Re: [qubes-users] [Qubes OS 4.0.1 / Debian 10] 403 Forbidden IP sudo apt update
Hello Charles, Thanks for your answer. I followed each step, including the one where we have to add the key, but that doesn't change anything, I still have the same problem. Thanks for your help. Axel Le mardi 3 décembre 2019 20:38:44 UTC+1, Charles Peters a écrit : > > > > On Tue, Dec 3, 2019 at 5:07 AM > wrote: > >> Hello, >> I've been trying to install QGIS via their repositories for a few days >> now, but I have a problem when I do sudo apt update: >> >> user@debian-10:~$ sudo apt update >> ... >> Achieved: 4 https://cdn-aws.deb.debian.org/debian-security >> buster/updates InRelease >> Reading package lists Fact >> E: Unable to retrieve https://qgis.org/debian/dists/buster/InRelease 403 >> Forbidden[IP : 127.0.0.0.1 8082] >> E: The deposit https://qgis.org/debian buster InRelease is not signed. >> N: Updates from such a repository cannot be done securely, and are >> therefore disabled by default. >> N: See the apt-secure(8) manual pages for repository creation and user >> configuration details. >> user@debian-10:~$ >> >> It seems that my IP address is blacklisted from the QGIS repository. >> > > It looks like you haven't added the repository key. > https://qgis.org/en/site/forusers/alldownloads.html#debian-ubuntu > > Did you add the repository gpg key? > Note: If you follow the commands listed on the web page in a Template VM, > the wget command will fail. > curl -x 127.0.0.1:8082 https://qgis.org/downloads/qgis-2019.gpg.key > > qgis-2019.gpg.key > > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c2d735c7-e92d-4752-a4b1-edca568b9e77%40googlegroups.com.
Re: [qubes-users] ! qubes won't boot - no access to data - please help
pkw: > > > W dniu niedziela, 8 grudnia 2019 18:13:58 UTC+1 użytkownik pkw napisał: >> *sdc 8:32 0 465,8G 0 disk ├─sdc1 8:33 0 1G 0 part >> └─sdc2 8:34 0 464,8G 0 part└─qubes 253:00 464,8G 0 crypt* >> >> >> root@X230:/qubes# mount /dev/mapper/qubes /qubes >> *mount: /qubes: unknown filesystem type 'LVM2_member'.* Did you cryptsetup open somewhere in there? You may also need to install the LVM thin package, I think it's named thinprovisioningtools. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/48f3dbae-b526-4bc6-462a-11491773ac01%40danwin1210.me.
[qubes-users] sys-net keeps dying
see the corresponding issue: https://github.com/QubesOS/qubes-issues/issues/5508 The tldr is that ever since I upgraded to fedora-30, sys-net has started dying intermittently (or less intermittently, nearly every time) I put my laptop to sleep. This is really problematic. I am wondering if it would make sense to re-create sys-net from scratch. Could it be that this is something from fedora-29 that is not working well with fedora-30? There doesn't seem to be much documentation on how to do this. One post suggests you just create a new VM and call it sys-net: https://www.reddit.com/r/Qubes/comments/amvkz3/how_to_create_net_and_firewall_again_with_default/efpl5i2/ However that doesn't seem right, isn't something extra needed to get the NetworkManager wifi menu widget set up? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191208195653.GA1977%40danwin1210.me.
[qubes-users] 2 GB RAM limit for PCI passthrough of USB controller?
Hi, this is a limitation that pleagues me on my otherwise excellent working Qubes setup: * Whenever I assign the USB controller (Intel Sunrise Point-H USB 3.0 xHCI) to a qube, regardless of the operating system (Debian or Windows) it crashes. If I stay below or equal to 2 GB there are no problems. * Windows doesn't even start * Debian boots but whenever I attempt using a USB device it immediately crashes the qube * The very same qubes without the USB controller or with 2GB memory assigned work perfectly Yes 2GB are plenty but if you are doing development (IDE, compiler, analyzer tools ...) 2GB can get tight quickly. * Do others have simliar issues or is this specific to my setup? * Is there anything Qubes or Xen specific I could look into (settings, logs etc)? * What could explain this behavior? /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191208194949.GA1642%40app-email-private. signature.asc Description: PGP signature
Re: [qubes-users] Re: my dom0 is not updating since before 4.01
Having this same (old now) problem. Tried adding --releasever=4.0 to sudo qubes-dom0-update and I get most of the update to download but not all of it. Unman suggested : "you could manually download it, copy it to dom0, check signature in dom0 with rpm -K, and then install." Which apparently worked but how do I go about that? What package am I looking for and where do I look for it? If you could suggest commands to be used that'd be great? Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4ac70d5b-c29d-457f-bffe-2e3553ea0c95%40googlegroups.com.
