Re: [qubes-users] A start job is running for Start Qubes VM sys-net. FOREVER.

2021-03-16 Thread Fabrizio Romano Genovese
Booting from a live version and switching to the old kernel solved it. Has 
anyone else experienced something similar with kernel 5.11 or it is just 
myself? I had a boot fuckup with kernel 5.10 as well a few weeks ago, but I 
just waited for the next release and that solved it. I'd like to understand 
if the situation is similar here or if it's a problem of my machine, in 
which case I'll investigate deeper.

On Tuesday, March 16, 2021 at 5:29:53 PM UTC+1 rud...@rudd-o.com wrote:

> You can mask the unit in the GRUB kernel command line with the parameter:
>
> systemd.mask=qube...@sys-net.service
>
> And then you will be able to log in and fix the kernel issue (without 
> networking, of course).
>
> You can also choose the older kernel in the GRUB menu.
>
> On 16/03/2021 16.49, Fabrizio Romano Genovese wrote:
>
> As the title says. I've upgraded to the latest kernel (5.11) on qubes 4.0 
> and now boot is stuck. How do I get out of this? :)
>
> Fab
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users...@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/7ba1ae0f-4037-4a47-9bf4-aa9eae652a7dn%40googlegroups.com
>  
> 
> .
>
>
> -- 
> Rudd-O
> https://rudd-o.com/
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/772e2a89-da21-4f87-8977-0e171526978fn%40googlegroups.com.


Re: [EXT] [qubes-users] What is the latest version of Qubes (on 23 February 2021)

2021-03-16 Thread load...@gmail.com

>
> That's great but you should guess how did you get it disabled. Maybe 
> 'qubes-dom0-update' should warn about it. 
>
>
Actually I don't know why and how it happened.

The only commands which I am using often in Dom0 terminal for 
update/download templates/copy-paste files from Dom0. I definitely did not 
change any config files after my last successful update (I even don't 
remember did I change any config in Dom0).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6e2d47d8-543c-4f4a-9d6a-50701ee4e3d0n%40googlegroups.com.


[qubes-users] Re: ANN: Qubes arbitrary network topology

2021-03-16 Thread 'awokd' via qubes-users

Manuel Amador (Rudd-O):

Hello, folks!  I'm here to share this:

https://github.com/Rudd-O/qubes-arbitrary-network-topology 



This software lets you turn your Qubes OS 4.0 machine into an arbitrary 
network topology host. It is ideal to create networks of interconnected 
VMs with arbitrary pathways between them, and minimal effort compared to 
manually setting everything up using xl attach in your dom0 as root.


Thank you, Rudd-O. I've had to suggest to some people in the past they 
use a different virtualization product like Virtualbox if they needed 
more flexible networking, but this might let them continue to use Qubes 
instead.


--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01d48a87-c265-9fc1-83a4-08cea35f3174%40danwin1210.me.


Re: [EXT] [qubes-users] What is the latest version of Qubes (on 23 February 2021)

2021-03-16 Thread donoban
On 3/16/21 8:02 PM, load...@gmail.com wrote:> It was helpful. Thank you
very much. now i updated my Dom0!
> 

That's great but you should guess how did you get it disabled. Maybe
'qubes-dom0-update' should warn about it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/513af2d1-d270-14bc-f0f0-b41316ee0957%40riseup.net.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [EXT] [qubes-users] What is the latest version of Qubes (on 23 February 2021)

2021-03-16 Thread load...@gmail.com


> Is it disabled? Try replacing "enabled = 1" and update again. 
>
>
It was helpful. Thank you very much. now i updated my Dom0! 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/688c5c6a-f91a-4c9d-b1cb-75a357185ed6n%40googlegroups.com.


Re: [qubes-users] Survey from HackerNCoder: Colors in QubesOS

2021-03-16 Thread tetrahedra via qubes-users

On Mon, Mar 15, 2021 at 10:16:04PM +, hackerncoder wrote:
I have created a survey about colors in Qubes, to help understand 
users: Are there too many colors? Too few? What do users associate with 
the colors? what are they used for?


There wasn't any space in the survey for general comments, so let me say 
here: more colors, please! I find it makes the most sense to be able to 
isolate *both* by threat level and theme, and there simply aren't enough 
colors to do that.


Colors are not just about preventing one VM from pretending to be 
another VM.


