On 2020-07-16 12:34, unman wrote:
> On Wed, Jul 15, 2020 at 11:41:57PM -0700, pr0xy wrote:
>> On 2020-07-15 09:28, pr0xy wrote:
>> > I have been running R3.2 for about as long as I can. Time to upgrade to
>> > R4.0.x
>> >
>> > Original 2017 thread where I got this working in R3.2:
>> > https://groups.google.com/d/msg/qubes-users/K_etKdhnqLA/KyJ16z8JCwAJ
>> >
>> > It appears that some of the R3.2 tweaks I used to get Qubes to work
>> > nicely with my corporate proxy are no longer valid in 4.0.x. To
>> > summarize, my company network has a very restrictive proxy that forces
>> > internet traffic through an HTTP/HTTPS proxy like:
>> >
>> > proxy.example.com:8080
>> >
>> > In R4.0.x how and where would I set this proxy for the Qubes Updates
>> > Proxy? sys-net? sys-firewall? TemplateVMs?
>>
>> If I understand the documentation correctly...
>> https://qubes-os.org/doc/software-update-domu/#updates-proxy
>> we have TinyProxy running in sys-net, and this proxy is used for
>> TemplateVM updates.
>>
>> In the default R4.0.3 install, sys-net is based on a Fedora 30 template.
>> In the fedora-30 templateVM I tried editing
>> /etc/tinyproxy/tinyproxy.conf to add the IP of my company's HTTP proxy
>> as the upstream proxy
>>
>> Upstream http 10.0.0.1:8080
>>
>> That does not seem to work.
> 
> It would be helpful if you said in what way it does not seem to work.
> 
> Check in dom0, the contents of /etc/qubes-rpc/policy/qubes.UpdatesProxy,
> to make sure which qube is acting as the proxy.
> Check in a template if you are using sources with http:// or https:// -
> look in /etc/yum.repos.d or /etc/apt/sources.list as appropriate
> Confirm that you have DNS resolving in whichever qube is acting as
> proxy.
> 
> Report back.

unman:
> It would be helpful if you said in what way it does not seem to work.

I am unable to update TemplateVMs. Due to the proxy issue they cannot
access updates so I get an error like this:

fedora-30:
---
[user@fedora-30 ~]$ sudo dnf update
Fedora Modular 30 - x86_64                      0.0  B/s |   0  B    
06:00    
Error: Failed to download metadata for repo 'fedora-modular': Cannot
prepare internal mirrorlist: Curl error (28): Timeout was reached for
https://mirrors.fedoraproject.org/metalink?repo=fedora-modular-30&arch=x86_64
[Operation timed out after 30001 milliseconds with 0 out of 0 bytes
received]
---

debian-10:
---
user@debian-10:~$ sudo apt update
Err:1 https://deb.qubes-os.org/r4.0/vm buster InRelease                 
      
  Reading from proxy failed - select (115: Operation now in progress)
[IP: 127.0.0.1 8082]
Err:2 https://deb.debian.org/debian buster InRelease                    
      
  Reading from proxy failed - select (115: Operation now in progress)
[IP: 127.0.0.1 8082]
Err:3 https://deb.debian.org/debian-security buster/updates InRelease
  Reading from proxy failed - select (115: Operation now in progress)
[IP: 127.0.0.1 8082]
Reading package lists... Done                        
Building dependency tree       
Reading state information... Done
All packages are up to date.
W: Failed to fetch https://deb.debian.org/debian/dists/buster/InRelease 
Reading from proxy failed - select (115: Operation now in progress) [IP:
127.0.0.1 8082]
W: Failed to fetch
https://deb.debian.org/debian-security/dists/buster/updates/InRelease 
Reading from proxy failed - select (115: Operation now in progress) [IP:
127.0.0.1 8082]
W: Failed to fetch
https://deb.qubes-os.org/r4.0/vm/dists/buster/InRelease  Reading from
proxy failed - select (115: Operation now in progress) [IP: 127.0.0.1
8082]
W: Some index files failed to download. They have been ignored, or old
ones used instead.
---

I found that I am able to update Dom0. It is using sys-firewall as
UpdateVM to download updates. 
sys-firewall is based on fedora-30, and the Upstream proxy is set in
TinyProxy. This seems to work.

> Check in dom0, the contents of /etc/qubes-rpc/policy/qubes.UpdatesProxy

In /etc/qubes-rpc/policy/qubes.UpdatesProxy it shows sys-net is being
used for non-Whonix TemplateVMs:
---
# Default rule for all TemplateVMs - direct the connection to sys-net
$type:TemplateVM $default allow,target=sys-net

$anyvm $anyvm deny
---

> Check in a template if you are using sources with http:// or https:// - look 
> in /etc/yum.repos.d or /etc/apt/sources.list as appropriate

The fedora-modular.repo has all the http:// lines commented out. Other
repo files also appear to be using  https:// as well.
debian-10 is also using https:// in sources.list

> Confirm that you have DNS resolving in whichever qube is acting as proxy.

DNS appears to be working from both sys-net and sys-firewall qubes. 
cat /etc/resolve.conf from sys-net shows the company DNS servers. I can
ping these from sys-firewall.

awokd:
> https://github.com/QubesOS/qubes-doc/pull/603/files#diff-50cf93c6cf4fa87fc6b6612d706874a1
>  may be useful, but possibly also in need of correction.

I remember when you made that writeup based on my original issue, but I
didn't see it in the current Qubes Docs. I had gone through my original
post and tried those settings again before posting here. Once we figure
out why my current R4.0.x isn't working that doc could be re-included on
the Qubes site.

sysad.andes:
> Also, besides what's listed in all the docs, make sure you have 
> qubes-input-proxy installed in whatever template is behind the VM you want to 
> handle updates for your templates

Is qubes-input-proxy the same as this?
https://github.com/QubesOS/qubes-app-linux-input-proxy
That seems to be a USB device proxy. Is that what you were referring to,
or is there something else? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ec0329a4d728eafc68ab120b200b19ae%40riseup.net.

Reply via email to