[qubes-devel] Re: Should we migrate the documentation to another platform?

2021-09-27 Thread Sven Semmler
So, what do you all think? 


The goal should be that a lot more of the available attention and energy can flow towards 
the actual content, rather than maintaining "the system".


RTD vs. Wiki


Wiki's are ubiquitous and very easy to edit. But that could end up being a 
problem, as Konstantin already pointed out.

RTD appears to be purpose built for what we need and widely used. The ability 
to retain git version history and signed commits is a huge plus. With 
documentation having the wrong information displayed is worse then having 
nothing. So making it easy to contribute is important, but having a tight 
review before publishing is too. Wiki's seem to be more of a mess in that 
context.

/Sven

--
 public key: https://www.svensemmler.org/2A632C537D744BC7.asc
fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63 2C53 7D74 4BC7

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/97f2d979-90a7-b715-09c0-3689c53aae0c%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-devel] RFC - Salt formula - distribution and package removal

2021-05-21 Thread Sven Semmler

On 5/18/21 9:53 AM, unman wrote:

Should this be a generic GUI or one for each package?


Ideally there would be both.

1) "Configuration Wizard"

- main view shows a list of available actions (from installed packages)
- [add/remove actions] dialog that shows a list of available packages 
and allows to install/uninstall them.

- [run] ... runs the selected action
- [close] ... exits the "wizard"

2) "action" -specific GUI

- some formula might need parameters (e.g. VPN config) before or during 
execution ... I don't see how that can be done with a generic GUI.



Sorry for the late response, I've been fighting a strange issue (#6227)

/Sven

--
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/a389ce60-48b7-fc16-c1d3-c0e618f74170%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-devel] RFC - Salt formula - distribution and package removal

2021-05-16 Thread Sven Semmler

On 5/16/21 7:13 AM, unman wrote:

Remove the effect of the state as best we can?


That sounds messy to impossible as you already point out with "as best 
we can".


I don't think a (non-technical) user would anticipate this to happen or 
be able to accurately predict the consequences.


/Sven

--
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/f7a51c4c-c9ec-d0a0-8bae-db0d513892e0%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-devel] broken dom0 updates, shall I report this at qubes-issues?

2021-03-19 Thread Sven Semmler

On 3/19/21 6:35 PM, Marek Marczykowski-Górecki wrote:

Ah, you probably have Debian-based updatevm, which doesn't support this
option. Then, use --clean.


I do & did. Thank you!

/Sven

--
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/663cf5b5-5312-02a8-1f99-c1f4a3355c59%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-devel] broken dom0 updates, shall I report this at qubes-issues?

2021-03-19 Thread Sven Semmler

On 3/19/21 4:44 PM, Demi M. Obenour wrote:

‘qubes-dom0-update --clean’ should work.


It did. Thank you!

/Sven

--
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/8113febf-ca0c-4272-6149-b69d7d986d21%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-devel] broken dom0 updates, shall I report this at qubes-issues?

2021-03-19 Thread Sven Semmler

On 3/19/21 2:03 PM, Marek Marczykowski-Górecki wrote:

Are you sure you don't have security-testing or current-testing
enabled? Those packages are currently only there.


I had it enabled once to see which packages would update, but did not 
say yes ... so they might have been cached in the updatevm?



You can retry with `qubes-dom0-update --refresh`


That tells me "Command line error: no such option: --refresh"

I am actually fine with enabling security-testing, I just said "no" 
because the dependency errors scared me. When I try again now, I still 
see the errors. Either the dependencies or with the additional 
parameters the warning that something critical will be removed.


Is there another way I can force a --refresh? ... should I just wait?

Since this is the devel list and this not a bug but something I did, 
shall I take it to qubes-users?


Sorry for the noise.

/Sven

--
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/25dd4fe2-8065-d760-1c3c-89a165898eff%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


[qubes-devel] broken dom0 updates, shall I report this at qubes-issues?

2021-03-19 Thread Sven Semmler
This is on a install from the 4.0.3 ISO running for several months. I 
always only do sudo qubes-dom0-update (no security or other testing).


