• liliumstar@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    15
    ·
    1 year ago

    I would use the native version. For something like this, it makes sense that it should have less restricted/sandboxed access to the underlying system.

  • user_naa@lemmy.world
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    1 year ago

    If you install virt-manager on Debian via apt it will have full system acres and also automatically install and configure libvirt, so this method is preferred.

  • BananaTrifleViolin@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Depends on what distro you’re on? You say the deb version is 4.0 and flatpak is 5.0, suggesting you may be on a long release distro?

    I’d favour the Deb version as it’s official for your distro. The flatpak version is unverified; it’s extremely unlikely Virt-Manager is compromised or will cause any issues but virtual machines do have security risks.

    Also problem solving issues with the flatpak version may be more difficult as you have a whole layer potential issues in the sandbox on top of all the other issues people can have around KVM/QEMU. But you could install it, if it works great, if not, revert to the Deb version.

  • boredsquirrel (he)@slrpnk.net
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    I recommend using a QEMU guest session with libvirt. This works in both versions.

    The standard session requires root, and for some reason this means that VMs couls harm your system more or something

    Guest sessions are usable within Flatpaks, GNOME boxes has a Flatpak too. Is the virt-manager flatpak from Flathub? Fedora had one before.

    Pretty cool, on debian you may want to use that to get newer versions. Even though virt-manager is pretty slow in updates

    • thingsiplay@beehaw.org
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      The standard session requires root, and for some reason this means that VMs couls harm your system more or something

      VMs don’t have access to the host, so even if the virtual machine emulator Qemu and libvirt require root access, the encapsulated guest virtual machine have no access to the host. They can’t harm your system.

      • boredsquirrel (he)@slrpnk.net
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        Yup VMs dont get access to the system. Unless there is a vulnerability.

        For doing malware testing etc, qemu user sessions might be preferred.

        You can just use RPM/DEB virt-manager and switch to the QEMU user session anyways. If you dont need some advanced stuff like GPU passthrough (I guess) (USB works) you can use that full time. I do.