Colors also really help prevent *user error*, where you accidentally 
confuse e.g your chat window with Mom with the chat window you use for 
communicating with journalistic sources -- and end up asking Mom to get 
undercover footage from North Korea. Woops!


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YFD9hgjWUbvDtUvA%40danwin1210.me.


Re: [qubes-users] A start job is running for Start Qubes VM sys-net. FOREVER.

2021-03-16 Thread Manuel Amador (Rudd-O)

You can mask the unit in the GRUB kernel command line with the parameter:

systemd.mask=qubes-vm@sys-net.service

And then you will be able to log in and fix the kernel issue (without 
networking, of course).


You can also choose the older kernel in the GRUB menu.

On 16/03/2021 16.49, Fabrizio Romano Genovese wrote:
As the title says. I've upgraded to the latest kernel (5.11) on qubes 
4.0 and now boot is stuck. How do I get out of this? :)


Fab
--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7ba1ae0f-4037-4a47-9bf4-aa9eae652a7dn%40googlegroups.com 
.



--
Rudd-O
https://rudd-o.com/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bbc147a8-4fa0-2f74-9227-23f24b1a19ce%40rudd-o.com.


OpenPGP_signature
Description: OpenPGP digital signature


[qubes-users] ANN: Qubes arbitrary network topology

2021-03-16 Thread Manuel Amador (Rudd-O)

Hello, folks!  I'm here to share this:

https://github.com/Rudd-O/qubes-arbitrary-network-topology 



This software lets you turn your Qubes OS 4.0 machine into an arbitrary 
network topology host. It is ideal to create networks of interconnected 
VMs with arbitrary pathways between them, and minimal effort compared to 
manually setting everything up using xl attach in your dom0 as root.



   How to use

Suppose you have two VMs, which you want to be interconnected via 
(virtualized) Ethernet. VM F (for frontend) will be attached to VM B 
(for backend).


With this software, all you have to do is attach a feature 
attach-network-to onto B, like so:


# Run me on dom0 as your regular Qubes login user. qvm-features B 
attach-network-to F # You can add multiple VMs to attach to, by 
separating them with newlines like so: # [user@dom0]$ qvm-features B 
attach-network-to 'F # G # H'


And that's it. As soon as both B and F are running, network interfaces 
will appear on each one; if you set the feature while the VMs were 
running, the interfaces will appear instantly. The network interface in 
F will generally be named eth0 (or eth1 or other name increasing in 
value). The network interface in B will be named after F. IP networking 
on none of the network interfaces will be configured by the system.


From this point on, all you have to do is configure the network 
interfaces — e.g. using NetworkManager — on those two VMs, then adjust 
the firewall rules on both VMs to permit input from one VM to the other, 
or even forwarding through them. You could build a bridge, or set IP 
configuration to your liking.


Here is a sample IP configuration file for NetworkManager (to follow our 
example, stored in B under /rw/config/NM-system-connections/F.nmconnection):


[connection]
id=B
uuid=bb88cc30-1bcd-40bf-97f2-013626692bd1
type=ethernet
autoconnect-priority=-999
interface-name=F
permissions=

[ethernet]
mac-address-blacklist=

[ipv4]
address1=10.250.9.26/30
dns=10.250.7.2
dns-search=
method=manual
route1=10.250.0.0/20,127.0.0.1,1000
route2=10.250.8.0/24,10.250.9.25,1
route3=0.0.0.0/0,10.250.9.25,101

[ipv6]
addr-gen-mode=stable-privacy
dns-search=
method=disabled

[proxy]

Judicious use of the qvm-features command will allow you to have 
arbitrarily connected VMs on your system, directly testing a panoply of 
network topologies.



   How it works

A small Qubes extension running under qubesd in dom0 monitors VMs as 
they start and stop. If a VM starts and it has the attach-network-to 
feature, all VMs named in the feature will get Xen Ethernet frontends 
attached, with the backends attached to the VM that just started. The 
converse is also true — if a VM starts, and it is mentioned in the 
attach-network-to feature of another VM, the frontend is attached to the 
VM that just started, and the backend is attached to the VM with the 
feature.


It's very simple, no magic involved.


