Re: [qubes-users] Any way to attach a USB drive to a VM by label?

2018-05-19 Thread Qubes Guy
On Saturday, May 19, 2018 at 4:23:09 AM UTC-4, David Hobach wrote:
> On 05/19/2018 01:04 AM, Qubes Guy wrote:
> > On Friday, May 18, 2018 at 5:59:09 PM UTC-4, David Hobach wrote:
> >> On 05/18/2018 08:19 PM, Marek Marczykowski-Górecki wrote:
> >>> -BEGIN PGP SIGNED MESSAGE-
> >>> Hash: SHA256
> >>>
> >>> On Thu, May 17, 2018 at 05:57:09PM -0700, Qubes Guy wrote:
> >>>> I've successfully used qvm-block (in Dom0) to attach USB drives to 
> >>>> different VMs (persistently), but I've noticed that Qubes (or Linux) 
> >>>> sometimes gives them to different devices over time. In other words, on 
> >>>> Monday, my BIG_TOSHIBA drive will be on /dev/sda, but it'll be assigned 
> >>>> to /dev/sdj when I boot up on Wednesday. This is throwing off my 
> >>>> VeraCrypt / FreeFileSync backup routine. (Another way of saying this is 
> >>>> if I say "qvm-block attach MyVM sys-usb:sda --persistent" when one of 
> >>>> the three drives I use for MyVM is currently attached to that, this will 
> >>>> fail if Qubes moves that drive to a different device-name (during boot) 
> >>>> that isn't one of the three I previously attached (when I go to start up 
> >>>> that VM).
> >>>>
> >>>> I thought about persistently attaching all 10 of my USB drives to the VM 
> >>>> (some HDs, some flash, one SSD - I never use all of them at once - don't 
> >>>> ask!) because that would certainly fix this problem, but I get the 
> >>>> following error when I try to start the VM: "ERROR: Start failed: XML 
> >>>> error: target 'xvdi' duplicated for disk sources '/dev/sdc' and 
> >>>> '/dev/sde', see /var/log/libvirt/libxl/libxl-driver.log for details".
> >>>>
> >>>> Note that I did all the persistent attachment commands while the VM was 
> >>>> not running. If I detach all those, start the VM, do the persistent 
> >>>> attachments, shut down the VM and then restart it, I get an error along 
> >>>> the lines of "qrexec process failed to respond in 60 seconds".
> >>>>
> >>>> So, I guess I'm asking if there's a way to just persistently attach 2 or 
> >>>> 3 external USB drives and have them consistently available on the same 
> >>>> device names when I start the VM so VeraCrypt doesn't balk?  (VeraCrypt 
> >>>> ultimately doesn't care what device a drive is attached to (it could be 
> >>>> sda - sdj on my system) because it shows the attached drive as 
> >>>> "/media/user/BIG_TOSHIBA, but if a drive isn't where it's supposed to 
> >>>> be, that'll fail.
> >>>>
> >>>> In case you're curious, the error messages in 
> >>>> /var/log/libvirt/libxl/libxl-driver.log are meaningless to me, but if 
> >>>> you want me to post it, I can.
> >>>>
> >>>> Any help you guys can give me would be greatly appreciated! Thanks...
> >>>
> >>> It isn't available yet, related issue:
> >>> https://github.com/QubesOS/qubes-issues/issues/3437
> >>
> >> As a workaround you could mount the device via uuid or file system label
> >> in sys-usb, create a loop device from the container you want to pass to
> >> another VM and use qvm-block on that loop device (for which you can
> >> define the name yourself).
> >>
> >> Of course that's only convenient if you script it...
> > 
> > Thanks, but how do you do create a loop device? I'm (mostly) a Linux newbie 
> > (and, as of 5 weeks ago, I was a Qubes newbie) - I'm your worst nightmare 
> > :)  I tried the UUID mount thing described in the article I mentioned 
> > above, but it just prevents sys-net from starting, but maybe with this loop 
> > thing you mention? Can you give me the actual commands required, or direct 
> > me to an article showing this? I'm not even sure what to search for. Thanks 
> > much!
> 
> Honestly you'll probably be off better by waiting for the feature to be 
> implemented then.
> 
> Anyway for reference I was talking about something like
> 
> in your sys-usb:
> 1. mount -U [uuid] [mount point]
> 2. losetup -f --show [your veracrypt file on the mounted file system]
> 
> in dom0:
> 3. qvm-block a [target VM] "sys-usb:[output of 2]"
> 4. Open the veracrypt block device now attached to [target VM]. (luks 
> supports that, not sure about veracrypt)
> 
> You 

Re: [qubes-users] Any way to attach a USB drive to a VM by label?

