Demi Marie Obenour:
On Wed, Mar 16, 2022 at 10:02:41AM +0000, 'taran1s' via qubes-users wrote:


unman:
On Wed, Mar 09, 2022 at 11:20:53AM +0000, 'taran1s' via qubes-users wrote:


taran1s:
I have an issue with Split GPG as well as with opening files in the
disposable VMs and with the qrexec in the guide How to use Monero
CLI/daemon with Qubes + Whonix too.

https://www.getmonero.org/resources/user-guides/cli_wallet_daemon_isolation_qubes_whonix.html


Split GPG

Opening Thunderbird, I get following errors in the notification popup:

Denied: whonix.NewStatus
Denied whonix.NewStatus+status from work-email to sys-whonix

I have to as well make every gpg action confirm in the Dom0 Operation
Execution with Target GPG backend.

Using dispVMs from within AppVM

When trying to convert file or open it in the disposable VM from within
the normal AppVM, I get an error popuplike :

Denied: qubes.PdfConvert
Denied qubes.pdfConvert from work-email to @dispvm

Any advice appreciated!

Is this mailing list still active or one needs to better go to a different
place?


Still active, but the Forum has more traffic, although it's often low
grade and noisy.

On your questions,  the first looks like a Whonix issue - Patrick has
asked that Qubes-Whonix questions be put in the Whonix forums, where
they will get better oversight.
The second looks like permissions - look in the policy file at
/etc/qubes-rpc/policy/qubes.PdfConvert

The /etc/qubes-rpc/policy/qubes.PdfConvert has allowed anyvm to run
PdfConvert
$anyvm $dispvm allow

What do the files under ā€œ/etc/qubes/policy.dā€ contain?  R4.1 has a new
policy syntax and the files are located in a different directory.  That
could easily cause denials.


Dear Demi-Marie, thank you for your reaction. Patrick on whonix forum mentioned that this is an issue (the communication in between qubes) with the Qubes qrexec rules, not whonix specific.

To your question regarding, the files under /etc/qubes/policy.d. The Qubes 4.1 is a fresh installation and I didn't make any changes except the Split Gpg and the Monero guide here http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Monero_Wallet_Isolation

I believe that there are no changes whatsoever in the files under /etc/qubes/policy.d and should be in default vanilla state.

Thank you in advance for your support!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53be1d3a-d510-ab04-8a58-11b4167cf70d%40mailbox.org.

Reply via email to