Today I see this:


 Package  Arch   VersionRepository 
Size


Upgrading:
 device-mapper-persistent-data
  x86_64 0.7.5-3.1.fc25 
qubes-dom0-cached 435 k
 grub2-starfield-themex86_64 1:2.02-0.38.1.fc25 
qubes-dom0-cached 2.2 M

 qubes-core-dom0-linux-kernel-install
  x86_64 4.0.29-1.fc25 
qubes-dom0-cached  14 k
 qubes-mgmt-salt-dom0-update  noarch 4.0.10-1.fc25 
qubes-dom0-cached  55 k
 xorg-x11-drv-ati x86_64 18.0.1-1.1.fc25 
qubes-dom0-cached 169 k
 xorg-x11-drv-nouveau x86_64 1:1.0.15-4.1.fc25 
qubes-dom0-cached 100 k

Skipping packages with conflicts:
(add '--best --allowerasing' to command line to force their upgrade):
 PackageKit-glib  x86_64 1.1.5-1.1.fc25 
qubes-dom0-cached 129 k

Skipping packages with broken dependencies:
 PackageKit   x86_64 1.1.5-1.1.fc25 
qubes-dom0-cached 664 k
 createrepo_c x86_64 0.10.0-6.1.fc25 
qubes-dom0-cached  69 k
 createrepo_c-libsx86_64 0.10.0-6.1.fc25 
qubes-dom0-cached  95 k
 deltarpm x86_64 3.6-17.1.fc25 
qubes-dom0-cached  89 k
 drpm x86_64 0.3.0-3.1.fc25 
qubes-dom0-cached  67 k
 hawkey   x86_64 0.6.4-3.1.fc25 
qubes-dom0-cached  64 k
 libsolv  x86_64 0.6.29-2.1.fc25 
qubes-dom0-cached 361 k
 python2-deltarpm x86_64 3.6-17.1.fc25 
qubes-dom0-cached  36 k
 python3-hawkey   x86_64 0.6.4-3.1.fc25 
qubes-dom0-cached  47 k
 qubes-core-dom0-linuxx86_64 4.0.29-1.fc25 
qubes-dom0-cached  54 k
 satyrx86_64 0.21-2.1.fc25 
qubes-dom0-cached 108 k


Transaction Summary

Upgrade   6 Packages
Skip 12 Packages

So if I then try sudo qubes-dom0-update --best --allowerasing I get this 
error:


"The operation would result in removing the following protected 
packages: qubes-core-dom0, dnf."


/Sven

--
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/aa34f007-c4ad-749f-9457-5570c302a2b6%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-devel] Re: Seeking an additional HCL maintainer

2020-11-28 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Andrew et al,

the PR is here: https://github.com/QubesOS/qubes-hcl/pull/32

I monitor the qubes-user list pretty much daily and will add new HCLs
as they appear.

Future-plans:

* automate cleanup

* validate format / fields (e.g. 'type')
* build lookup tables for chip set and GPU short names ... so things
  are named consistently
* export CSV format for download

* find a way to recheck the mailing list against the HCL to find missing
  entries (found some from 2018 by chance)

I was looking for a way to contribute, but are not a good (docu-)
writer and my programming experience is more embedded C (no Python
and/or XEN knowledge).

/Sven

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
-BEGIN PGP SIGNATURE-
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=w5LY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/0bb93732-403f-0f34-5775-4ec0aef350b8%40SvenSemmler.org.


[qubes-devel] Re: Seeking an additional HCL maintainer

2020-11-25 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 11/25/20 6:05 AM, Andrew David Wong wrote:
> If you'd like to volunteer for this role, please let us know by
> replying to this thread or directly to me. Thank you!

Started working on it:

https://github.com/SvenSemmler/qubes-hcl/commits/master

PR in a day to two.

