be more secure than passing a complete
file, so assumed that would be the preferred method. Does such a
mechanism not exist then?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bb3a1465-397f-f16b-0c3c-c8e1649f7e60%40disroot.org.


signature.asc
Description: OpenPGP digital signature