Re: [qubes-users] Has anybody gotten increased scrutiny at an international checkpoint because of having qubes installed?
I I will be doing some international travel in the upcoming months. In the past, I have had to turn on my laptop, and once I had to bring the system fully up and allow people to see my desktop -- though nobody has actually seized and gone through my computer as yet. Has anybody gotten increased scrutiny because they were running an enhanced security OS such as qubes when entering a country? If qubes is a "red flag," then I'll carry a different laptop. Carry another then, that's the safest. The easy solution (if you accept some "risks") that works as well is a micro-usb & some std linux on it, that is already booted. Give it a family picture background with sweet kids & some green :) And two or three non-sense documents that you can open. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a2880077-0186-46c7-abf7-76de6e4264b1%40web.de.
Re: [qubes-users] ! qubes won't boot - no access to data - please help
W dniu niedziela, 8 grudnia 2019 18:13:58 UTC+1 użytkownik pkw napisał: > > > > W dniu niedziela, 8 grudnia 2019 16:56:20 UTC+1 użytkownik awokd napisał: >> >> >> Check >> https://www.mail-archive.com/qubes-users@googlegroups.com/msg22764.html >> for some ideas. >> >> -- >> - don't top post >> Mailing list etiquette: >> - trim quoted reply to only relevant portions >> - when possible, copy and paste text instead of screenshots >> > > > I'm stuck ... > > root@X230:/qubes# ls -la /dev/mapper/ > total 0 > drwxr-xr-x 2 root root 80 Dec 8 17:50 . > drwxr-xr-x 21 root root4460 Dec 8 17:50 .. > crw--- 1 root root 10, 236 Dec 8 17:26 control > > *lrwxrwxrwx 1 root root 7 Dec 8 17:50 qubes -> ../dm-0* > > root@X230:/qubes# lsblk > NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT > sda 8:00 119,2G 0 disk > └─sda1 8:10 119,2G 0 part / > sdb 8:16 0 931,5G 0 disk > └─sdb1 8:17 0 930,6G 0 part /media/user/1tb-ext4 > > > > *sdc 8:32 0 465,8G 0 disk ├─sdc1 8:33 0 1G 0 part > └─sdc2 8:34 0 464,8G 0 part└─qubes 253:00 464,8G 0 crypt* > > > root@X230:/qubes# mount /dev/mapper/qubes /qubes > *mount: /qubes: unknown filesystem type 'LVM2_member'.* > > > root@X230:/qubes# lvmdiskscan > Incorrect metadata area header checksum on /dev/mapper/qubes at offset > 4096 > /dev/mapper/qubes [<464,76 GiB] LVM physical volume > /dev/sda1 [ 119,24 GiB] > /dev/sdb1 [ 930,61 GiB] > /dev/sdc1 [ 1,00 GiB] > /dev/sdc2 [ 464,76 GiB] > 0 disks > 4 partitions > 1 LVM physical volume whole disk > 0 LVM physical volumes > > > also: > root@X230:/qubes# vgscan Reading volume groups from cache. root@X230:/qubes# vgscan --cache Incorrect metadata area header checksum on /dev/mapper/qubes at offset 4096 Incorrect metadata area header checksum on /dev/mapper/qubes at offset 4096 Incorrect metadata area header checksum on /dev/mapper/qubes at offset 4096 Reading volume groups from cache. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0e0c81eb-9f71-492b-9034-19d678d501f8%40googlegroups.com.
Re: [qubes-users] ! qubes won't boot - no access to data - please help
W dniu niedziela, 8 grudnia 2019 16:56:20 UTC+1 użytkownik awokd napisał: > > > Check > https://www.mail-archive.com/qubes-users@googlegroups.com/msg22764.html > for some ideas. > > -- > - don't top post > Mailing list etiquette: > - trim quoted reply to only relevant portions > - when possible, copy and paste text instead of screenshots > I'm stuck ... root@X230:/qubes# ls -la /dev/mapper/ total 0 drwxr-xr-x 2 root root 80 Dec 8 17:50 . drwxr-xr-x 21 root root4460 Dec 8 17:50 .. crw--- 1 root root 10, 236 Dec 8 17:26 control *lrwxrwxrwx 1 root root 7 Dec 8 17:50 qubes -> ../dm-0* root@X230:/qubes# lsblk NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT sda 8:00 119,2G 0 disk └─sda1 8:10 119,2G 0 part / sdb 8:16 0 931,5G 0 disk └─sdb1 8:17 0 930,6G 0 part /media/user/1tb-ext4 *sdc 8:32 0 465,8G 0 disk ├─sdc1 8:33 0 1G 0 part └─sdc2 8:34 0 464,8G 0 part└─qubes 253:00 464,8G 0 crypt* root@X230:/qubes# mount /dev/mapper/qubes /qubes *mount: /qubes: unknown filesystem type 'LVM2_member'.* root@X230:/qubes# lvmdiskscan Incorrect metadata area header checksum on /dev/mapper/qubes at offset 4096 /dev/mapper/qubes [<464,76 GiB] LVM physical volume /dev/sda1 [ 119,24 GiB] /dev/sdb1 [ 930,61 GiB] /dev/sdc1 [ 1,00 GiB] /dev/sdc2 [ 464,76 GiB] 0 disks 4 partitions 1 LVM physical volume whole disk 0 LVM physical volumes -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/42e24317-6a1e-46c1-a1e0-00f7996d93d3%40googlegroups.com.