/Sven

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl++0yUACgkQ2m4We49U
H7YxiRAAorvbmGze90hdJyZGIV7MdxpEJwFGqBecwwFnHZNwxmYgMf4txnQm5ljn
3tOKKoCvBnM95M9KZ1QggKHiKBaVfpcIv2X/8h0Op3YO2qRGrZV0a9PshdKkabU7
iPy5gbMtsjDpETzQhmkgTth4diNjnwv3mb1++xgq7tort8bYcDvdOt+Mkh/7u3Qt
MBztHG1vkqaLaGEwa99YMm1ESjpa5YJ9SUOGVKD7ztublogF2ImxU7fyKkXouYZo
djBiNTwc09BqynUMntYgDqdIZw188TKRcoys//AqT9/e0cehIiZgnICXaxzzKkUn
1Nw4LaJGhIgKfXAPVaJT49aUL6VAhxpk6awZc39S4dtCxPd0BkqQLeRdhsPHnDL8
EnVTFi/gLoPDsGtJhYx1LBkwNszzCai7pBu34GvWzWwaz6pmh6dkGPiCmmg2Lbbs
j9zzYSzFDWhIPbIOd0/F3IUOjM9PiTQ0TLwMlfQyIB0OwNB8TFbWTyEXonZ/CAw5
jA/K+lXxHdYRHYZFOVyJ+0PMRPixaVbyPbzrBLUATuT/udWeyuJACKYf7Bt2gGO2
cRysuZFNKcEqCsPxCwNak7qYBVnHsMlcCAQAsrHmRIxH+RlPdWmSRVsIa1R2QLjx
A9dndbP4ss2afqWZ7s796X6PU4mapeUK1fEDrD62+7DFLAr/64I=
=XSJF
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/83a639c5-85aa-d120-ac8f-d12dd300bf02%40SvenSemmler.org.


Re: [qubes-devel] Re: Help create a Qubes Users Forum! // news group // rfc3977!! news.qubes-os.org !!

2020-07-29 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 7/28/20 2:39 PM, ludwig...@gmail.com wrote:
> So having a security internet nerd operating system, why you
> suggest a http based forum that loads tons of javascript shit to a
> browser in order to simulate a news group?!

Qubes OS is not (only) a "security internet nerd operating system", it
is targeted at Journalists, Activists and everyone else having the need
for a "reasonably secure OS".

Requiring these people to download and configure a NNTP reader just to
start asking questions would be counter productive.

I miss the Usenet too and if this where a "nerd-only" thing I'd be
totally with you -- but it's not.

As you are surely aware qubes-(devel|user|project) are currently mailing
lists and will surely continue to be for a long time to come. As it
shapes up currently the Discourse Forums are additional and might take
over in some distant future.

> Use the tools and protocols that were designed for a service,
> don't try to forcibly invent some shit using web browsers.

I am with you. Nothing is stopping you from participating even in the
Discourse Forum just using your Mail Reader (aka "Mailing List mode").

Those Mails are full of noise and HTML non-sense but a "nerd" like you
surely knows how to filter that out. ;-)

/Sven

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
-BEGIN PGP SIGNATURE-
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=1c+3
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/321b73b2-97a3-8bd8-d3d3-bc12637864ed%40SvenSemmler.org.


Sorry! OT - Re: [qubes-devel] Bug, Qubes 4.1

2020-06-20 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I am sorry ... just realize this went to qubes-devel. It is obviously
off topic here. Mea culpa!

/Sven

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
-BEGIN PGP SIGNATURE-
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=WhMj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/97f274bf-08c3-91d1-1159-239497d5c0b7%40SvenSemmler.org.


Re: [qubes-devel] Bug, Qubes 4.1

2020-06-20 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/20/20 5:21 PM, catacombs wrote:
> Which makes me wonder how some view backups with Qubes.

Obviously backups are essential, especially if you are still learning
and like me sometimes do something that results in rather catastrophic
states. Also, I do not keep anything in any cloud. It only exists on
my Qubes install. So again: backups are essential.

There are efforts of providing incremental backups for Qubes to only
copy what changes and reduce backup time. I have no experience with that
.

Here is what I do: with the build-in backup of Qubes a full compressed
and encrypted backup of everything on my machine takes between 4-5
hours and consumes ~260 GB.

I have a 2TB USB3 external drive that is encrypted. When I am ready to
go to bed, I shutdown all Qubes except sys-net (which in my case
doubles as sys-usb), delete the oldest backup on the drive and start
the backup with the option to turn the computer off once it is done.

This way I always have the last 7 days. I also have a second drive
where I manually copy the last backup of the month for the last 4
months. However, if I do something stupid I usually am aware of it
right away and simply restore the backup from last night.

Another advantage is that you can usually very well recall what you
have been doing since the morning and copy just those few mails,
projects / documents to a USB stick to be restored after restoring the
big backup.

Side note: maybe I do something fundamentally wrong, but my SSD based
system slows down noticeably after several months. There's nothing
like a clean Qubes install and restoring from backup to regain full
performance. ;-)

Also often I mess up just a single template, which can be restored
much faster. In general, besides all the security related advantages
of Qubes, I find it greatly liberating to have the freedom to
experiment knowing I can always switch back to the working template /
backup. Or even move my entire install to another computer as long as
that computer runs Qubes.

