Demi Marie Obenour:
On Wed, Mar 16, 2022 at 10:02:41AM +0000, 'taran1s' via qubes-users wrote:
unman:
On Wed, Mar 09, 2022 at 11:20:53AM +0000, 'taran1s' via qubes-users wrote:
taran1s:
I have an issue with Split GPG as well as with opening files in the
disposable VMs and with the qrexec in the guide How to use Monero
CLI/daemon with Qubes + Whonix too.
https://www.getmonero.org/resources/user-guides/cli_wallet_daemon_isolation_qubes_whonix.html
Split GPG
Opening Thunderbird, I get following errors in the notification popup:
Denied: whonix.NewStatus
Denied whonix.NewStatus+status from work-email to sys-whonix
I have to as well make every gpg action confirm in the Dom0 Operation
Execution with Target GPG backend.
Using dispVMs from within AppVM
When trying to convert file or open it in the disposable VM from within
the normal AppVM, I get an error popuplike :
Denied: qubes.PdfConvert
Denied qubes.pdfConvert from work-email to @dispvm
Any advice appreciated!
Is this mailing list still active or one needs to better go to a different
place?
Still active, but the Forum has more traffic, although it's often low
grade and noisy.
On your questions, the first looks like a Whonix issue - Patrick has
asked that Qubes-Whonix questions be put in the Whonix forums, where
they will get better oversight.
The second looks like permissions - look in the policy file at
/etc/qubes-rpc/policy/qubes.PdfConvert
The /etc/qubes-rpc/policy/qubes.PdfConvert has allowed anyvm to run
PdfConvert
$anyvm $dispvm allow
What do the files under ā/etc/qubes/policy.dā contain? R4.1 has a new
policy syntax and the files are located in a different directory. That
could easily cause denials.
Dear Demi-Marie, thank you for your reaction. Patrick on whonix forum
mentioned that this is an issue (the communication in between qubes)
with the Qubes qrexec rules, not whonix specific.
To your question regarding, the files under /etc/qubes/policy.d. The
Qubes 4.1 is a fresh installation and I didn't make any changes except
the Split Gpg and the Monero guide here
http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Monero_Wallet_Isolation
I believe that there are no changes whatsoever in the files under
/etc/qubes/policy.d and should be in default vanilla state.
Thank you in advance for your support!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/53be1d3a-d510-ab04-8a58-11b4167cf70d%40mailbox.org.