[qubes-users] Can split-pgp work with my yubikey?

2020-03-08 Thread Guerlan
I want to use my yubikey to ssh from all my Qube VMs to my server. To do 
that I need pgp to interact with my yubikey. It's almost like 
https://www.qubes-os.org/doc/split-gpg/ but with the yubikey inside a 
'trusted' AppVM instead of a private key inside a 'trusted' AppVM

Is it possible?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6bba6887-cf29-457a-9135-933f90c384f3%40googlegroups.com.


[qubes-users] EFI Partition too small; unable to do a kernel upgrade

2020-03-08 Thread AQubesUser

Hey guys,

I recently installed Qubes OS on my SSD, which already had Windows 10 on 
it and I can't upgrade my kernel anymore, because Windows only creates a 
100MB EFI partition. I created another EFI partition with the size of 
1GB, but my motherboard somehow couldn't read it (the 1GB FAT32 
partition was located at about 150GB from the start). Would you advice 
me to reinstall Qubes OS in legacy mode or should I use GRUB with UEFI 
(I'm not sure, because in the docs, using UEFI in combination with GRUB 
was never mentioned)


(And no, sorry, I want to keep Windows 10 installed and I don't want to 
use it in a VM, because I need hardware acceleration for games :()


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f6d51da2-3163-afdd-3679-253fa6345879%40airmail.cc.