Fully recovering from any disaster never takes more than 5 hours. Try
doing that with any other OS!

/Sven

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl7ukzMACgkQ2m4We49U
H7Z0nhAAwaOIXCJ4lL/U8d8LR1tzJ3tOEuKgWekdBGpcTwVKRrwr2D6ydL/ForX1
J16r+QBLUiKmM96rtASxpd44U1UkB7kAJC+HbuLjw6vbjCMErEfqC2A8VrSJU6zi
294B3KuQLV8jg8rrrETDSKRmV9vPBWsjo2J5Wb7rwAoL2mF+78jJkbpYKW4uGnBd
N058bcP0ypdxBYHNue2HZ4N7IlPP1MTJzR0RRdNbgFWX9UYNqOjITl0TNZBKvwm7
eKQsujj6uNM32dalwx2/7SdfHT04wDdZKzmSGMPYEC52UDl6YN0BwZe/pjD81j63
Gfk3eFS3mWNNKSVWCMwGRFZSZwdUN4mpqU/GRyX6KHRP5u3kGm8fQoHUhGshHDux
H0/lS5o1EXihq9yzUvpJd8fGfiaUNcPsCDeYBikl0F90I6QfEFSCO5Q5oa5utANh
D2wwOWEqANIEJe5neh48FCFel7RzVdMqcKzhs3+yJyrYgXs5AHiVkqc59I5Y/Brd
Du6tYVKvrtz9S9H/BGbC1LWOgp1xf0ERzH1+DEVFOwDPz6jOeM5ccyDuo/sFJyQK
mg1OoGWVwmrQNJoP/0xmzb+QLIlMdamelCmEPK/2LkvM6v/fbCsYsvX5Lk4vsAuT
EdyzC9U2tx36gcJ7MlmpzYV4TXmqB/8IR2DGs1d3EY/S4KN3VtU=
=YPdf
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/15eaccab-7157-7151-560e-22a0adc2c5e9%40SvenSemmler.org.


Re: [qubes-devel] Thoughts on PGP vs signify and age?

2020-03-19 Thread Sven Semmler
On Thu, Mar 19, 2020 at 06:11:05PM -0400, Konstantin Ryabitsev wrote:
> That doesn't need to be any different from minisign. There are still 
> fingerprints people can post in their slides and in email signatures. :) 
> Or even the whole key, since it fits well within 80 columns.

Got it.

> with PGP. I merely suggest that it could be used in delegated-trust 
> situations and make the verification process much simpler for users to 
> follow.

Thanks for the clarification!

/Sven

-- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/20200320012634.GB1126%40app-email-private.


signature.asc
Description: PGP signature


Re: [qubes-devel] Thoughts on PGP vs signify and age?

2020-03-18 Thread Sven Semmler
On Wed, Mar 18, 2020 at 02:24:48PM -0400, Konstantin Ryabitsev wrote:
> I'm not at all saying we should abandon PGP -- I'm just suggesting that 
> Qubes releases can offer .minisign signature *in addition* to PGP. I 
> believe this has a benefit of making one-off verification a more 
> straightforward process.

You are clearly an authority on the topic, so please take this as a
question not critisism ... what's the point of a signature if I 
haven't verified they key?

That's my take-away from this thread. That signify makes it easier for
people who don't care to validate the key.

Some years ago when I first started using Qubes I followed this
instruction: 
https://www.qubes-os.org/security/verifying-signatures/#1-get-the-qubes-master-signing-key-and-verify-its-authenticity

In particular the part where I searched they web for fingerprints of the
qubes master signing key and also looked at slides from Joanna using
serveral machines at different locations / networks. Only then I trusted
it. 

I get all of that. That makes sense to me. And the trust flows from the
master key to the release signing keys. 

Without that ... what's the signature worth?

/Sven

-- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/20200319025148.GA1106%40app-email-private.


signature.asc
Description: PGP signature


Re: [qubes-devel] Qubes 4.x Backup setting should not be set to save (replace) default settings by default

2019-02-13 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

This thread might be better located in qubes-users.

On 2/13/19 9:49 AM, Teqleez Motley wrote:
> a) Where exactly does qubes save this password/backup settings 
> (file+folder, please)

/etc/qubes/backup/qubes-manager-backup.conf

> b) It seems to be ticked by default (per 4.0.1-RC/December, not
> the latest bugfix which I am about to prepare to upgrade to...), in
> case that is not changed this last month, isn't that default
> setting actually bad (for the personal...) security?