[qubes-users] Has anybody gotten increased scrutiny at an international checkpoint because of having qubes installed?
I will be doing some international travel in the upcoming months. In the past, I have had to turn on my laptop, and once I had to bring the system fully up and allow people to see my desktop -- though nobody has actually seized and gone through my computer as yet. Has anybody gotten increased scrutiny because they were running an enhanced security OS such as qubes when entering a country? If qubes is a "red flag," then I'll carry a different laptop. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b8322a82-96d6-49b0-8591-bcf183ee6a9d%40googlegroups.com.
[qubes-users] How do I attach a hard drive to a VM on boot?
I have an HP laptop with 4.0.2.rc2 installed. Everything works well, with the exception of a couple of small things I've asked about previously. Now I'm trying to tune it a bit. I have a 256G SSD where qubes is installed, and a 1TB traditional hard drive. I want to attach the hard drive to my "work" VM on boot. Currently, I boot up the machine, go to the "Qubes Devices" tab on the panel, choose the device, and attach it manually. Then I open a terminal in the VM and mount it to a directory from the command line. It works fine. However... it would be more convenient to have it mount automatically on that VM on boot up. I know how to edit the /etc/fstab file to automatically mount a visible drive. What I don't know how to do is to make the drive visible to the VM automatically on boot. I've poked around the documentation but missed the instructions, if they are there. Can anybody either tell me how to do this or point me to the documentatoin on it? And, by the way, the more I'm using this OS, the more I like it. I have to think a little differently about managing workflow, but the idea of being able to surf the web on one VM and do work on another while compartmentalizing them transparently is really great. Great job. I appreciate the work the developers have done. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f72026c3-49e7-4d53-ae1c-80d01c512c43%40googlegroups.com.
Re: [qubes-users] ! qubes won't boot - no access to data - please help
pkw: > > > W dniu niedziela, 8 grudnia 2019 16:30:43 UTC+1 użytkownik pkw napisał: >> >> >> >> W dniu niedziela, 8 grudnia 2019 16:20:20 UTC+1 użytkownik awokd napisał: >>> >>> >>> Yes, you should be able to mount the drive either in another system or >>> with a rescue boot CD/image on the same system. Look for cryptsetup + >>> LVM recovery. >>> >>> -- >>> - don't top post >>> Mailing list etiquette: >>> - trim quoted reply to only relevant portions >>> - when possible, copy and paste text instead of screenshots >>> >> >> >> Thank you for the answer, just burning qubes usb. >> Once I mount main system, where to look for for the private VM files? I >> would like to copy it to some other drive, I suspect the one I have now is >> faulty. >> > > > not god... qubes rescue mode doesn't work.. > . > It asks to choose from 4 options, when I chose to mount as read-only it > asks me for LUKS password for sda2, > when I enter it there is a message that I don't have any Linux partitions.. > > Any clues how to proceed? > Check https://www.mail-archive.com/qubes-users@googlegroups.com/msg22764.html for some ideas. -- - don't top post Mailing list etiquette: - trim quoted reply to only relevant portions - when possible, copy and paste text instead of screenshots -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3f9a789f-3c3b-c186-fcf3-420f3cbc360f%40danwin1210.me.
Re: [qubes-users] ! qubes won't boot - no access to data - please help
W dniu niedziela, 8 grudnia 2019 16:30:43 UTC+1 użytkownik pkw napisał: > > > > W dniu niedziela, 8 grudnia 2019 16:20:20 UTC+1 użytkownik awokd napisał: >> >> >> Yes, you should be able to mount the drive either in another system or >> with a rescue boot CD/image on the same system. Look for cryptsetup + >> LVM recovery. >> >> -- >> - don't top post >> Mailing list etiquette: >> - trim quoted reply to only relevant portions >> - when possible, copy and paste text instead of screenshots >> > > > Thank you for the answer, just burning qubes usb. > Once I mount main system, where to look for for the private VM files? I > would like to copy it to some other drive, I suspect the one I have now is > faulty. > not god... qubes rescue mode doesn't work.. . It asks to choose from 4 options, when I chose to mount as read-only it asks me for LUKS password for sda2, when I enter it there is a message that I don't have any Linux partitions.. Any clues how to proceed? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ffee5fa6-1f3f-48b6-bd90-55cac513ad85%40googlegroups.com.