2018-05-18 Thread Qubes Guy
On Friday, May 18, 2018 at 5:59:09 PM UTC-4, David Hobach wrote:
> On 05/18/2018 08:19 PM, Marek Marczykowski-Górecki wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> > 
> > On Thu, May 17, 2018 at 05:57:09PM -0700, Qubes Guy wrote:
> >> I've successfully used qvm-block (in Dom0) to attach USB drives to 
> >> different VMs (persistently), but I've noticed that Qubes (or Linux) 
> >> sometimes gives them to different devices over time. In other words, on 
> >> Monday, my BIG_TOSHIBA drive will be on /dev/sda, but it'll be assigned to 
> >> /dev/sdj when I boot up on Wednesday. This is throwing off my VeraCrypt / 
> >> FreeFileSync backup routine. (Another way of saying this is if I say 
> >> "qvm-block attach MyVM sys-usb:sda --persistent" when one of the three 
> >> drives I use for MyVM is currently attached to that, this will fail if 
> >> Qubes moves that drive to a different device-name (during boot) that isn't 
> >> one of the three I previously attached (when I go to start up that VM).
> >>
> >> I thought about persistently attaching all 10 of my USB drives to the VM 
> >> (some HDs, some flash, one SSD - I never use all of them at once - don't 
> >> ask!) because that would certainly fix this problem, but I get the 
> >> following error when I try to start the VM: "ERROR: Start failed: XML 
> >> error: target 'xvdi' duplicated for disk sources '/dev/sdc' and 
> >> '/dev/sde', see /var/log/libvirt/libxl/libxl-driver.log for details".
> >>
> >> Note that I did all the persistent attachment commands while the VM was 
> >> not running. If I detach all those, start the VM, do the persistent 
> >> attachments, shut down the VM and then restart it, I get an error along 
> >> the lines of "qrexec process failed to respond in 60 seconds".
> >>
> >> So, I guess I'm asking if there's a way to just persistently attach 2 or 3 
> >> external USB drives and have them consistently available on the same 
> >> device names when I start the VM so VeraCrypt doesn't balk?  (VeraCrypt 
> >> ultimately doesn't care what device a drive is attached to (it could be 
> >> sda - sdj on my system) because it shows the attached drive as 
> >> "/media/user/BIG_TOSHIBA, but if a drive isn't where it's supposed to be, 
> >> that'll fail.
> >>
> >> In case you're curious, the error messages in 
> >> /var/log/libvirt/libxl/libxl-driver.log are meaningless to me, but if you 
> >> want me to post it, I can.
> >>
> >> Any help you guys can give me would be greatly appreciated! Thanks...
> > 
> > It isn't available yet, related issue:
> > https://github.com/QubesOS/qubes-issues/issues/3437
> 
> As a workaround you could mount the device via uuid or file system label 
> in sys-usb, create a loop device from the container you want to pass to 
> another VM and use qvm-block on that loop device (for which you can 
> define the name yourself).
> 
> Of course that's only convenient if you script it...

Thanks, but how do you do create a loop device? I'm (mostly) a Linux newbie 
(and, as of 5 weeks ago, I was a Qubes newbie) - I'm your worst nightmare :)  I 
tried the UUID mount thing described in the article I mentioned above, but it 
just prevents sys-net from starting, but maybe with this loop thing you 
mention? Can you give me the actual commands required, or direct me to an 
article showing this? I'm not even sure what to search for. Thanks much!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6c66eee4-1ce8-4fbe-89b1-c758ccbc3ac2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Any way to attach a USB drive to a VM by label?

