On 2017-12-28 01:07, Unman wrote:
> On Thu, Dec 21, 2017 at 10:57:26PM -0800, pr0xy wrote:
>> On 2017-12-19 15:33, Unman wrote:
>> > On Tue, Dec 19, 2017 at 03:09:05PM +0100, 'Tom Zander' via qubes-users 
>> > wrote:
>> >> On Monday, 18 December 2017 10:13:48 CET pr0xy wrote:
>> >> > I am still a bit stuck concerning the Qubes Update Proxy. Where would I
>> >> > set the environment variables for my corporate proxy so that I could
>> >> > update dom0, templates and VMs?
>> >>
>> >> You should add sys-net to your template VM if you want that since the 
>> >> proxy
>> >> that is in place today is to avoid your template VM from accessing the
>> >> intranet or internet outside of your own machine.
>> >>
>> >> Then google on where the template operating system (Fedora or Debian etc)
>> >> sets proxies for doing the command-line update, the configuration is the 
>> >> same
>> >> as Fedora or Debian etc.
>> >> I don’t know fedora at all,
>> >> in archlinux you’ll have a file in /etc/pacman/ which sets the current 
>> >> proxy,
>> >> in debian you’ll likely have one in /etc/apt/
>> >>
>> >> grep -R -i  PROXY /etc/*
>> >>
>> >> may be useful too.
>> >
>> > Tom
>> >
>> > Ive suggested before that if you give this advice you should
>> > clearly state the consequences.
>> >
>> > op - please dont do this. sys-net will not enforce a firewall and it is
>> > bad practice to expose your templates in this way.
>> >
>> > i understand you chose  not to use the iptables route.
>> > If you want to combine the Qubes proxy with an external proxy on
>> > your network you should be able to do this by editing the tinyproxy.conf
>> > file. You will find this in /etc/tinyproxy.
>> >
>> > Qubes uses tinyproxy for all the template updates. you can make
>> > tinyproxy use an external proxy.
>> > The change you need to make is:
>> > upstream  host:port
>> >
>> > check the documentation at
>> > https://tinyproxy.github.io
>> >
>> > unman
>>
>> I did try the iptables method you suggested, but like Marek said, the
>> applications weren't aware of the proxy and didn't use it. I would just
>> get failed connections without setting the proxy in each piece of
>> software in each AppVM. The environment variable setting seemed to work
>> better in the AppVMs.
>>
>> I tested setting the upstream  host:port in the tinyproxy.conf of
>> sys-firewall. That didn't seem to work as I couldn't get Template
>> updates to connect to look for updates. I also tested setting this same
>> method on sys-net, but with the same results.
>>
>> I also asked around on IRC about this, and was told that the Qubes
>> Update Proxy could be adjusted from here:
>>
>> /etc/systemd/system/multi-user.target.wants/qubes-updates-proxy.service
>>
>> Wasn't sure how I could manipulate the proxy from there, but it does
>> point to tinyproxy at /etc/tinyproxy/tinyproxy-updates.conf
>> I tried adding the upstream  host:port to that file on sys-firewall, but
>> the template updates still give me an "Error: Failed to synchronize
>> cache for repo 'updates'" The result was the same attempting the same
>> setting on sys-net.
>>
>>
> 
> Its very difficult to troubleshoot this without knowing more about what
> is happening at the proxy , and in the Qubes networking.
> 
> Those iptables rules work with squid as a transparent proxy without any
> client configuration. But they dont work for you. Please make sure that
> you therefore remove any trace of them from your system.
> 
> As setting the proxy in tinyproxy didn't work for you either make sure
> you  remove those entries too.
> 
> I  suspect the best thing to try is to to edit the qubes proxy config
> file in the template. In a Debian template its in /etc/apt/apt.conf.d and
> in Fedora /etc/yum.conf.d or /etc/dnf/dnf.conf
> (Sorry to be vague but i dont have a Qubes box to hand.)
> 
> 
> Edit the file so that it points to your corporate proxy instead of the
> 10.137.255.254 host.
> Then make sure that you add the corporate proxy IP and port to allowed
> in the template firewall.
> You should be able to use just the HTTPS proxy port for both HTTP and
> https traffic from the template.
> 
> good luck
> 
> unman

Thanks for following up on this Unman. I really appreciate it.

SUCCESS!

Changing the /etc/apt/apt.conf.d in Debian and the /etc/dnf/dnf.conf in
Fedora, AND allowing the proxy IP on the firewall of EACH TemplateVM
finally allows me to update them via the sys-firewall. That's a huge
speed improvement over sys-whonix.

Now I'm wondering if my failure to set firewall rules was the reason I
couldn't use your earlier IPtables examples. I might revisit that, but
for now this solution allows me to use Qubes somewhat normally behind
this corporate proxy.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/115a577f709e5f0f28ae62cbe144512a%40riseup.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to