Re: [qubes-users] Salt Orchestration, vol.2

2020-03-17 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Tue, Mar 17, 2020 at 11:46:51AM +, Michał "rysiek" Woźniak wrote:
> Hey hey,

Hej, rysiek!

> I started diving more deeply into Salt on QubesOS, since now I have two 
> laptops
> with very similar config. One thing I'd like to use is Salt Orchestrate 
> runner:
> https://docs.saltstack.com/en/latest/topics/orchestrate/orchestrate_runner.html
> 
> My use-case is: I need to enable networking on some templates (`dom0:
> qvm.prefs`) to pull code on them (`I:qubes:type:template: git`), and then
> disable networking on those templates.
> 
> So basically, I need Salt's `require`, but working *across* minions.

I don't think that's possible. In principle Qubes' salt integration is
salt-ssh on steroids.

Relevant qrexec:
https://github.com/QubesOS/qubes-mgmt-salt/blob/master/qubes.SaltLinuxVM
Launched from:
https://github.com/QubesOS/qubes-mgmt-salt/blob/master/qubesctl
https://github.com/QubesOS/qubes-mgmt-salt/blob/master/qubessalt/__init__.py

> Seems like it's available on R4.0. Before I dive deep into trying to get it 
> into
> a functioning state (ha!), has anyone played with it? And most importantly: 
> how
> bad of an idea is it?

It is bad. There are multiple ways for this to fail for some very unrelated
reasons. My most-often encountered problem with salt is it sometimes fails to
start the mgmt dispvm for memory fragmentation reasons. So if this was
supported, the failure mode would be: enable network, do something, fail to
disable network.

Also remember that the error reporting is not that good, esp. for this case.

> Yes, I know enabling networking in templates is a Bad Idea, that's why I only
> want to do it temporarily and in a well-managed way. But yes, other ideas on 
> how
> to get this code into the templates are obviously welcome too -- I considered
> just putting it directly in my salt configs repo (that I then manually copy to
> dom0:/srv/salt/), but why would I want code that is supposed to be only 
> running
> on TemplateVMs in dom0 at all, right?

If you need *code*, you could either just push it from dom0 (since that is
where you have salt in the first place). Or, with git, you can try this:
https://github.com/woju/qubes-app-split-git.


- -- 
pozdrawiam / best regards   _.-._
Wojtek Porczyk   .-^'   '^-.
Invisible Things Lab |'-.-^-.-'|
 |  |   |  |
 I do not fear computers,|  '-.-'  |
 I fear lack of them.'-._ :  ,-'
-- Isaac Asimov `^-^-_>
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEaO0VFfpr0tEF6hYkv2vZMhA6I1EFAl5w8+4ACgkQv2vZMhA6
I1GtWg/8Ce1soJZVyuqkIamiCrb/VE1YcOLNolsHsKvyxervrFVkQ0Zo1KokI03h
qTgJ0l4D6YGaSVBxJhEcPNN1lONkJ1vQkQmxWPtXMGLEpHPJYuBjDkKxHINjSRc6
mcga0xx/EqhECUgL8+Qkij6zcAyMxwiA4KxQzYetBZlPxDqjt9J9fD98sKIPFduA
tkdM38zcSv/Y1XxkGzWbW34nn5FYjJsZF0Ki/68bjiAfcBFfWa43P1YxuebLAR/7
taEWgKolole96XSD2knegOEgLxJz4JudIiYh27kYjFt2gn5GGcsPE/kzJCwDKTXi
RCzQ/r7IXNhLMVqfQVnSYIHM8vpHWt12cc8qy7BmZHgouV/Vftvw3aXj6IJEZK8v
jgIU9mAuWhpue4tsLzHwDx/aHoHft56EkgSiqxCbPN6TuH+r0+/RbDLEdhLBglZj
DI+OSgOdpeR177e+CjI6wrPEFGnsEFu6STirXb8WOIMKglbnokT2QIVr1089whIw
mkFirRLB+3dKCTMenslFDJrpg2w2RLlcwo4k44TO3wEMh9OXhfoueOHiUDAg64KF
dinXJjW5dbrZ1i8pSoCGJrSc1jisC4I3/D7a+n1wLdPvAmbO8Qcdki81vuEE6YrI
1IsxIz9k7yR9b7g/8zhiK/vkvl6xV/w3yhmMCDMczZ3RFymdiRs=
=AWuf
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200317155943.GA1254%40invisiblethingslab.com.


Re: [qubes-users] Re: 35c3 session: Introduction to Qubes OS

2019-01-04 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sun, Dec 30, 2018 at 02:52:46AM -0800, max via qubes-users wrote:
> torsdag den 27. december 2018 kl. 12.12.36 UTC-5 skrev Wojtek Porczyk:
> > Hi qubes-users,
> > 
> > During 35th Chaos Communication Congress in Leipzig we'll be organizing an
> > introductory session to Qubes OS:
> > 
> > https://events.ccc.de/congress/2018/wiki/index.php/Session:Introduction_to_Qubes_OS
> 
> Was it recorded, so others can view it later? I cannot find it here: 
> https://media.ccc.de/c/35c3 ?