2018-05-18 Thread Qubes Guy
On Friday, May 18, 2018 at 2:19:09 PM UTC-4, Marek Marczykowski-Górecki wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Thu, May 17, 2018 at 05:57:09PM -0700, Qubes Guy wrote:
> > I've successfully used qvm-block (in Dom0) to attach USB drives to 
> > different VMs (persistently), but I've noticed that Qubes (or Linux) 
> > sometimes gives them to different devices over time. In other words, on 
> > Monday, my BIG_TOSHIBA drive will be on /dev/sda, but it'll be assigned to 
> > /dev/sdj when I boot up on Wednesday. This is throwing off my VeraCrypt / 
> > FreeFileSync backup routine. (Another way of saying this is if I say 
> > "qvm-block attach MyVM sys-usb:sda --persistent" when one of the three 
> > drives I use for MyVM is currently attached to that, this will fail if 
> > Qubes moves that drive to a different device-name (during boot) that isn't 
> > one of the three I previously attached (when I go to start up that VM).
> > 
> > I thought about persistently attaching all 10 of my USB drives to the VM 
> > (some HDs, some flash, one SSD - I never use all of them at once - don't 
> > ask!) because that would certainly fix this problem, but I get the 
> > following error when I try to start the VM: "ERROR: Start failed: XML 
> > error: target 'xvdi' duplicated for disk sources '/dev/sdc' and '/dev/sde', 
> > see /var/log/libvirt/libxl/libxl-driver.log for details".
> > 
> > Note that I did all the persistent attachment commands while the VM was not 
> > running. If I detach all those, start the VM, do the persistent 
> > attachments, shut down the VM and then restart it, I get an error along the 
> > lines of "qrexec process failed to respond in 60 seconds".
> > 
> > So, I guess I'm asking if there's a way to just persistently attach 2 or 3 
> > external USB drives and have them consistently available on the same device 
> > names when I start the VM so VeraCrypt doesn't balk?  (VeraCrypt ultimately 
> > doesn't care what device a drive is attached to (it could be sda - sdj on 
> > my system) because it shows the attached drive as "/media/user/BIG_TOSHIBA, 
> > but if a drive isn't where it's supposed to be, that'll fail.
> > 
> > In case you're curious, the error messages in 
> > /var/log/libvirt/libxl/libxl-driver.log are meaningless to me, but if you 
> > want me to post it, I can.
> > 
> > Any help you guys can give me would be greatly appreciated! Thanks...
> 
> It isn't available yet, related issue:
> https://github.com/QubesOS/qubes-issues/issues/3437
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> 
> iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlr/GRUACgkQ24/THMrX
> 1yzuqAf7Bw2L6SpZhPlLrhX20eFvagLuPpKbuMl/yVLMDhRBZqK86kIonC3Zvm1b
> eR6cTQ540PNHJiqL0uescJIHS7sHJDnnqC7Y0x12GIlEKWU+1pobRDZIwfErMiD/
> 2FzJisSgk8tiLIwmyhcrWyUyVxuk6e1TpG5sVdUMb3lTqjiqPPChZBRlLFsYmraK
> PvBvY9DCeL6unSIUJqadxBtfeh5KDmSXauLS7T/vxVfEWbsNxI+ZrgGWPALkniZK
> MaXGp6hYrmnycl6o8xi74CWoGvwruhUrFOVxAn8hrFR0OA5PmeWVQjtRJ4j0okmL
> qXHoFWHbMVltipYLNvBYZANXcIc3bw==
> =BsRg
> -END PGP SIGNATURE-

Oops, forgot the link: https://gist.github.com/etes/aa76a6e9c80579872e5f

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9f3aba53-b1ee-473a-aa3c-a9cec5fd91df%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Any way to attach a USB drive to a VM by label?

