On Friday, March 24, 2017 at 6:07:51 PM UTC-4, Unman wrote: > On Thu, Mar 23, 2017 at 08:00:57PM -0700, Nemo wrote: > > On Thursday, March 23, 2017 at 10:37:58 PM UTC-4, Andrew David Wong wrote: > > > -----BEGIN PGP SIGNED MESSAGE----- > > > Hash: SHA512 > > > > > > On 2017-03-23 19:28, Nemo wrote: > > > > I've been writing a bash script that manages firewall settings > > > > from dom0, via qvm-firewall and qvm-run for ping. > > > > > > > > Everything had been safe until an hour ago, when I added in the > > > > qvm-run/ping function. I let it run for about 20 mins, and when I > > > > came back three of my qubes were damaged in a way that made them > > > > unmountable. > > > > > > > > I don't have the terminal readout (I was running bash -x), so I > > > > can't use that to determine where/when the issue occurred. How > > > > else can I access logs to troubleshoot my script, and determine > > > > whether I need to post a bug report? > > > > > > > > I'm new to Linux, but a quick learner. > > > > > > > > > > Can you post the script you were running? > > > > > > - -- > > > Andrew David Wong (Axon) > > > Community Manager, Qubes OS > > > https://www.qubes-os.org > > > > Script is attached. It's my first attempt at a bash script, and still in > > progress (and obviously potentially dangerous). > > > > The script is designed to create exclusive access to certain services (eg > > Facebook) for VMs where they should be used (eg Personal). It does this by > > preventing inappropriate VMs from accessing those addresses. > > > > So, all the addresses listed under Banking will be blocked for the other > > VMs laid out in the $vms array, unless that VM is also allowed access. > > > > Services that run round-robin DNS, eg google.com, need to be blocked > > multiple times to ensure there is no access to the service. I tested > > > > `qvm-firewall banking -a google.com any` > > > > and determined that running it multiple times in succession will eventually > > block all the (current) round-robin IP addresses. > > > > So, I added a verification feature to the script, which launches a while > > loop. It waits for > > > > `qvm-run -ap banking 'ping -c1 google.com'` > > > > to return "Destination Host Prohibited", indicating that the entire > > round-robin has been blocked. Until then (or until 10 iterations) it will > > continue to qvm-firewall block google.com. > > > > I believe that the verification function is what caused the problem, but I > > don't know how investigate it. Your thoughts are appreciated! > > > > Can you check the size of the firewall rule files for the qubes that > won't start - I assume that that is what you mean by unmountable? > The files are /var/lib/qubes/appvms/<name>/firewall.xml > > 'ls -lh' will show the size > You can use 'ls -lh /var/lib/qubes/appvms/*/firewall.xml' to check them > all.
By unmountable I mean that they can't start - sorry, that wasn't clear. When I attempt to start them, I get Error starting VM 'shopping': (2, 'no such file or directory') I've restored two of the VMs from backups, but left 'shopping' to troubleshoot. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9ed25ae2-f821-45ff-8d1a-c48ccf2a28ed%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.