-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2017-02-05 14:23, Unman wrote:
> On Sun, Feb 05, 2017 at 04:38:09AM -0800, Andrew David Wong wrote:
>> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
>> 
>> On 2017-02-04 12:59, Unman wrote:
>>> On Sat, Feb 04, 2017 at 07:02:57PM +0100, john.david.r.smith 
>>> wrote:
>>>> On 04/02/17 18:42, Loren Rogers wrote:
>>>>> Hi all,
>>>>> 
>>>>> I'm confused about running disposable VMs - if I open a
>>>>> browser or file viewer, then want to open a terminal for
>>>>> the same VM, how could I do this? (E.g. I want to view an
>>>>> untrusted file, then make some edits.)
>>>> right click the dispvm in the qubes manager. select run
>>>> command. enter xterm or whatever you want to run
>>>> 
>>>> or user (in dom0) qvm-run DISPVM_NAME xterm
>>>>> 
>>>>> Is there a way to configure the default disposable VM in
>>>>> the Qubes menu? I see that disposable VMs can be configured
>>>>> for individual domains, but I can't find where the generic
>>>>> one is.
>>>>> 
>> 
>> Yes, you can customize the default DispVM by following these
>> instructions:
>> 
>> https://www.qubes-os.org/doc/dispvm-customization/
>> 
>>>>> Also, is it possible to specify a different template for 
>>>>> disposable machines? Say I'm running something based on
>>>>> the default fedora-23, and I want to open a document from
>>>>> my work VM, which uses that template. But I want to open it
>>>>> with my fedora-23-custom template as a disposable VM. (E.g.
>>>>> running a video in VLC that has untrustworthy components.)
>>>>> Is this doable?
>>>> 
>>>> currently you can only have one dispvm. if you want, you can
>>>> set the template as default for dispvms
>>>> (qvm-create-default-dvm)
>>>> 
>>>> -john
>>> 
>>> Loren,
>>> 
>>> You can't configure disposable VMs for individual qubes - what
>>> you can do is change the netVM which will apply if you start a 
>>> disposableVM from that qube. The dispVM that will be started
>>> is determined by the default dvm, and this is set by 
>>> qvm-create-default-dvm.
>>> 
>>> As John said, you can only have one default dvm, but it's
>>> trivial to work around this with a small script.
>> 
>> Care to share that script, unman?
>> 
>>> It's possible to do this because qvm-create-default-dvm does
>>> NOT remove the files for old dvms. You can see this if you
>>> generate a new default-dvm, and then look in
>>> /var/lib/qubes/appvms. So if you generate a number of different
>>> dvms based on different templates, it's simple to switch
>>> between them before launching a new dispVM. The launch time
>>> isn't noticeably different from starting up a new dispVM, and
>>> voila - multiple template disposable VMs on the cheap.
>>> 
>> 
>> How do you easily switch between the different DVM templates?
>> 
>>> I do this without any apparent ill effects, but it certainly
>>> isn't part of the canon.
>>> 
>>> unman
>>> 
>> 
> 
> I've attached the script. It's trivial.
> 
> First generate assorted dvms using qvm-create-default-dvm and
> customize them as wou will. (Strictly this isnt necessary but you
> may as well get your dvm just the way you want it.)
> 
> Then just run the script: "./switch_dvm debian-8 xterm" will load a
> dvm based on the debian-8 template and run xterm in a new dispVM
> derived from that dvm. The debian-8-dvm will be the default from
> then on, but you can easily switch to another: "./switch_dvm
> xenial-desktop " If you havent generated a dvm already, then the
> script calls 'qvm-create -default-dvm' for you.
> 
> Because you can set dvms with different netvms, and alternate Qubes
> networking paths, it's possible to trigger dispVMs using different
> torVMs/ VPNs through different NICs, in the same time it takes to
> load a dispVM ordinarily. I have a number of keyboard shortcuts to
> call it with different parameters, to do exactly this.
> 
> It should be obvious that because you are using the saved dvm, you
> wont see any changes you make in the template until you trigger an
> updated saved dvm.
> 
> There's all sorts of stuff wrong with it, but it's a quick hack and
> it works fine (for me). Try it at your own risk.
> 
> unman
> 

Very interesting! Thanks, unman!

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----
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=hK6W
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/176570b4-83ea-a6c8-8ab3-70c55f2a4e35%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to