[qubes-users] Fixing failed lvm recovery

2020-03-08 Thread 'hut7no' via qubes-users
I recently deleted three large AppVMs on accident.
I panicked and shut off my computer to avoid writing.
The AppVMs were on a secondary usb drive, configured as show in the qubes 
documentation.
I tried to recover using the relevant /etc/lvm/archive/ files with vgcfgrestore 
and ended up using --force since I'm using thin volumes.
I used --test, it seemed to work, then I ran the command without --test, for 
each .vg file, from most recent to the oldest relevant file.
Once I tried to activate the volume group with vgchange -ay qubes, I got errors 
saying the transaction_id was wrong.
Lvscan shows the whole drive as inactive.
Is there anything I can do to fix this, or at least recover some individual 
files?
Thank you in advance.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200308183920.GA838%40mail2-dvm.
Activating logical volume qubes/poolhd0 exclusively.
activation/volume_list configuration setting not defined: Checking only 
host tags for qubes/poolhd0.
Creating qubes-poolhd0_tmeta
Loading qubes-poolhd0_tmeta table (253:343)
Resuming qubes-poolhd0_tmeta (253:343)
Creating qubes-poolhd0_tdata
Loading qubes-poolhd0_tdata table (253:344)
Resuming qubes-poolhd0_tdata (253:344)
Executing: /usr/sbin/thin_check -q --clear-needs-check-flag 
/dev/mapper/qubes-poolhd0_tmeta
Creating qubes-poolhd0-tpool
Loading qubes-poolhd0-tpool table (253:345)
Resuming qubes-poolhd0-tpool (253:345)
  Thin pool qubes-poolhd0-tpool (253:345) transaction_id is 206, while expected 
202.
Removing qubes-poolhd0-tpool (253:345)
Removing qubes-poolhd0_tdata (253:344)
Removing qubes-poolhd0_tmeta (253:343)
Activating logical volume qubes/vm-test-random-private exclusively.
activation/volume_list configuration setting not defined: Checking only 
host tags for qubes/vm-test-random-private.
Creating qubes-poolhd0_tmeta
Loading qubes-poolhd0_tmeta table (253:343)
Resuming qubes-poolhd0_tmeta (253:343)
Creating qubes-poolhd0_tdata
Loading qubes-poolhd0_tdata table (253:344)
Resuming qubes-poolhd0_tdata (253:344)
Executing: /usr/sbin/thin_check -q --clear-needs-check-flag 
/dev/mapper/qubes-poolhd0_tmeta
Creating qubes-poolhd0-tpool
Loading qubes-poolhd0-tpool table (253:345)
Resuming qubes-poolhd0-tpool (253:345)
  Thin pool qubes-poolhd0-tpool (253:345) transaction_id is 206, while expected 
202.
Removing qubes-poolhd0-tpool (253:345)
Removing qubes-poolhd0_tdata (253:344)
Removing qubes-poolhd0_tmeta (253:343)
Activating logical volume qubes/vm-test-random-2-private exclusively.
activation/volume_list configuration setting not defined: Checking only 
host tags for qubes/vm-test-random-2-private.
Creating qubes-poolhd0_tmeta
Loading qubes-poolhd0_tmeta table (253:343)
Resuming qubes-poolhd0_tmeta (253:343)
Creating qubes-poolhd0_tdata
Loading qubes-poolhd0_tdata table (253:344)
Resuming qubes-poolhd0_tdata (253:344)
Executing: /usr/sbin/thin_check -q --clear-needs-check-flag 
/dev/mapper/qubes-poolhd0_tmeta
Creating qubes-poolhd0-tpool
Loading qubes-poolhd0-tpool table (253:345)
Resuming qubes-poolhd0-tpool (253:345)
  Thin pool qubes-poolhd0-tpool (253:345) transaction_id is 206, while expected 
202.
Removing qubes-poolhd0-tpool (253:345)
Removing qubes-poolhd0_tdata (253:344)
Removing qubes-poolhd0_tmeta (253:343)
Activating logical volume qubes/vm-storage8-dvm-bk-private exclusively.
activation/volume_list configuration setting not defined: Checking only 
host tags for qubes/vm-storage8-dvm-bk-private.
Creating qubes-poolhd0_tmeta
Loading qubes-poolhd0_tmeta table (253:343)
Resuming qubes-poolhd0_tmeta (253:343)
Creating qubes-poolhd0_tdata
Loading qubes-poolhd0_tdata table (253:344)
Resuming qubes-poolhd0_tdata (253:344)
Executing: /usr/sbin/thin_check -q --clear-needs-check-flag 
/dev/mapper/qubes-poolhd0_tmeta
Creating qubes-poolhd0-tpool
Loading qubes-poolhd0-tpool table (253:345)
Resuming qubes-poolhd0-tpool (253:345)
  Thin pool qubes-poolhd0-tpool (253:345) transaction_id is 206, while expected 
202.
Removing qubes-poolhd0-tpool (253:345)
Removing qubes-poolhd0_tdata (253:344)
Removing qubes-poolhd0_tmeta (253:343)
Activating logical volume qubes/vm-storage8-dvm-bk-private-import 
exclusively.
activation/volume_list configuration setting not defined: Checking only 
host tags for qubes/vm-storage8-dvm-bk-private-import.
Creating qubes-poolhd0_tmeta
Loading qubes-poolhd0_tmeta table (253:343)
Resuming qubes-poolhd0_tmeta (253:343)
Creating qubes-poolhd0_tdata
Loading qubes-poolhd0_tdata table (253:344)
 

[qubes-users] Nitropad Intel ME neutering

2020-03-08 Thread acharya . sagar . sagar5
Disabling Intel ME completely will shut off the processor completely and 
so, the malicious part of the code has been suppressed according to the 
information given in the below link

https://github.com/osresearch/heads-wiki/blob/master/Clean-the-ME-firmware.md

Does ME cleaning achieve removing completely the access of it over hard 
disk files or is it just a better but incompletely secure state than Intel 
ME complete as in other laptops?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/81dbe48c-1ef4-45e8-a16d-c0546f53c331%40googlegroups.com.


Re: [qubes-users] Is it possible to get an app like WinAuth for Linux or what do you use for 2 step verification ?

2020-03-08 Thread A E
søn. 8. mar. 2020 kl. 00.58 skrev :

> On Sat, Mar 07, 2020 at 03:08:13PM -0800, A wrote:
> > Is it possible to get an app like WinAuth for Linux or what do you use
> > for 2 step verification ?
>
> https://www.qubes-os.org/doc/multifactor-authentication/
>
>
>
>

Thanks.

Does Qubes OS 4.0.3 come with a minimal Template VM preinstalled, or do I
have to set it up myself first ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABRRaUHybF2oiDa5-9UNwXLLzTjXO-kO%2BhqyE6jQUYrnR%3DjGpA%40mail.gmail.com.