Re: [qubes-users] Mounting directories across VMs (losetup/block device solution for directories)?
On 2/28/20 2:40 PM, Johannes Graumann wrote: On 2020-02-27 20:32, David Hobach wrote: On 2/26/20 10:23 PM, Johannes Graumann wrote: Hi, I'm experimenting with creating a sys-dropbox vm that syncs with my dropbox account. I would love to be able to then mount defined subdirectories of the synced path to other vms (losetop/qvm-block- style, which only works for files). Is this possible? Where to find pointers? qcrypt can do that: https://github.com/3hhh/qcrypt Nice solution, but overkill in my case - I use tresorit's E2EE solution (let's not get started on the closed source/snake oil discussion, I have to consider noob-co-usage ...) and want to sync that storage to a sys-tresorit, from where I want to grant access to certain subsections of it to individual vms - without additional encryption. I disagree with the idea that only pros deserve real security. I'd recommend automating stuff so much that it can be used by "noobs". Only that automation programming might require some "pro" knowledge, but it needs to be done only once. Any pointers on where to start exploring the above mentioned sshfs via qubes-rpc solution? Check the qubes-rpc doc on the Qubes website. I'm not sure whether someone already implemented that. However wrt your apparently low profile threat model I don't see too much of a security benefit over doing it over battle-hardened TCP anyway. So you might just want to check the Qubes doc on opening ports to other VMs. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8bc714cd-03b3-8f7d-d84b-168f3a02ea45%40hackingthe.net. smime.p7s Description: S/MIME Cryptographic Signature
Re: [qubes-users] Mounting directories across VMs (losetup/block device solution for directories)?
On 2020-02-27 20:32, David Hobach wrote: On 2/26/20 10:23 PM, Johannes Graumann wrote: Hi, I'm experimenting with creating a sys-dropbox vm that syncs with my dropbox account. I would love to be able to then mount defined subdirectories of the synced path to other vms (losetop/qvm-block- style, which only works for files). Is this possible? Where to find pointers? qcrypt can do that: https://github.com/3hhh/qcrypt Nice solution, but overkill in my case - I use tresorit's E2EE solution (let's not get started on the closed source/snake oil discussion, I have to consider noob-co-usage ...) and want to sync that storage to a sys-tresorit, from where I want to grant access to certain subsections of it to individual vms - without additional encryption. Any pointers on where to start exploring the above mentioned sshfs via qubes-rpc solution? Sincerely, Joh -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a3f6765132bff24fb69383f342e8fd5b%40graumannschaft.org.
Re: [qubes-users] Mounting directories across VMs (losetup/block device solution for directories)?
On 2/26/20 10:23 PM, Johannes Graumann wrote: > Hi, > I'm experimenting with creating a sys-dropbox vm that syncs with my > dropbox account. I would love to be able to then mount defined > subdirectories of the synced path to other vms (losetop/qvm-block- > style, which only works for files). > Is this possible? Where to find pointers? qcrypt can do that: https://github.com/3hhh/qcrypt -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/93038100-29c0-bd17-0d02-e6168c218a5e%40hackingthe.net. smime.p7s Description: S/MIME Cryptographic Signature
Re: [qubes-users] Mounting directories across VMs (losetup/block device solution for directories)?
Hello Johannes, Johannes Graumann schrieb am Mi., 26. Feb. 2020, 22:23: > (...) I'm experimenting with creating a sys-dropbox vm that syncs with my > dropbox account. I would love to be able to then mount defined > subdirectories of the synced path to other vms (losetop/qvm-block- > style, which only works for files). > Is this possible? Where to find pointers? > I startee building something similar to be able to sync data with Microsoft OneDrive. The solutions consists of three AppVMs: 1) VM stores data (encfs or cryfs encrypted) 2) VM syncs (encrypted data) with the cloud 3) VM decrypts data Data is shared between AppVMs via sshFS and sys-firewall'd to minimize access options. one7two99 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJ3yz2vPWE1KLpry24o7o%3DgDYKKeu6ggBM7AqfDNmip91HLChQ%40mail.gmail.com.
[qubes-users] Mounting directories across VMs (losetup/block device solution for directories)?
Hi, I'm experimenting with creating a sys-dropbox vm that syncs with my dropbox account. I would love to be able to then mount defined subdirectories of the synced path to other vms (losetop/qvm-block- style, which only works for files). Is this possible? Where to find pointers? Sincerely, Joh -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1cae22993ccdcf5a64c974b2d364a6a55de7ea8c.camel%40graumannschaft.org.