I will be reimaging a QubesOS machine. Will I be able to save the existing
VM's manually and import into the fresh Install of Qubes?
I would like to do the backup operation without needing to actually boot up the
existing OS, and then restore the backed up volumes after an install.
--
You re
@Yuraeitha
actually i am experiencing this bug with qvm-backup-restore:
https://groups.google.com/forum/#!topic/qubes-users/HZVBAqerLoI
Is there a way to manually trigger a refresh of the drop-down menu of available
qubes? qvm-backup-restore does not reliably add qubes to the menu of available
i have successfully backed up and restored several vm's after upgrading from
rc-1 to rc-4
there is a bug which happens repeatedly when restoring the fedora-25-dvm
domain. I have already restored fedora-25 template successfully.
when restore begins the vm is added to the qubes vm menu but soon af
thank you!
qvm-backup --help
didnt display too much information, so i was mostly guessing at usage, thank
you for your thorough answer
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
I have a usb drive attached to sys-usb, lets say its mounted at /mnt on sys-usb
and im trying to backup a vm named MyVm
from dom0 the command:
sudo qvm-backup sys-usb:/mnt MyVm
returns the error:
The backup directory does not exist
how can i make a backup to USB when USB devices are not expos
I recently made a kali template vm by cloning the qubes debian 8 template and
converting it to kali.
If I were to remove the base debian 8 template from dom0, would this also
remove the cloned kali template vm?
--
You received this message because you are subscribed to the Google Groups
"qube
although the standalone will start up now with a cdrom it fails to install or
do much at all. it loads, it OK's the rom in the startup process, and then
abruptly shuts down the standalone vm without any error messages before it gets
past the boot sequence
--
You received this message because
fixed by enabling testing updates
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to q
fixed from enabling testing updates
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to
My cpu supports vt-x, vt-d
this works
qvm-create [vmname] --class StandaloneVM --label green
this does not
qvm-start --cdrom :/home/user/Downloads/.iso
returns error:
Start failed: Internal Error: libxenlight failed to create new domain
libxl logs tell me this:
Backend for CD devices on HVM gu
I have a template VM im trying to back up which is rather larger, 185gb or so.
Am attempting to backup to an external usb-connected sata drive with about half
a terabyte of space on it.
Less than 10% into the backup a failure message appears informing me that
"device is out of space" where in
I have a template VM im trying to back up which is rather larger, 185gb or so.
Am attempting to backup to an external usb-connected sata drive with about half
a terabyte of space on it.
Less than 10% into the backup a failure message appears informing me that
"device is out of space" where in
Nevermind, I should have skimmed through the documentation first. I found
/rw/config/qubes-firewall-user-script
case closed.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send a
Greetings,
I have custom iptables rules for sys-firewall that is applied during
sys-firewall startup via /rw/config/rc.local
When I startup an app VM it automatically alters the sys-firewall iptables
rules entirely and replaces my custom rule set with another set.
Is there a way I can preserve
Should I wait for qubes to release a patch or should I grab the Fedora 25 patch
for this exploit?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+uns
[MyHVM] > VM Settings > Applications no longer will add selected applications
to the dom0 VM drop down menu in Qubes 4.0
Expected: going into VM preferences and choosing programs to appear in the
Qubes drop down menu for selected VM should cause the applications to be added
to the quickstart t
Solved:
Resizing disks is now done in GUI from the Qubes drop-down menu in dom0 under
[MyHVM] > VM Settings
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qube
Just wanted to bump this.
How are HVM disks resized on Qubes 4.0rc1?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
Thank you for the detailed description, Patrik. That sounds like exactly what
I am looking for.
Much appreciated.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
Leo Gaspard,
I have read about AEM but have never used it, it seems like it is geared
towards protecting from USB's with malicious firmware on them.
Does AEM actually verify the integrity of /boot before using? This is what I
am looking for, either a method of encrypting /boot or even better,
I dont dual boot, as implied earlier. I have had suspicious activity happen
before in Qubes3.2 at a certain location several times; errors from Xen saying
that my machine is not returning all of its memory and while viewing Xen logs I
have seen the creation of domains which I surely did not do
>the free privilege escalation qubes gives malicious apps
I dont believe Qubes gives malicious apps free privilege escalation, but if you
want a password to be required for privilege escalation on the default user, or
any user, you should just be able to require password for sudo i believe its in
The directions on Qubes website used to resize an HVM disk do not work on
Qubes4.0rc1
/var/lib/qubes/appvms// has no root.img file in it. the only file in
the directory is icon.png
How do I resize an HVM disk on 4.0rc1
--
You received this message because you are subscribed to the Google Gro
Does Qubes offer a method of securing /boot? not just against USB evil maid
attacks, but from tampering in general?
for example, while a laptop is off, what would stop a malicious user from live
booting to an arbitrary distro and altering kernel or xen images located on the
unencrypted /boot pa
please don't add ricing tools to Qubes.
Absolutely unnecessary.
I would prefer not to see people posting onto image boards screenfetches of a
riced out QubesOS with or without an animu girl backdrop.
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
I would just like to start off by saying I am a huge fan of Qubes and I am glad
the decision was made to utilize HVM's instead of PV's.
I just wanted to contribute some issues I have encountered with Qubes 4.0:
Issue 1: Copying files from dom0 seems to be broken.
qvm-copy-to-vm hangs and nev
26 matches
Mail list logo