Re: [qubes-users] ! qubes won't boot - no access to data - please help
W dniu niedziela, 8 grudnia 2019 16:20:20 UTC+1 użytkownik awokd napisał: > > > Yes, you should be able to mount the drive either in another system or > with a rescue boot CD/image on the same system. Look for cryptsetup + > LVM recovery. > > -- > - don't top post > Mailing list etiquette: > - trim quoted reply to only relevant portions > - when possible, copy and paste text instead of screenshots > Thank you for the answer, just burning qubes usb. Once I mount main system, where to look for for the private VM files? I would like to copy it to some other drive, I suspect the one I have now is faulty. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ed8752ae-43f8-45ec-b414-3bc05d48f231%40googlegroups.com.
Re: [qubes-users] ! qubes won't boot - no access to data - please help
IT Geek: > Hi, > > my qubes installation won't boot, I have no backup... :/ > > I started it today, dom0 started but any of the VMs could'nt start. there > was an error: > > "domain has failed to start volume qubes_dom0/vm... missing" - more less. I > cant remember exact error > > then I rebooted the machine and I failed completely... > > I have error: > > . > error: unknown filesystem > Entering rescue mode > grub rescue> > > > > Is it possible to mount drive with qubes in other system and rescue my > data? I have the encryption password > Yes, you should be able to mount the drive either in another system or with a rescue boot CD/image on the same system. Look for cryptsetup + LVM recovery. -- - don't top post Mailing list etiquette: - trim quoted reply to only relevant portions - when possible, copy and paste text instead of screenshots -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0c9ed376-8855-af5d-12cd-abb5227202e3%40danwin1210.me.
Re: [qubes-users] qvm-block arg err while attempting to mount private.img as vol
Dave: > I have a broken app-vm, from which I want to recover the usr home dir. > I want to mount the private.img as a vol to the new working vm using > qvm-block so I can copy user files in accordance with instructions here: > https://www.qubes-os.org/news/2017/04/26/qubes-compromise-recovery/ > >> >> It is possible to mount one VM’s private image as a volume to another >> AppVM. One can then run whatever malware scanner or investigative software >> in that other AppVM. This operation is indeed very easy to do: >> >> [joanna@dom0 ~]$ qvm-block -A --ro admin-ir >> dom0:/var/lib/qubes/appvms/personal/private.img >> [root@admin-ir user]# mount -o ro /dev/xvdi /mnt/personal/ >> >> However, the command returns err msg for 'admin-ir' argument: > > [David@dom0 ~]$ qvm-block -A --ro admin-ir >> dom0:/var/lib/qubes/appvms/personal/private.img >> usage: qvm-block [--verbose] [--quiet] [--help] [--list-device-classes] >> {list,ls,l,attach,at,a,detach,d,dt} ... >> qvm-block: error: argument command: invalid choice: 'admin-ir' (choose >> from 'list', 'ls', 'l', 'attach', 'at', 'a', 'detach', 'd', 'dt') >> [David@dom0 ~]$ >> > > Please help with proper syntax so I can recover user data from an app-vm > that won't boot. TIA > The article you're referring to is about Qubes 3.2, but the output from the qvm-block command appears to be from 4.0. Probably the safest way to accomplish the same thing is: - Create new VM with same sized private volume as the broken one - Shut it down - Locate the source(broken) and target(new) private volume names with "ls /dev/mapper" in dom0 terminal. They will end in "--private", not --back or --snap. - sudo cp /dev/mapper/[broken]--private /dev/mapper/[new]--private - Power on new VM -- - don't top post Mailing list etiquette: - trim quoted reply to only relevant portions - when possible, copy and paste text instead of screenshots -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/49e378fe-af32-27d6-c6f6-67c12670d433%40danwin1210.me.
[qubes-users] ! qubes won't boot - no access to data - please help
Hi, my qubes installation won't boot, I have no backup... :/ I started it today, dom0 started but any of the VMs could'nt start. there was an error: "domain has failed to start volume qubes_dom0/vm... missing" - more less. I cant remember exact error then I rebooted the machine and I failed completely... I have error: . error: unknown filesystem Entering rescue mode grub rescue> Is it possible to mount drive with qubes in other system and rescue my data? I have the encryption password -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4705c2eb-b9da-476e-8650-9fea77a76734%40googlegroups.com.