Hi John,

That's an interesting background and list of wants. I've been using Qubes for some time and can try to address a few of your issues.


On 3/15/19 10:31 PM, John Goold wrote:
Issues...

* When launching a program from the Qubes menu, particularly if the
   target   appVM has to be started, the program often fails to be
   launched. This happens very frequently with the Text Editor.

   This is annoying as one waits a bit in case one is simply being
   impatient, or at least I do, so as not to launch two copies of the
   program by accident.

This well-known bug appears to center on programs based on Gtk+ and/or Gnome. The only way to consistently avoid it is to install Qt/KDE or other non-Gtk+ software in the templates. KDE works well and Debian+KDE is what the Whonix templates are based on.

The steps on Debian 9:
$ sudo apt-get remove gnome*
$ sudo apt-get install gnome-icon-theme task-kde-desktop
$ su -c "echo export XDG_CURRENT_DESKTOP=KDE >/etc/profile.d/qkde.sh"

After that, you'll need to adjust the Applications tab in the template's Settings, and possibly for some of the VMs that are based on it.

(Also switching dom0 to KDE is an option, and this has solved a raft of usability issues for me.)


* When a USB device is attached to an appVM, there is an appropriate
   notification. When it is detached, there is a notification that the
   device is being detached, but no notification to indicate that it has
   been successfully detached  so how long should one wait before
   unplugging it?

There is probably no delay required but a couple of seconds suffices for me.


* Ignoring whonix (I do not use it... yet), there are two template VMs
   in the vanilla Qubes 4.0.1 installation: Fedora and Debian. However,
   they have not been treated equally, with Debian being the loser. The
   Qubes documentation indicates that Fedora was favoured for security
   reasons.

IIRC there is mention that Fedora was chosen for convenience, not security. Fedora actually presents a security problem for Qubes and there is an open issue for moving Qubes off of it.

The problem with the Debian template is that its not preconfigured with an array of familiar apps, and when you do add them some of the default file/app associations remain set to unfriendly substitutes (like text files being associated to emacs, pictures set to imagemagik or gimp, etc.). Switching to KDE has set these associations to reasonable defaults.

Its also doesn't have the full set of kernel firmware packages installed but that's easy to remedy.


   Since I had been using Linux distributions based, directly or
   indirectly, on Debian, when I first set up Qubes, I created my appVMs
   based on Debian. That  was painful as I then had to install a lot of
   basic software.

   When I re-read the documentation, I realized the security reasons,
   so I switched all my appVMs (except one!) back to Fedora. It was not
   painful, but I would have rather have spent the time doing something
   else.

I would like to know where it says this about security. Most Qubes users consider Debian to be (in general) more secure. The open issue for migration away from Fedora is at:

https://github.com/QubesOS/qubes-issues/issues/1919


   The kicker came when Firefox stopped playing Flash content in my
   untrusted appVM, complaining that I needed an up to date version of
   Flash. I installed the most recent version, but that did not solve
   the problem. The problem is/ was something to do with Fedora (or the
   version of Firefox for Fedora or ??).

I haven't used Flash in a long time so I can't help there. In general its best to find an alternative that doesn't rely on Flash, which is becoming a dead format. Typically Flash is replaced by HTML5 web apps (and most websites have made this switch automatic).

* Screenshot only appears to work from Qubes Tools. I can "add"
   "Screenshot" to appVMVs based on Fedora (but not on Debian). But it
   does not work -- The dialog comes up but, having chosen to select an
area, I cannot do so.
   Subsequent attempts to use Screenshot do not even present a dialog.

   Although I have not seen this documented anywhere (which does not
   mean it is not), it seems logical -- dom0 owns the screen (monitor),
   so it makes sense that it handles screenshots. However, that means
   screenshots are saved in dom0 and have to be moved (or, I suppose,
   copied) to the desired appVM. It seems a bit awkward. If one is in a
   program in an appVM and decides a screenshot would be nice, it is
   probably focussed on that window or a portion of it. Since the OS
   displaying the window "knows" what it is displaying, it seems logical
   that some kind of screenshot could be made by that OS, but restricted
   to its window.