It depends... one could argue that if an attacker has *any* access to
dom0 it's game over. So unless you tend to leave your PC unlocked and
walk away ... in which case the saved backup password should be the
least of your issues.

/Sven
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlxkq9MACgkQ2m4We49U
H7ZoCQ/9HYPWOrBeiUxwSEQeqs4+Tm6QXp2ix8KmX9PNQZ2HQhmd/2EzER99VdSO
B4obqlPdLc0Hr86RtwJbMFXrTjFe7HaM8ujMJPjVsvPZkEdpsMSlxZOLGDG6geL5
AYnr+ypRFJvguucSK6/CdoYj50N2wYZVxSieBHv4vVy2RO9T5bz/ihWu5EehsURs
5aV1iEqhMfi3t3qhxKdKQUyPMW9OqHcmOoHb+mFX/TCRgYIFKWbsjHq7Vi4fG9iz
8lwfKzDewoVkDyvZPjZMSRxmUf7Wop3+yzHjNsqlIrA98XnrxNBupF9PkfzoU3yl
zRjJREnQ+QDcv8ivoW7WXhSxY0gBBYj9Kk8B6/XJe5ERXYPmDUdzw/YxBHJJx5q2
BSDSZHCjw++JvwyhRzPdtJAyQixa/JhwsdIz0Q1aYMEDo9kSfESXhIxH1UEJrRnv
QzJcHvHtknu/W+8W9Fo9IQsi9+jhgEl/uh+qwyaxPG0DsCa/uQ7TZ+ywLCnmed4d
eEUpj/A4My5O7WM17eVuU9rFo+ZQPGquqPqE0Gl0xwlSfxFsvLieS2NEfSL/M3rr
+jNl/TogUM0h2bMV3W/zU5wXGj+2ZeL/nkq3kinrL75IdnJMqhdlfjgGOeg0XgkB
p9Rm7ghegDcY2/dvDNRu1uN1HDaZb+5kSWEdlzgr2I6JWt6azdg=
=MaKW
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/1f1a5b54-ec17-41c9-9bdc-f6383e6245a1%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-devel] Qubes as #NextGen #FileManagement efficiency tool (alleviating Information Overload while securing the info..?!)

2018-11-21 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Teqleez,

you wrote:
> a) the GUI / semi-automation / flow tools (or lack thereof),

Can you name some example tools / use cases? Why would that be Qubes
specific as opposed to be template specific (reusing tools from e.g.
Manjaro)?

> b) USB technology itself (not Qubes problem; but related to making
>  strategies for how/when to use Qubes...)

I'm sorry to see you struggle that much. Do you experience these issues
also on your Manjaro machine or just on Qubes? I too have frequent use
cases with two USB3 HDDs connected and have not observed any problem
(moving data between them).

> I have also a recurring problem with connecting USB disks that are
>  firstly auto-recognized by dom0, but then impossible to attach to
> a running Qube without restarting that Qube.

You might want to create a USB qube, which will have several advantages
for you:

1) increased security (dom0 never sees your USB device and whatever you
   connect is isolated in the USB qube)

2) assigning USB devices to other qubes still works

3) you could use the USB qube itself exactly as you would your
   standalone Manjaro machine (the USB controller is attached to that
   qube)

https://www.qubes-os.org/doc/usb/

> Complicating challenge: More VMs, more RAM, less and less OK to 
> restart "anything"...

What is your spec? I used Qubes for many months with 8 GB which was
usable but sometimes showed limitations. Now with 32 GB I have not seen
any issues (frequently running 12+ qubes in parallel)

> There is simply too much time lost when having to restart, even
> just one Qube, let alone the whole physical machine.

Restarting a qube should be very fast ... I start to think you are
maybe experiencing hardware issues. Maybe your computer is not well
suited to run Qubes, maybe your USB controller has issues?

> There is now a whole new sleuth of memory technologies coming out 
> shortly, which both boosts capacity and speed, and preserves data 
> through shutdown/restart/power-off (non-volatile memory).
> 
> Perhaps Qubes would do well to skip its further development of 
> USB-related features, and go directly for the "new reality", which
>  will revamp almost all work/-flow and how we use computers in 
> general?

You lost me there. Could you explain your meaning a bit more?

