Re: [qubes-users] No wired internet (Intel I219-LM) on new 4.1 install

2022-05-28 Thread M
According the doc, you don't need to do that. 
Firewall policy which is see with qvm-firewall sys-firewall:
0. tcp 443
1. dns
2. icmp
3. drop

I still can't solve the problem.
On Wednesday, 25 May 2022 at 07:18:35 UTC+3 sv...@svensemmler.org wrote:

> On 5/24/22 08:36, M wrote:
> > sys-firewall - limit traffic to * on TCP port 443.
> > I tried ping google from sys-net and sys-firewall terminal.
> > From sys-net domain+ip went through, sys-firewall only ip.
>
> * ping uses ICMP which the firewall will always let through unless you use 
> qvm-firewall
> * DNS queries are routed by Qubes OS to the netvm, which is in your case 
> sys-firewall
> * once you allow UDP port 53 in the firewall settings in sys-firewall DNS 
> should work
>
> > Updates are also not working.
>
> Well, they need DNS. ;-) ... and also Fedora will try to contact some HTTP 
> URLs
>
> If you don't want to allow HTTP in sys-firewall, you can
>
> 1. clone it to sys-update
> 2. set sys-update as updatevm and in the policy for updates
> 3. allow HTTP for sys-update
> 4. set "provides networking" to false for sys-update
>
> That means sys-update will be used as update proxy but no other qube can 
> use it as network (netvm).
>
> /Sven
>
> -- 
> public key: https://www.svensemmler.org/2A632C537D744BC7.asc
> fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63 2C53 7D74 4BC7
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/18ea6cba-e769-446d-b19f-73dfdb244073n%40googlegroups.com.


Re: [qubes-users] Problems with announced Fedora 35 templates

2022-05-28 Thread Steve Coleman
On Sat, May 28, 2022, 3:28 PM Viktor Ransmayr 
wrote:

> Hello Qubes Community,
>
> I run into a problem already in the very first step of the standard
> installation method:
>
> If I perform "sudo qubes-dom0-update qubes-template-fedora-35" in a 'dom0'
> terminal, I receive the following error msg:
>
> [vr@dom0 ~]$ sudo qubes-dom0-update qubes-template-fedora-35
> Redirecting to 'qvm-template install  fedora-35'
> [Qrexec] /bin/sh: /etc/qubes-rpc/qubes.TemplateSearch: No such file or
> directory
> ERROR: qrexec call 'qubes.TemplateSearch' failed.
> [vr@dom0 ~]$
>
> My Qubes R4.1 system so far had two 'dom0' updates, which successfully
> finished using the Qubes Updater ...
>
> If I try it manually, I always receive the following feedback:
>
> [vr@dom0 ~]$
> [vr@dom0 ~]$ sudo qubes-dom0-update
> Using sys-firewall as UpdateVM to download updates for Dom0; this may take
> some time...
> No updates available
> [vr@dom0 ~]$
>
> Any ideas on why the template is not found - and - what I should
> additionally check on my system?
>
> With kind regards,
>
> Viktor
>

I reported a similar problem a few days ago. At the time the f35 templates
were not appearing on some indexes and the devs were looking into it.

I just used a browser to download the rpm's from itl and installed them
locally.

Note : You should be using qvm-template command with R4.1, which is why the
forwarding message.

> --
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ5FDng8-XhrUHbcXVyCvedwx0Xbw2YhDa4x9oMQ0z74LSaf5g%40mail.gmail.com.


[qubes-users] Problems with announced Fedora 35 templates

2022-05-28 Thread Viktor Ransmayr
Hello Qubes Community,

I run into a problem already in the very first step of the standard 
installation method:

If I perform "sudo qubes-dom0-update qubes-template-fedora-35" in a 'dom0' 
terminal, I receive the following error msg:

[vr@dom0 ~]$ sudo qubes-dom0-update qubes-template-fedora-35
Redirecting to 'qvm-template install  fedora-35'
[Qrexec] /bin/sh: /etc/qubes-rpc/qubes.TemplateSearch: No such file or 
directory
ERROR: qrexec call 'qubes.TemplateSearch' failed.
[vr@dom0 ~]$

My Qubes R4.1 system so far had two 'dom0' updates, which successfully 
finished using the Qubes Updater ...

