Re: [qubes-users] Grsecurity+Debian 10 has issues when PCI devices are being attached
> I've been trying to get a Debian 10 sys-net running with grsecurity as a > kernel. However, i've been running into some trouble when the PCI devices > are being attached to it. libxenlight is giving me errors and the PVH VM > will never even attempt to boot. Just to check, are you trying to boot a PVH VM with PCI devices? That's only supported on HVM (and PV). Try changing 'virt_mode' to 'hvm' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b5587fb8-9aed-f5cc-7320-d32fe9cd8a2c%40undef.tools.
Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?
> xvdj 202:144 1 931.5G 0 disk > ├─xvdj1 202:145 1 1G 0 part > └─xvdj2 202:146 1 930.5G 0 part > └─Templates 253:0 0 930.5G 0 crypt > > When i ls ~/Templates it shows nothing. You have successfully decrypted the partition, but not mounted to "~/Templates". > I guess part of my problem is that LVMs make no sense to me, or more > accurately confuse me so the accessing LVM logical volumes is where my > understanding decreases precipitously - I thought I was using an AppVM > but LVM does not seem to be automatically discoering my LVM config? The commands you are looking for are `lvscan` and `vgscan`, which should populate the LVM disks in your `lsblk` output above. For the private volumes, you should be able to then directly mount them with `mount /dev/qubes_dom0/vm--private /`. So if you want to mount a VM called "vault" to "~/Templates" it would be `sudo mount /dev/qubes_dom0/vm-vault-private ~/Templates`. At this point, your files from just the VM "vault" are available in "~/Templates". -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/26a3cb8e-aed1-832c-4339-873c21a11bd4%40undef.tools.
Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?
On 2020-10-08 02:24, Jarrah wrote: Ok so on the mount from other os page its not totally clear for me. I do have a barebones qubes system on another computer (laptop), so would/should I take my ssd from my desktop connect it (have an adapter cable) to my laptop then "pass" the whole disk to an isolated appvm? Yes, this is the idea. Using `qvm-block a ` or the equivalent GUI widget. Ok, so I *think* I have mounted and decrypted my 1tb desktop ssd on my laptop... i say "think" because I dont see anything in the Templates dir where i thought I mounted it? This is what lsblk gives me in the appvm where I ran "sudo cryptsetup luksOpen /dev/xvdj2 Templates" xvdj 202:144 1 931.5G 0 disk ├─xvdj1 202:145 1 1G 0 part └─xvdj2 202:146 1 930.5G 0 part └─Templates 253:00 930.5G 0 crypt When i ls ~/Templates it shows nothing. I guess part of my problem is that LVMs make no sense to me, or more accurately confuse me so the accessing LVM logical volumes is where my understanding decreases precipitously - I thought I was using an AppVM but LVM does not seem to be automatically discoering my LVM config? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/318e0243cd356e2bc3dfe5489ee610d7%40posteo.net.
Re: [qubes-users] Re: Updated Split GPG documentation for Thunderbird 78
Andrew David Wong: On 10/7/20 3:56 AM, Andrew David Wong wrote: On 10/7/20 3:47 AM, Andrew David Wong wrote: On 10/7/20 3:46 AM, Andrew David Wong wrote: Hi all, Many of us have recently upgraded to Thunderbird 78, which changes the way OpenPGP keys are handled. Thanks to Frédéric, the Split GPG documentation was updated a little over a week ago with detailed new instructions, including a full screenshot walk-through, for how to use Split GPG with Thunderbird 78 and higher. If you haven't already seen it, take a look: https://www.qubes-os.org/doc/split-gpg/#using-thunderbird By the way, if anyone figures out how to automatically sign all emails, please let me know. :) Answering my own question: Account Settings -> End-To-End Encryption -> Default settings for sending messages -> [x] Add my digital signature by default There's also an option here to require encryption by default. However, I don't see an option to use inline signatures for compatibility with our mailing lists. Found this: https://wiki.mozilla.org/Thunderbird:OpenPGP:Status > -- unknown schedule -- > [...] > sending an INLINE cleartext signed message without attachments (we don't intend to support sending other kinds of inline OpenPGP messages) Also there is no possibility to select what type of encryption I would like to use OpenPGP or S/MIME. In the Account Settings End To End Encryption, at the bottom there is Preferrend Encryption Technology with options for both OpenPGP and S/MIME, but the selection is disabled. It is disabled as well in the Security button -> Encryption Technology. The Open PGP is selected and S/MIME is impossible to select. Does the OpenPGP encrypt attachments and Subject like S/MIME? Also btw it is not possible to use more than one PGP key in one account. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0dfe53da-7ec4-fa3a-e1b0-6c529bc3b701%40mailbox.org.
[qubes-users] Known issue: Qubes extension not yet working with Thunderbird 78
Dear Qubes Community, Many of you are upgrading to Thunderbird 78. The Qubes Thunderbird extension, which allows you to easily open attachments in DisposableVMs, has not yet been updated to work with this new Thunderbird release. You can find the details in this bug report: https://github.com/QubesOS/qubes-issues/issues/5861 However, while you wait for the extension to be updated, it is important to understand that this extension is purely for convenience. It is not required to do anything. You can do everything that the extension does manually. For example, to view an email attachment in a DisposableVM: 1. Save the attachment in your email VM. 2. Open the file manager in your email VM (e.g., nautilus). 3. Right-click on the attachment and select "View in DisposableVM." The extension makes this more convenient by automating the process, but it doesn't do anything that you can't do yourself. Nonetheless, we are working on upgrading the extension as soon as reasonably possible. Further discussion can be found on this forum thread: https://qubes-os.discourse.group/t/thunderbird-qubes-attachments/865/ -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b4e014bd-3cdc-a3a8-df61-bb87dea401c7%40qubes-os.org. OpenPGP_signature Description: OpenPGP digital signature