AFAIK it wasn't. It was a „self-organised session”, so there was no camera
manned by CCC staff, and no-one else would record since on the Congress the
recording people is generally frowned upon by attendees and organisers alike.


- -- 
pozdrawiam / best regards   _.-._
Wojtek Porczyk   .-^'   '^-.
Invisible Things Lab |'-.-^-.-'|
 |  |   |  |
 I do not fear computers,|  '-.-'  |
 I fear lack of them.'-._ :  ,-'
-- Isaac Asimov `^-^-_>
-BEGIN PGP SIGNATURE-
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=Es5C
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190104235938.7jmihfkxnwujzmgy%40invisiblethingslab.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] 35c3 session: Introduction to Qubes OS

2018-12-27 Thread Wojtek Porczyk
Hi qubes-users,

During 35th Chaos Communication Congress in Leipzig we'll be organizing an
introductory session to Qubes OS:

https://events.ccc.de/congress/2018/wiki/index.php/Session:Introduction_to_Qubes_OS

If you're at the CCC, please come!

-- 
pozdrawiam / best regards   _.-._
Wojtek Porczyk   .-^'   '^-.
Invisible Things Lab |'-.-^-.-'|
 |  |   |  |
 I do not fear computers,|  '-.-'  |
 I fear lack of them.'-._ :  ,-'
-- Isaac Asimov `^-^-_>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181227171228.44rsfvtfv3ncsf2m%40invisiblethingslab.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: PGP signature


[qubes-users] Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-21 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Feb 20, 2018 at 04:27:16PM +0100, Tom Zander wrote:
> On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote:
> > On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel 
> wrote:
> > > On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki 
> wrote:
> > > > We've decided to deprecate the '$' character from qrexec-related
> > > > usage.
> > > > Instead, to denote special tokens, we will use the '@' character,
> > > > which we believe is less likely to be interpreted in a special way
> > > > by the relevant software.
> > > 
> > > I would argue against the @ sign on account that it is a special
> > > character in bash as well.
> > > 
> > > I don't immediately see a way to exploit it, but why risk it?
> > 
> > We absolutely need a special character that is not allowed in qube name to
> > make the special tokens immediately obvious in policy. The process I used
> > was to list available characters (POSIX Portable Character Set [1])
> []
> > If I missed something, could you please point out? I know shell just good
> > enough to know that it's not possible to know every shell quirk. :)
> 
> The thing you have to rememeber is that the escape character never needs to 
> be typed by the user.
> In QRexec you are defining an API, applications like qvm-run are using that 
> API. What the user passes into qvm-run and what is actually sent to dom0 
> does not have to be identical.
> I guess you do the translation currently as well; '$' turns into '@' in your 
> new code.
> 
> The consequence of this is that you don't have to limit yourself to the 
> posix list.
> Using the portable characters set for a non-character simply isn't needed.
> 
> So, knowing that your API is actually based on 8-bit characters and not 7 
> bits which you are limiting yourself to, my suggestion is to take something 
> above 127 and below 256 as a special char.
> Most fun one would be “ÿ” which is a normal character you can pass on a 
> shell script if you must, its actual byte-value is 0xFF

Thank you for the suggestion, but I don't think it's correct.

The character has to be input in at least two places: in /etc/qubes-rpc/policy
as the second token (destination) on the line and as argument to
qrexec-client[-vm] executable. Using any of the common editors, any
language-specific keyboard layout, and any common encoding. Most people have
UTF-8, or ISO-8859-*, but we don't exclude the possibility to have admin qube
on Windows -- there was at least one serious attempt -- so this brings UTF-16
and Windows-125*.

As and example, may I use ÿ character you provided:
1) You're right the codepoint is U+00FF, but UTF-8 encoding is actually
"\xc3\xbf", so no, we cannot use it.
2) I don't have it on my keyboard. So anytime I have to input one of those
characters, I search all the modifiers for the right one (ý? no. ŷ? neither.
ỹ? my font has trouble with that, is that even a letter? ý? tried this one
already...). I don't have real data, but I think most people don't even know
where to start looking for this and in the optimistic case will end up
sourcing it from gucharmap or equivalent. This is bad UX.

Maybe there is a character outside portable charset that is portable and
writable enough, but I don't know of any. I haven't thought there is hope
enough to actually find one, so I didn't bother searching. That's why I've
asked.


Again, thanks for your review. I think it's helpful, because this change was
made behind community's back (for obvious reasons), fast, and in very limited
group of people. I wasn't sure if we didn't make some mistake, so the best
what I could hope for was to explain myself and get ex post facto review,
which you provided.


