Re: [qubes-users] LUKS passphrase failures

2020-07-05 Thread joshkane375
Booting into Kali (forensics mode) and unlocking the ssd failed. I typed out the passphrase to a text document, confirmed it was correct, and pasted it into the prompt. "incorrect passphrase" This implies to me that the header was altered in some way. 2 days ago, my battery has completely

Re: [qubes-users] LUKS passphrase failures

2020-07-05 Thread haaber
I have tried this process with the other kernel options available as well, to no avail. Any help or advice (successful or not) is appreciated. sounds daunting. So did you use a live-linux that has luks 'onboard' (like tails) ? That way you could distinguish between luks problems and qubes

Re: [qubes-users] Adding a new / an extra virtual disk to a HVM in qubes 4.x

2020-07-05 Thread keld....@gmail.com
thanks but the drive does not exist as you assume - i want to make the disk from the existing volumegroup/disk-pool I think i first need to allocate a lvm, then encrypt it ? and assign it somehow to get it to be persistent i think i need to also alter the XLM file used to define the virtual

[qubes-users] Re: safely remove yum from debian tempate?

2020-07-05 Thread Rune Philosof
Hi søndag den 28. juni 2020 kl. 23.23.39 UTC+2 skrev Dave C: > > A) Is it safe to remove qubes-core-agent-dom0-updates and > qubes-vm-recommended from a debian template? > I've noticed that installing qubes-vm-recommended brings yum and yum-utils > along with it. This leaves me wondering, is

Re: [qubes-users] Qubes-OS nature.

2020-07-05 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 7/5/20 5:32 AM, Jason Long wrote: > I just want to use Qubes-OS in general and not use its > Virtualization feature. Is it secure or just secure in > Virtualization? Please always answer to the list so others can follow and contribute to our

[qubes-users] Bionic and Arch templates/packages

2020-07-05 Thread unman
Hello All, Getting back in the swing after an enforced absence. I've uploaded new builds of the bionic and Arch templates to https://qubes.3isec.org/Templates These packages are signed with my Qubes Signing key - you can find this on keyservers, in this list, and at GitHub. Verify the key, and