> With that in mind, I would like to know if there is interest in 
> discussing the "next-generation-file-management" in Qubes context.
> 
> How can Qubes help push the world forward when it comes to
> smart(er) file handling (with security)?
> 
> A framework with integrated automation tools comes to mind. (Think
>  "low-level AI tools", with emphasis on automation <-> GUI, not " 
> artificial intelligence".)

Could you name examples. Do such tools exist on other distributions?

/Sven
-BEGIN PGP SIGNATURE-
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=8hvU
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/305d3088-6238-f4cb-ce66-b25e39d06a94%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-devel] Where does Qubes-UX fit in?

2018-11-20 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 11/20/18 1:30 PM, Doesnt Work wrote:
> I want to know weather enduring the steep learning curve of a new 
> OS, or waiting for a more UX-focused version 4.1?

I asked myself the same question, but then just couldn't wait to use R4.
Now I am glad to have made the switch and must say the learning curve
was not steep at all. There are only a handful of commands which will
become second nature in no time:

- -> qvm-ls ... shows your qubes and their state. The default output is
sufficient in 99% of all cases. If you are missing something you will
easily find a parameter to add it.

- -> qvm-prefs ... is how you manipulate qubes. Easy and straight forward.

- -> qvm-create, qvm-clone, qvm-remove ... are obvious.

- -> qvm-pci to assign devices to qubes (hvm only!)

- -> qvm-usb to assing usb devices

There is also a qvm-features but I use that one only by instruction when
creating named disposable qubes.

I have no idea where you stand when it comes to UX. Personally I tried
I3 on Qubes out of curiosity and didn't plan on using it at all. That
was several months ago ... I still use it.
-BEGIN PGP SIGNATURE-
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=8aDS
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/f922897d-5548-e66e-43e0-25323884b79e%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-devel] [proposing new feature] Edit in VM: an idea that can improve security when managing documents

2018-09-14 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 9/14/18 7:14 PM, unman wrote:
> You dont say this, but if you use a minimal template for the 
> document vm, then you minimise the risk of inadvertently opening a 
> file there by mistake.

That's in fact what I am doing - thank you for pointing that out. My
'documents vm' is based on fedora-28-minimal and only runs TheBrain 8,
which is what I use to organize all my documents, thoughts and
projects. Nothing ever gets open there.

/Sven
-BEGIN PGP SIGNATURE-
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=8nHf
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/2b310f35-e2a9-ac2c-0360-9f146cbe036d%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-devel] [proposing new feature] Edit in VM: an idea that can improve security when managing documents

2018-09-14 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 9/14/18 2:16 PM, Matteo wrote:
> there is a docx in the "documents vm" but you open it in a special 
> vm that allows you to edit it safely (kind of dispvm), all this
> with just double click.

You can already do this. All you have to do is set the default handler
in your "documents vm" to use qvm-open-in-dispvm.

You can even go a step further and hook up qvm-open-in-vm via a
desktop shortcut (to provide an ignored vm parameter) and then change
the policy in dom0 to always show you the dialog of all VMs to choose
which one to open it in.

Ivan Mitev explained the details to me back in May:
https://groups.google.com/d/msg/qubes-devel/0CpN7ol1ZdM/0cBPvwc6CgAJ

So in my setup:

- -> whenever I click a web link I get a dialog and can choose to either
open a new online dispvm or tor dispvm or open in an already running
(disp) vm

- -> whenever I open a document I get a dialog and I can choose to open
in an offline disp vm or an already running offline disp vm

... in other words: everything I ever open (links and documents) is
always in a disp vm and I can choose on the fly whether offline,
online or with TOR. Since changes to a document in a dispvm propagate
back to the calling VM this also works great for document I work on.

If it wouldn't require customization of the guest vm (the default
handler and the desktop shortcut), I would promote this to be the
default behavior. But I should probably write it all up nicely and
submit to the Qubes documentation. It's really powerful.

Cheers,
Sven

-BEGIN PGP SIGNATURE-
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=zISj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/aa05d57c-724a-6235-1083-945a9ef783e0%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-devel] help with creating a dispVM with a non-random name

2018-05-21 Thread Sven Semmler
On 05/02/2018 09:22 AM, Ivan Mitev wrote:
> I'm trying to implement "semi-persistent" dispVMs (in 4.0) that could
> be used for more than one time, until the service call ends (eg. the 
> browser is closed by the user).