2018-05-18 Thread Qubes Guy
On Friday, May 18, 2018 at 2:19:09 PM UTC-4, Marek Marczykowski-Górecki wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Thu, May 17, 2018 at 05:57:09PM -0700, Qubes Guy wrote:
> > I've successfully used qvm-block (in Dom0) to attach USB drives to 
> > different VMs (persistently), but I've noticed that Qubes (or Linux) 
> > sometimes gives them to different devices over time. In other words, on 
> > Monday, my BIG_TOSHIBA drive will be on /dev/sda, but it'll be assigned to 
> > /dev/sdj when I boot up on Wednesday. This is throwing off my VeraCrypt / 
> > FreeFileSync backup routine. (Another way of saying this is if I say 
> > "qvm-block attach MyVM sys-usb:sda --persistent" when one of the three 
> > drives I use for MyVM is currently attached to that, this will fail if 
> > Qubes moves that drive to a different device-name (during boot) that isn't 
> > one of the three I previously attached (when I go to start up that VM).
> > 
> > I thought about persistently attaching all 10 of my USB drives to the VM 
> > (some HDs, some flash, one SSD - I never use all of them at once - don't 
> > ask!) because that would certainly fix this problem, but I get the 
> > following error when I try to start the VM: "ERROR: Start failed: XML 
> > error: target 'xvdi' duplicated for disk sources '/dev/sdc' and '/dev/sde', 
> > see /var/log/libvirt/libxl/libxl-driver.log for details".
> > 
> > Note that I did all the persistent attachment commands while the VM was not 
> > running. If I detach all those, start the VM, do the persistent 
> > attachments, shut down the VM and then restart it, I get an error along the 
> > lines of "qrexec process failed to respond in 60 seconds".
> > 
> > So, I guess I'm asking if there's a way to just persistently attach 2 or 3 
> > external USB drives and have them consistently available on the same device 
> > names when I start the VM so VeraCrypt doesn't balk?  (VeraCrypt ultimately 
> > doesn't care what device a drive is attached to (it could be sda - sdj on 
> > my system) because it shows the attached drive as "/media/user/BIG_TOSHIBA, 
> > but if a drive isn't where it's supposed to be, that'll fail.
> > 
> > In case you're curious, the error messages in 
> > /var/log/libvirt/libxl/libxl-driver.log are meaningless to me, but if you 
> > want me to post it, I can.
> > 
> > Any help you guys can give me would be greatly appreciated! Thanks...
> 
> It isn't available yet, related issue:
> https://github.com/QubesOS/qubes-issues/issues/3437
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> 
> iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlr/GRUACgkQ24/THMrX
> 1yzuqAf7Bw2L6SpZhPlLrhX20eFvagLuPpKbuMl/yVLMDhRBZqK86kIonC3Zvm1b
> eR6cTQ540PNHJiqL0uescJIHS7sHJDnnqC7Y0x12GIlEKWU+1pobRDZIwfErMiD/
> 2FzJisSgk8tiLIwmyhcrWyUyVxuk6e1TpG5sVdUMb3lTqjiqPPChZBRlLFsYmraK
> PvBvY9DCeL6unSIUJqadxBtfeh5KDmSXauLS7T/vxVfEWbsNxI+ZrgGWPALkniZK
> MaXGp6hYrmnycl6o8xi74CWoGvwruhUrFOVxAn8hrFR0OA5PmeWVQjtRJ4j0okmL
> qXHoFWHbMVltipYLNvBYZANXcIc3bw==
> =BsRg
> -END PGP SIGNATURE-

So, the fix for this is coming? (Sorry, I can't speak the "Github" language too 
well yet.)  I'm trying the method below, but running into the same kind of 
problems (so far) - qrexec non-responsiveness, sys-net no longer starting, etc

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b86911a1-0f43-4da3-a850-c16dc0566509%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Any way to attach a USB drive to a VM by label?

2018-05-18 Thread Qubes Guy
On Friday, May 18, 2018 at 3:14:57 AM UTC-4, awokd wrote:
> On Fri, May 18, 2018 1:00 am, Qubes Guy wrote:
> > On Thursday, May 17, 2018 at 8:57:09 PM UTC-4, Qubes Guy wrote:
> 
> >> So, I guess I'm asking if there's a way to just persistently attach 2 or
> >> 3 external USB drives and have them consistently available on the same
> >> device names when I start the VM so VeraCrypt doesn't balk?  (VeraCrypt
> >> ultimately doesn't care what device a drive is attached to (it could be
> >> sda - sdj on my system) because it shows the attached drive as
> >> "/media/user/BIG_TOSHIBA, but if a drive isn't where it's supposed to
> >> be, that'll fail.
> 
> > By the way, I'm running version 4.0 of Qubes on a fairly recent laptop
> > with 8GB of RAM...
> 
> Can you make sys-usb's /etc/fstab persistent, then specify /dev names
> there by drive UUID?