If I try it manually, I always receive the following feedback:

[vr@dom0 ~]$
[vr@dom0 ~]$ sudo qubes-dom0-update
Using sys-firewall as UpdateVM to download updates for Dom0; this may take 
some time...
No updates available
[vr@dom0 ~]$

Any ideas on why the template is not found - and - what I should 
additionally check on my system?

With kind regards,

Viktor

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5b11cb95-eedc-42f6-acd8-ebf77d5a3159n%40googlegroups.com.


Re: [qubes-users] Force a flatpaked application to open attachments, links etc. in a dismVM?

2022-05-28 Thread 'Johannes Graumann' via qubes-users
On Tue, 2022-05-24 at 12:35 -0400, Demi Marie Obenour wrote:
> On Tue, May 24, 2022 at 10:37:18AM +0200, Qubes OS Users Mailing List
> wrote:
> > https://www.qubes-os.org/doc/how-to-use-disposables/#making-a-particular-application-open-everything-in-a-disposable
> > states:
> > >  To do this [make a particular application open everything in a 
> > > disposable VM], enable a service named app-dispvm.X in that
> > > qube, 
> > > where X is the application ID.
> > 
> > and invokes `app-dispvm.thunderbird` as an example.
> > 
> > How would you do that for an application installes and run through
> > flatpak?
> 
> Flatpak-installed applications still have an application ID, which is
> what gets passed to qubes.StartApp to launch the application.

Thank you for your answer. Lengthy googling has dug up no answer to
what an "application ID" actually is or how to look it up. Could you
please help with that? Given a running program, how do I identify it?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/48af07c3fae3c96c5a012615641609946e29735e.camel%40graumannschaft.org.


Re: [qubes-users] Failing Salt code: out of ideas and wrong error

2022-05-28 Thread 'Johannes Graumann' via qubes-users
On Wed, 2022-05-25 at 15:08 +0100, 'unman' via qubes-users wrote:
> On Tue, May 24, 2022 at 11:54:27PM +0200, 'Johannes Graumann' via
> qubes-users wrote:
> > Can any one point me to why the following fails? I have been
> > banging my
> > head against this for a while ...
> > 
> > --- SNIP ---
> > create bind dirs config file:
> >   file.managed:
> >     - name: /rw/config/qubes-bind-dirs.d/50_user.conf
> >     - makedirs: True
> >     - mode: 644
> >     - dir_mode: 755
> > 
> > {% set binddirs = ['/usr/local'] %}
> > 
> > {% for binddir in binddirs %}
> >   configure '{{ binddir }}' to be persistent:
> >     file.replace:
> >   - name: /rw/config/qubes-bind-dirs.d/50_user.conf
> >   - pattern: "^binds+=( '{{ binddir }}' )$"
> >   - repl: "binds+=( '{{ binddir }}' )"
> >   - append_if_not_found: True
> > {% endfor %}
> > --- SNIP ---
> > 
> > The corresponding error ("State 'create bind dirs config file' in
> > SLS
> > 'custom_dom0.sys-vpn-mpihlr_assert_vpn_setup' is not formed as a
> > list")
> > is a complete red herring, as the so called first part by itself
> > works
> > just fine and only fails when I add the latter (jinja) part ...
> > 
> > How do I properly deal with the single quotes in `pattern` and
> > `repl`?
> > 
> > Thanks for any pointers.
> > 
> > Sincerely, Joh
> > 
> > 
> 
> Hi Joh
> 
> Change the closing tag on the for statement to "-%}"
> This is, I think, salt specific - according to the jinja specs it
> will remove whitespace
> Your use of single quotes in pattern and repl will be fine.
> 
> A simpler (and lazier) formulation would use file.append:
> 
> {% for binddir in binddirs %}
>   configure '{{ binddir }}' to be persistent:
>  file.append:
>    - name: /rw/config/qubes-bind-dirs.d/50_user.conf
>    - text: "binds+=( '{{ binddir }}' )"
>    - makedirs: True
> {% endfor %}
> 
> You can drop the explicit file.managed in this case.
> 
> unman

Thank you so much! Addition of the darn `-` made my problem disappear
... this one really had me pulling my hear out!

Sincerely, Joh

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/63be168de19dca02f1e7760a318f6caff6fdf2ca.camel%40graumannschaft.org.