I understand what you are looking for and would like something like that
too. Unfortunately I lack the knowledge/skill to contribute this myself
but let me at least share the idea:

You know the dialog that pops up in Qubes 4 now when one calls qvm-copy
or qvm-move to select the target VM?

It would be great if qvm-open-in-vm would show a simliar dialog if no
target VM was specified. In that dialog one could choose an app VM, an
existing DispVM instance or create a new DispVM.

I copy and paste plenty of URLs everyday. My default DispVM connects to
TOR ... but there are other URLs in my email that link either to a
specific Jira issues (open in dev VM) or a link that identifies me in
some way (makes no sense to open that over a TOR connection - is
actually harmful). Still most links I want to open in the DispVM with
TOR (Whonix) as they are just links to articles, presentations and
nothing in the URL identifies me.

/Sven


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/313c65f1-9834-5b2e-9d01-3f2070a3e7f9%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-devel] R4.0-rc4 installation image considerations

2018-02-02 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 02/02/2018 03:34 PM, Sven Semmler wrote:
> I am struggling to see your perspective. Maybe I am an old fart,
> but Thunderbird and Firefox are very much essential to me. I am
> not looking for a big debate, which would be off topic here anyway
> ... just wanted to give feedback that there might be more people
> like me very much depending on the duo.

Ignore me. I am totally on board with bare-bones templates and then
downloading whatever you actually like to use.

/Sven


-BEGIN PGP SIGNATURE-
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=GDqN
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/50db52da-6447-3dc4-8624-682d066b8ed1%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-devel] Re: Delay of Qubes 4.0rc2

2017-09-20 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 09/20/2017 01:25 PM, yuraei...@gmail.com wrote:
> Qubes comes across as being a bit too modest, or too silent for
> that matter. Essentially at times leaning over towards the other
> opposite extreme.

I don't speak for anybody other than myself. Just a user, not a Qubes
OS developer.

Yes, Qubes OS is awesome... but it's not ready for the masses.
Installing and customizing Qubes OS requires troubleshooting,
time/commitment and often compromise. The team seems well aware of it:

https://www.qubes-os.org/news/2017/07/08/toward-a-reasonably-secure-lapt
op/

Until adopting Qubes OS is a lot easier, it might be better to target
enthusiasts and people who have an urgent need (journalists, activists
etc) and are hence motivated to work through the initial roadblocks.

Until there are Level 0 (compatible) or maybe even Level 1 (certified)
laptops available.

One gets only one shot at making a first impression. If Qubes OS gets
hyped now, most people will try and give up. It will be hard then to
get them to try again.

/Sven
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJZwsZAAAoJENpuFnuPVB+2hZoP/07z3Y/39TptbUp+Rqa3vSzr
I052yK5DxLqPCD7LAJmuEnT27gwCHHWG/wL+ayKv84TgSlMxNQC9lGOb4qH5EdBe
pHSS1Q4KzheJzNsGirOp6IPtAQ3eDdGL/1PzraNHWu6Xx8Ve1EC5cuW6k2tG1QIk
lKCi4Hl8xGeF8MY79MlY3gyFMLHtYl1x0aiSXlJNBwpWy4KWHJv8U7NGD4TXD5ii
bAVr3o/zQOwAcXx2Q8E/MHKWTLlYjBJOm3bKCdqUnsLNkdqTfTyG3hMprZLJJewd
mQsMmpBdYpBSI5io4T1OE7HDgcgoi6eAqbC8e950VMC114yUiQpszL5452vAQXMI
su7/6KHo4PXDHA7l8Ab3LG9hadN8UzRcbnPesF2sjayfoz2Jx20lcnrOn/aqRWAH
PM4KZY5OveXnAQi/nTiVlPQm7b9a6J9yHjLr7HoZEsF2aW+JzETkac8LLrCPht24
R7ABh57hZZ/0/huyKLGL3Gli58Dc6TdR5BNgZ+TWSIN5JvYhpcYQk0xvMCOGHp4T
4nZ1TLRPCFXmDv/l6xLKKfvzMw5DTYJyoIStvnynZYxpj4+cD3pKTu2oif7Gi+8q
TUMRfxNUqOjZtrpJcG3oiDwdAx7f+uUbhj2hS28Rzp4y88ajWwDor8yXF7gyUdH+
kDBfjqZemp/GKUn0SrOb
=Ylbs
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/67d58640-9b0a-8dcf-4a42-c296825b395d%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.