I'm not sure what you mean by either of those things. Are you saying I should 
put entries in the fstab file in sys-usb to permanently mount those drives? If 
so, what would the commands look like?  (As a side note, I tried to 
persistently mount a NAS share using the fstab file in my Debian template (and 
various other things) and couldn't get that to work, but I do know about the 
fstab file. I'm gonna try to use NFS instead...)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/74405d5e-a364-4c6d-8c56-b122662e2fe5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Any way to attach a USB drive to a VM by label?

2018-05-17 Thread Qubes Guy
On Thursday, May 17, 2018 at 8:57:09 PM UTC-4, Qubes Guy wrote:
> I've successfully used qvm-block (in Dom0) to attach USB drives to different 
> VMs (persistently), but I've noticed that Qubes (or Linux) sometimes gives 
> them to different devices over time. In other words, on Monday, my 
> BIG_TOSHIBA drive will be on /dev/sda, but it'll be assigned to /dev/sdj when 
> I boot up on Wednesday. This is throwing off my VeraCrypt / FreeFileSync 
> backup routine. (Another way of saying this is if I say "qvm-block attach 
> MyVM sys-usb:sda --persistent" when one of the three drives I use for MyVM is 
> currently attached to that, this will fail if Qubes moves that drive to a 
> different device-name (during boot) that isn't one of the three I previously 
> attached (when I go to start up that VM).
> 
> I thought about persistently attaching all 10 of my USB drives to the VM 
> (some HDs, some flash, one SSD - I never use all of them at once - don't 
> ask!) because that would certainly fix this problem, but I get the following 
> error when I try to start the VM: "ERROR: Start failed: XML error: target 
> 'xvdi' duplicated for disk sources '/dev/sdc' and '/dev/sde', see 
> /var/log/libvirt/libxl/libxl-driver.log for details".
> 
> Note that I did all the persistent attachment commands while the VM was not 
> running. If I detach all those, start the VM, do the persistent attachments, 
> shut down the VM and then restart it, I get an error along the lines of 
> "qrexec process failed to respond in 60 seconds".
> 
> So, I guess I'm asking if there's a way to just persistently attach 2 or 3 
> external USB drives and have them consistently available on the same device 
> names when I start the VM so VeraCrypt doesn't balk?  (VeraCrypt ultimately 
> doesn't care what device a drive is attached to (it could be sda - sdj on my 
> system) because it shows the attached drive as "/media/user/BIG_TOSHIBA, but 
> if a drive isn't where it's supposed to be, that'll fail.
> 
> In case you're curious, the error messages in 
> /var/log/libvirt/libxl/libxl-driver.log are meaningless to me, but if you 
> want me to post it, I can.
> 
> Any help you guys can give me would be greatly appreciated! Thanks...

By the way, I'm running version 4.0 of Qubes on a fairly recent laptop with 8GB 
of RAM...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/592ec7f7-d1c5-4bf6-871a-3863fec8ff0b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Any way to attach a USB drive to a VM by label?

2018-05-17 Thread Qubes Guy
I've successfully used qvm-block (in Dom0) to attach USB drives to different 
VMs (persistently), but I've noticed that Qubes (or Linux) sometimes gives them 
to different devices over time. In other words, on Monday, my BIG_TOSHIBA drive 
will be on /dev/sda, but it'll be assigned to /dev/sdj when I boot up on 
Wednesday. This is throwing off my VeraCrypt / FreeFileSync backup routine. 
(Another way of saying this is if I say "qvm-block attach MyVM sys-usb:sda 
--persistent" when one of the three drives I use for MyVM is currently attached 
to that, this will fail if Qubes moves that drive to a different device-name 
(during boot) that isn't one of the three I previously attached (when I go to 
start up that VM).

I thought about persistently attaching all 10 of my USB drives to the VM (some 
HDs, some flash, one SSD - I never use all of them at once - don't ask!) 
because that would certainly fix this problem, but I get the following error 
when I try to start the VM: "ERROR: Start failed: XML error: target 'xvdi' 
duplicated for disk sources '/dev/sdc' and '/dev/sde', see 
/var/log/libvirt/libxl/libxl-driver.log for details".

Note that I did all the persistent attachment commands while the VM was not 
running. If I detach all those, start the VM, do the persistent attachments, 
shut down the VM and then restart it, I get an error along the lines of "qrexec 
process failed to respond in 60 seconds".