   If not, why is it possible to "add" Screenshot to an appVM?

Qubes doesn't limit which apps can be installed in templates. So this is considered more of a "sensible defaults" issue, where screenshot apps are not preconfigured in templates, and are preconfigured in dom0.

As for saving screenshots, there is an open issue and a mostly-finished utility that attempt to address this. OTOH, I just use 'qvm-move-to-vm' from the shell when I'm done snapshotting.

https://github.com/QubesOS/qubes-issues/issues/953


* About a week ago, I started having a problem: I could not
   copy-and-paste between appVMs. Prior to that, I had been having
   problems with Firefox freezing in different appVMs. Rebooting the
   affected appVM solved (or should I say "worked around") the latter
   issue; however, it had no effect on the former problem.

The current Firefox ESR does have a tendency to freeze temporarily when memory gets low. I'm considering switching to the non-ESR 'firefox' package in Debian to see if the newer versions are better in this respect.

I think someone reported here in qubes-users that copy/paste stopped working for them. Since this is a dom0-controlled feature it may be that your preference for long uptimes is overlapping with a Qubes daemon stability issue -- sometimes a dom0 Qubes process will just exit, although I haven't experienced this with copy/paste and I reboot on average a couple times per week.

My Bottom Line:

I can live with most of the issues described above. What I cannot live
with (and worry about) are stability and reliability issues.

[Aside] I do not intend doing a daily full back-up. I do not wish to be
         hypocritical, so full-disclosure: When I was managing the
         internal hardware and software support teams at a Bell-Northern
         Research lab., I insisted on daily backups. When managing the
         "System Programming" group for a mainframe (same as the modern
         "System Administration") the scheme involved daily, weekly,
         monthly and  annual backups of data files and backups whenever
         the operating system was updated, withappropriate off-site
         storage.

I'm about to release a beta for my backup utility that can perform quick incremental backups of Qubes volumes. The working title is 'sparsebak' and it works like Apple's Time Machine in a sense... you only need to do one full backup (ever) and it can quickly recover space from old backup sessions:

https://github.com/tasket/sparsebak/tree/new4

The idea behind sparsebak is similar to Time Machine -- that even VM backups should be so efficient that you could backup many times each day without experiencing a burden on your time or system resources. It depends solely on the amount of change your volumes incur, so that even very large files experiencing small changes are backed up in a flash.

Its pretty unique on Linux -- capable of updating a VM volume over Wifi in 1 or 2 seconds -- and I feel the 'new4' branch is already at least beta quality. The storage format is also simple enough so that regular Linux tools can recover data from an archive. Although its CLI-based, you might want to give it a try.

An alternative to this is to setup a Btrfs or ZFS storage pool for your VMs (if you didn't already install Qubes on Btrfs) and use send/receive for incremental backups. This also requires a Btrfs or ZFS volume on your backup server if you wish the snapshots to stay integrated (IIRC this is a requirement for ZFS anyway).


I need some reasonable assurance that data corruption on disk has a
very low probability. I need some reasonable assurance that the
operating system (the combination of Xen and dom0) is stable.

The best assurance is regular backups. I don't know what caused your glitch but I've had vanishingly few on Qubes myself since 2013.

However, Qubes does require the use of snapshot-capable storage for reasonable efficiency and this is not yet Linux' strength.

Between Thin LVM (Qubes default) and Btrfs storage options my experience tells me that Btrfs is actually the more reliable system, as it can survive system crashes even better than plain ext4; Storage integrity is a core goal of Btrfs so this is expected. Another option that offers high integrity is ZFS for which a Qubes guide exists.

-

I hope this response helps you out some. Right now Qubes appears to be in a state that's mostly suitable for "security techies"; There is certainly room for improvement and your critique has made me think that some new issues need to be opened to help address the usability issues.

--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/822f9c79-6be5-f2b2-f075-b7efa104ef65%40posteo.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to