unman <un...@thirdeyesecurity.org> writes:

> On Tue, Jan 18, 2022 at 12:49:34PM -0600, Eric W. Biederman wrote:
>> 
>> Can someone tell me if I am missing something?
>> 
>> I do a lot of testing of linux kernels.  A bunch of that I have
>> historically done in qemu with kvm support.  Unfortunately nested
>> hardware virtualization does not work.  Which means for testing
>> for race conditions and the like I need to run the kernels in
>> their own HVM.
>> 
>> I use an HVM so I can update the kernel in /boot and reboot the qube and
>> be running the kernel I am testing.  It would be nice if I could use a
>> throw-away qube that just boots with a kernel of my choosing but using
>> an stand-alone qube is fine.
>> 
>> Where I run into practical problems is when I want to place specific
>> files into my testing qube.  I have not figured out how to ssh into
>> the qube from another qube, nor have I figured out how to use qvm-copy.
>> The best I have right now is to have an external machine that I copy
>> things to and then copy them back, which seems like a real hack.
>> 
>> I also have not figured out how to get a serial console from such a qube
>> only a graphical one which makes it more difficult than I would like
>> to capture errors.
>> 
>> I looked at installing the qubes-core-agent package in my testing HVM
>> but it has too many dependencies and installing it makes it impossible
>> to test what I would like to test.  That is assuming someone has even
>> packaged it for the distro I need to test on.
>> 
>> Am I missing something?  Is there an easier more straight forward way to
>> setup a testing qube?  Is it possible to setup a virtual serial console
>> to a qube?  Is it possible to ssh to a qube from another qube?
>> 
>> Eric
>
> Hi Eric
>
> You should probably check out the fine documentation:
> https://www.qubes-os.org/doc/managing-vm-kernels/ has information about
> using different kernels, including kernels provided by the qube.

I don't seem to be missing anything there.

I could theoretically use a standalone PV style cube instead of a
standalone HVM.  But going that route I might not be able to see the
output of a boot failure, and the grub timeout is made so small (when
installing qubes-core-agent) I do not have enough time to mess with grub
in case I install a broken kernel.

> https://www.qubes-os.org/doc/firewall has information about enabling
> networking between qubes.

Unfortunately the formula given there to allow networking between hosts
does not work for me and I am not certain why.  I am using Qubes 4.0 and
that is supposed to work.  When I follow the instructions ping works
fine but tcp connections make it to the firewall vm and I get a "no
route to host" icmp reply.

I am not certain what is the problem.  I have been able to completely
disable the qubes firewall and still the ssh packets are returned with a
"no route to host" and icmp packets still make the round trip.  It looks
like there is some clever networking configuration that I have not
figured out yet, which is causing the problem.

I am going to spin up a second firewall vm and poke some more, and
see if I can get somewhere.

> If you are using HVMs you can, in some cases, install qubes packages,
> and then use tools like qvm-copy. I say, in some cases, because this
> wont work with some targets, like Ubuntu standalones.

Yes. I have explored using qubes packages.  My initial kernel test
configuration is using debian11.  Unfortunately the qubes packages make
the HVM unusable for my testing.  Pulling in a bunch of stuff I don't
want and taking over configuration I need to control for my tests.

Eric

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87mtjr7fda.fsf%40email.froward.int.ebiederm.org.

Reply via email to