So, I guess I'm asking if there's a way to just persistently attach 2 or 3 
external USB drives and have them consistently available on the same device 
names when I start the VM so VeraCrypt doesn't balk?  (VeraCrypt ultimately 
doesn't care what device a drive is attached to (it could be sda - sdj on my 
system) because it shows the attached drive as "/media/user/BIG_TOSHIBA, but if 
a drive isn't where it's supposed to be, that'll fail.

In case you're curious, the error messages in 
/var/log/libvirt/libxl/libxl-driver.log are meaningless to me, but if you want 
me to post it, I can.

Any help you guys can give me would be greatly appreciated! Thanks...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f0434929-c5e2-446e-8835-045f7203906b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Any way to attach a USB drive to a PVH by label?

2018-05-17 Thread Qubes Guy
I've successfully used qvm-block (in Dom0) to attach USB drives to different 
VMs (even persistently), but I've noticed that Qubes (or Linux?) sometimes 
gives them to different devices over time. In other words, on Monday, my 
BIG_TOSHIBA drive will be on /dev/sda, but it'll be assigned to /dev/sdj when I 
boot up on Wednesday. This is throwing off my VeraCrypt / FreeFileSync backup 
routine. Is there a way to make this stick?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f09ce2f0-cce3-4099-ad10-09a57bd046eb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-15 Thread Qubes Guy
On Tuesday, May 15, 2018 at 12:11:50 AM UTC-4, john wrote:
> On 05/12/18 19:46, Qubes Guy wrote:
> > On Saturday, May 12, 2018 at 4:28:56 AM UTC-4, 
> > niepo...-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:
> >> On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> >>> On Friday, May 11, 2018 at 1:17:24 PM UTC, 
> >>> niepo...-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:
> >>>> Fresh install of Qubes R4.0 and there is no internet connection in appVM 
> >>>> - firefox just not load websites.
> >>>>
> >>>> Internet connection actually is ok as I'm able to make update for 
> >>>> template VM.
> >>>>
> >>>> What can be reason of this not working internet in app VM and how 
> >>>> resolve this?
> >>>
> >>> Is this still a problem?  Did you give your AppVM access to the net VM 
> >>> (set "Networking" to sys-firewall (preferably) or sys-net in the settings 
> >>> dialog for the AppVM)?
> >>
> >> Yes, problem still exist.
> >>
> >> There was sys-firewall connected to appVM as well sys-net and no 
> >> connection.
> >> I have also tried changing template from fedora to debian -internet not 
> >> working.
> >> I have also install chromium browser and connection not working.
> >>
> >> Very frustrating situation...
> > 
> > One thing I forgot to mention: Do NOT set the "Networking" setting in your 
> > template VMs (set it to "None"). Giving network access to your templates is 
> > considered a major security threat (since all AppVMs you base on them 
> > inherit any malware/corruption). If you put "qubes-updates-proxy" in the 
> > services tab of sys-net, you won't need to do this. If you absolutely need 
> > to do this anyway, turn it off as soon as possible...
> > 
> 
> When I look at the qubes settings -> services in  sys-net  I see nothing 
> , would adding qubes-updates-proxy   allow me to install  manually 
> software I want to be AppVM-wide , in the Fedora Template?
> 
> or exactly how is one Supposed to ever add software to a Template if 
> there is no networking  except for updates ?
> 
> Or lets say I add the  qubes-updates-proxy  to sys-net , then in the 
> Template  can I just  sudo dnf installor there more to it ?