   How to install

Build the two necessary RPM packages and then install them to the 
respective VMs:


1. The qubes-arbitrary-network-topology RPM: use the command make rpm
   on a VM with the same Fedora version as your TemplateVM. Then
   install the RPM in the TemplateVM, and power off the Template VM, as
   well as any other VMs you plan to attach networking to.
2. The qubes-core-admin-addon-arbitrary-network-topology RPM: use the
   command make rpm on a VM or a chroot with the same Fedora version as
   your dom0 (that's Fedora 25 for Qubes 4.0). Then copy the RPM into
   your dom0, and install the RPM.


You should now be good to go.


   Licensing

This software is shared under the GNU GPL v2. You can find the text of 
the GNU GPL in the COPYING file distributed with the source.


--
Rudd-O
https://rudd-o.com/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8efc0a20-1105-bafe-fb45-15d3a1373ec2%40rudd-o.com.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-users] A start job is running for Start Qubes VM sys-net. FOREVER.

2021-03-16 Thread haaber

On 3/16/21 4:49 PM, Fabrizio Romano Genovese wrote:

As the title says. I've upgraded to the latest kernel (5.11) on qubes
4.0 and now boot is stuck. How do I get out of this? :)



you go back: boot a life linux, mount your UEFI partition, search for
/efi/EFI/qubes/xen.cfg or  /efi/EFI/BOOT/xen.cfg and edit the first
line, by copying one of the available kernel-names from list below. It's
straightforward. Use nano editor, for example. Crtl-k cuts a line,
crtl-u pastes it back. A second crtl-u gives a clean second copy. that
way you avoid typing errors.  good luck

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/40ac8c17-c7fe-969a-12f3-5002d8282407%40web.de.


Re: [qubes-users] Custom LAN Network with dhcpd

2021-03-16 Thread Manuel Amador (Rudd-O)

I have the treat for you!

https://github.com/Rudd-O/qubes-arbitrary-network-topology

I'm updating the readme in the next few minutes.  More info there.

On 15/03/2021 12.40, 'Nyx' via qubes-users wrote:

Hello,

I am trying to implement an internal Qubes LAN with HVMs that receive 
dhcp from a netvm using dhcpd. A classical network layout sort of 
speak. Reading Xen Networking makes it look possible but Qubes auto 
configuring the VM networking is being a bit troublesome for what I am 
trying to setup. Note that the entire network will be on Qubes only 
with no internet access.


The reason I am trying to set this up is I have some HVMs that are not 
getting an ip through dhcp and I cannot access them to set ip manually 
(they are vulnhub vms). I was thinking of just running an hvm with 
virtualbox but the limits of emulation only wont work. I read that 
qubes can be recompiled to enable nested virtualization to get that 
working but if there is a way to create a custom network that would be 
preferred.


Is there a way to allow a set of HVMs to get ip from a netvm running 
dhcp and communicate like a classic network?

--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/IUbiSSRQZ-eNLCIZh5y-81UZrPRnit3Onx2J81ZIoyhYIs0tFpNLfCPuarHsrZ2WYDKBPYpQlKCXm_-xZ5-rXJfC36oAzaMUB3Sa24YLkyk%3D%40protonmail.com 
.



--
Rudd-O
https://rudd-o.com/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b1b435e4-c2ac-17e6-f5e4-42d2d8ab64bd%40rudd-o.com.


OpenPGP_signature
Description: OpenPGP digital signature


[qubes-users] A start job is running for Start Qubes VM sys-net. FOREVER.

2021-03-16 Thread Fabrizio Romano Genovese
As the title says. I've upgraded to the latest kernel (5.11) on qubes 4.0 
and now boot is stuck. How do I get out of this? :)

Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7ba1ae0f-4037-4a47-9bf4-aa9eae652a7dn%40googlegroups.com.


[qubes-users] Survey from HackerNCoder: Colors in QubesOS

2021-03-16 Thread hackerncoder
I have created a survey about colors in Qubes, to help understand users: 
Are there too many colors? Too few? What do users associate with the 
colors? what are they used for?


Please don’t let the second page scare you away! The first one contains 
many questions which also give very valuable information to me/us.


https://survey.encryptionin.space/index.php?r=survey/index=178339=en

(It is hosted by (and created by) me)

There is also the following issue in qubes-issues for feedback and 
findings: https://github.com/QubesOS/qubes-issues/issues/6463


--
Please don't send me proprietary formats.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc81cf92-49ea-7daf-3cfb-24625b3ba007%40encryptionin.space.


OpenPGP_0x1E5E254ED4841744.asc
Description: application/pgp-keys


OpenPGP_signature
Description: OpenPGP digital signature