I couldn't get any template VMs to update (or be able to install software in 
them) until I put qubes-updates-proxy in sys-net. Apparently, that's how 
template VMs gain network access securely. The documentation implies says that 
this is already enabled by default (meaning I shouldn't have had to add it 
myself), but that wasn't the case, at least for me. The minute I put it in, the 
floodgates opened and I've been able to use Qubes ever since. The only downside 
to this is that this doesn't work for Firefox unless you install it through the 
standard repository. I couldn't get Quantum that way, so I had to manually 
install it in the template. And every time Firefox auto-updates itself, it's in 
the AppVM and the update disappears every time I restart the AppVM. So I'm 
currently enabling network access in the template VM only long enough to allow 
Firefox to update itself. I shouldn't, but I am. I understand that Mozilla is 
now calling Quantum "Firefox ESR" now (Extended Support Release). ESR version 
52 was the only version in the Debian repository at the time, so I didn't want 
it. But if the Debian folks put Quantum in the repository, I'll switch over. If 
you can get Quantum from Fedora's repository (or however), then just ignore all 
that :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9a829f9e-0746-4908-b63a-d484b0c84192%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-14 Thread Qubes Guy
On Monday, May 14, 2018 at 12:55:51 PM UTC-4, niepo...@gmail.com wrote:
> On Sunday, May 13, 2018 at 11:59:16 AM UTC-4, awokd wrote:
> > On Sat, May 12, 2018 7:08 pm,  wrote:
> > > netVM has ok ping to google.com
> > > firewallVM has no pings
> > > appVM has also no pings
> > >
> > > Maybe it's worth to mention: update template VM was done with success
> > > (which is a bit odd as update actually was done with success as firewallVM
> > > has no pings).
> > 
> > Are you using the default templates and AppVMs, or ones you've restored?
> > Try doing a reinstall and testing with the default ones only.
> 
> appVM's are not restored. All is default except I changed to pv mode netVM 
> and firewallVM (in hvm and pvh do not started).
> 
> Looks like i will back to R3.2 as R4.0 is useless for me with no internet in 
> appVM's.

I don't know if this is helpful, but I get Internet via a USB-to-Ethernet 
adapter. I have that (and all of my other USB devices) connected to a single 
internal USB controller connected to the sys-usb VM. sys-usb is an HVM (with 
network-manager in the Services tab). sys-net is connected to sys-usb, and it's 
a PVH (with meminfo-writer, clocksync and qubes-updates-proxy in its Services 
tab). sys-firewall is connected to sys-net, and it's also a PVH (with no 
services in the Services tab). Of course, sys-usb was flagged as providing 
networks services when it was created. Hope that helps...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e6b70863-d701-4480-ba56-9edd5dbe6ce3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread Qubes Guy
On Saturday, May 12, 2018 at 4:28:56 AM UTC-4, niepo...@gmail.com wrote:
> On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> > On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> > > Fresh install of Qubes R4.0 and there is no internet connection in appVM 
> > > - firefox just not load websites.
> > > 
> > > Internet connection actually is ok as I'm able to make update for 
> > > template VM.
> > > 
> > > What can be reason of this not working internet in app VM and how resolve 
> > > this?
> > 
> > Is this still a problem?  Did you give your AppVM access to the net VM (set 
> > "Networking" to sys-firewall (preferably) or sys-net in the settings dialog 
> > for the AppVM)?
> 
> Yes, problem still exist.
> 
> There was sys-firewall connected to appVM as well sys-net and no connection.
> I have also tried changing template from fedora to debian -internet not 
> working.
> I have also install chromium browser and connection not working.
> 
> Very frustrating situation...

One thing I forgot to mention: Do NOT set the "Networking" setting in your 
template VMs (set it to "None"). Giving network access to your templates is 
considered a major security threat (since all AppVMs you base on them inherit 
any malware/corruption). If you put "qubes-updates-proxy" in the services tab 
of sys-net, you won't need to do this. If you absolutely need to do this 
anyway, turn it off as soon as possible...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dfa187be-0914-4f56-b2e0-7e541712e629%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread Qubes Guy
On Saturday, May 12, 2018 at 4:28:56 AM UTC-4, niepo...@gmail.com wrote:
> On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> > On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> > > Fresh install of Qubes R4.0 and there is no internet connection in appVM 
> > > - firefox just not load websites.
> > > 
> > > Internet connection actually is ok as I'm able to make update for 
> > > template VM.
> > > 
> > > What can be reason of this not working internet in app VM and how resolve 
> > > this?
> > 
> > Is this still a problem?  Did you give your AppVM access to the net VM (set 
> > "Networking" to sys-firewall (preferably) or sys-net in the settings dialog 
> > for the AppVM)?
> 
> Yes, problem still exist.
> 
> There was sys-firewall connected to appVM as well sys-net and no connection.
> I have also tried changing template from fedora to debian -internet not 
> working.
> I have also install chromium browser and connection not working.
> 
> Very frustrating situation...

Set the "Networking" setting in your AppVM settings dialog to point to 
sys-firewall, set the "Networking" setting in sys-firewall to point to sys-net, 
and if your network connection is coming via an Ethernet-to-USB adapter, set 
the "Networking" setting in sys-net to point to sys-usb. (A sidenote regarding 
the latter: If you don't already have a separate VM to handle USB services, you 
really should create it, even if you're not using an Ethernet-to-USB adapter. 
Note that only one VM should be responsible for providing network services 
(which would either be sys-net or sys-usb, depending on the card/adapter you're 
using to provide Internet. If you *do* have an Ethernet-to-USB adapter, you'll 
want to set the "Provides network services" checkbox when you go to create the 
sys-usb VM.) You also need to add "qubes-updates-proxy" (without quotes) to the 
list of services in the sys-net settings dialog. After you do all this, you 
should be able to use "sudo apt-get update" in a terminal in your template VM 
to install or update packages (which AppVMs inherit, of course). One thing I've 
discovered is that you often need to restart VMs to get them to recognize 
changes you've made, so if you don't get what you expect, restart the VM in 
question. Let me know what happens...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/855af1af-870b-475c-94c8-af0f01a4f8b0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread Qubes Guy
On Saturday, May 12, 2018 at 4:28:56 AM UTC-4, niepo...@gmail.com wrote:
> On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> > On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> > > Fresh install of Qubes R4.0 and there is no internet connection in appVM 
> > > - firefox just not load websites.
> > > 
> > > Internet connection actually is ok as I'm able to make update for 
> > > template VM.
> > > 
> > > What can be reason of this not working internet in app VM and how resolve 
> > > this?
> > 
> > Is this still a problem?  Did you give your AppVM access to the net VM (set 
> > "Networking" to sys-firewall (preferably) or sys-net in the settings dialog 
> > for the AppVM)?
> 
> Yes, problem still exist.
> 
> There was sys-firewall connected to appVM as well sys-net and no connection.
> I have also tried changing template from fedora to debian -internet not 
> working.
> I have also install chromium browser and connection not working.
> 
> Very frustrating situation...

And, of course, I meant "www.google.com". Try that. If you don't get a 
response, let me know how you're getting your Internet (Wireless or Ethernet) 
and the name and model of the network card/controller

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dea20035-28d1-4aed-9709-9c441d41de6c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread Qubes Guy
On Saturday, May 12, 2018 at 4:28:56 AM UTC-4, niepo...@gmail.com wrote:
> On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> > On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> > > Fresh install of Qubes R4.0 and there is no internet connection in appVM 
> > > - firefox just not load websites.
> > > 
> > > Internet connection actually is ok as I'm able to make update for 
> > > template VM.
> > > 
> > > What can be reason of this not working internet in app VM and how resolve 
> > > this?
> > 
> > Is this still a problem?  Did you give your AppVM access to the net VM (set 
> > "Networking" to sys-firewall (preferably) or sys-net in the settings dialog 
> > for the AppVM)?
> 
> Yes, problem still exist.
> 
> There was sys-firewall connected to appVM as well sys-net and no connection.
> I have also tried changing template from fedora to debian -internet not 
> working.
> I have also install chromium browser and connection not working.
> 
> Very frustrating situation...

Open a terminal in your sys-net VM and type "ping .google.com" (without 
quotes). If you get no response, you need to figure out why you have no network 
connectivity in that VM. (It should say something like "64 bytes from  
time=18.5ms" or something like that.) Let me know if you have network access 
there. I'm hitting the road for a little while. I'll respond as soon as I can...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8294ac3f-7284-4a81-80a9-87091c2fd93a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-11 Thread Qubes Guy
On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> Fresh install of Qubes R4.0 and there is no internet connection in appVM - 
> firefox just not load websites.
> 
> Internet connection actually is ok as I'm able to make update for template VM.
> 
> What can be reason of this not working internet in app VM and how resolve 
> this?

Is this still a problem?  Did you give your AppVM access to the net VM (set 
"Networking" to sys-firewall (preferably) or sys-net in the settings dialog for 
the AppVM)?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3dfa6f5-e8d7-463b-b45b-ff9462c5a41d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.