- -- 
pozdrawiam / best regards   _.-._
Wojtek Porczyk   .-^'   '^-.
Invisible Things Lab |'-.-^-.-'|
 |  |   |  |
 I do not fear computers,|  '-.-'  |
 I fear lack of them.'-._ :  ,-'
-- Isaac Asimov `^-^-_>
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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Re: [qubes-users] Admin API and secure of a client

2017-08-08 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Aug 08, 2017 at 07:13:51AM -0700, Nicolas Mojon wrote:
> My question may be stupid but how can I do that cause no package seems to 
> exist from repository

Those packages (.rpm and .deb, respectively) are for now in current-testing
repository. You have to change "enable=" to "1" in /etc/yum.repos.d/qubes*
and/or uncomment relevant line in /etc/apt/sources.list.d/*qubes* .

(Sorry I don't remember exact file names).

https://www.qubes-os.org/doc/software-update-vm/


- -- 
pozdrawiam / best regards   _.-._
Wojtek Porczyk   .-^'   '^-.
Invisible Things Lab |'-.-^-.-'|
 |  |   |  |
 I do not fear computers,|  '-.-'  |
 I fear lack of them.'-._ :  ,-'
-- Isaac Asimov `^-^-_>
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=tcZm
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170808152508.GF20480%40invisiblethingslab.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Admin API and secure of a client

2017-08-08 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Aug 08, 2017 at 05:23:19AM -0700, Nicolas Mojon wrote:
> Bash: qvm-ls command not found

Did you install the "qubes-core-admin-client" package?


- -- 
pozdrawiam / best regards   _.-._
Wojtek Porczyk   .-^'   '^-.
Invisible Things Lab |'-.-^-.-'|
 |  |   |  |
 I do not fear computers,|  '-.-'  |
 I fear lack of them.'-._ :  ,-'
-- Isaac Asimov `^-^-_>
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=bGwD
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170808131443.GE20480%40invisiblethingslab.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0 Alpha release date

2017-04-05 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Apr 05, 2017 at 11:50:32AM -, ei...@mail2tor.com wrote:
> If no, building Qubes 4.0 with Qubes-builer is a solution for daily use ?

It is not ready to be used yet. As of release date, I can offer no comment.

- -- 
pozdrawiam / best regards   _.-._
Wojtek Porczyk   .-^'   '^-.
Invisible Things Lab |'-.-^-.-'|
 |  |   |  |
 I do not fear computers,|  '-.-'  |
 I fear lack of them.'-._ :  ,-'
-- Isaac Asimov `^-^-_>
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=3BKw
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170405152150.GF2826%40invisiblethingslab.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4 - Walk The Talk

2017-03-08 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Mar 08, 2017 at 11:18:51AM -0500, 'Sudoyum' via qubes-users wrote:
> First of all I would like to congratulate the Qubes team and their very
> pro-active User community on creating their highly regarded Qubes OS.
> 
> As an IT professional working for a large multi-national, I have been
> following, closely, the development of Qubes for some time, with the
> ultimate intent of perhaps rolling out Qubes on an experimental basis within
> our IT Department.
> 
> As you'd expect, when we consider entering into a partnering relationships,
> our primary considerations after costs are reliability and integrity - it is
> imperative that all our partners "walk the talk". In other words, if new
> software is planned to be released on a forthcoming date, that date must be
> met. If problems exist they need to be discussed in an open and honest way
> and if necessary revised dates agreed.
> 
> I hope this short note explains what most professional Clients demand of
> their Suppliers. Keep up the good work and do your best to give us
> a reliable release date for Qubes 4.

As an IT professional working for a large multi-national, you are very much
welcome to send inquiries about any offered partnership (which would include
agreement about deliverables and their deadlines) to bussin...@qubes-os.org.
This way your enterprise needs will get proper attention. Until then, we work
on "when it will be ready" schedule, in cooperation with our open and
sometimes very honest community.


- -- 
pozdrawiam / best regards   _.-._
Wojtek Porczyk   .-^'   '^-.
Invisible Things Lab |'-.-^-.-'|
 |  |   |  |
 I do not fear computers,|  '-.-'  |
 I fear lack of them.'-._ :  ,-'
-- Isaac Asimov `^-^-_>
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=RJtW
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170308164541.GL29493%40invisiblethingslab.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Screen geometry for VMs

2016-10-04 Thread Wojtek Porczyk
On Tue, Oct 04, 2016 at 10:29:16PM +0200, Alex wrote:
> starting to buffer for ~1 minute after just 3 seconds of playback.

This seems like poor Tor circuit. Isn't this firefox in a VM connected through
sys-whonix?


-- 
pozdrawiam / best regards   _.-._
Wojtek Porczyk   .-^'   '^-.
Invisible Things Lab |'-.-^-.-'|
 |  |   |  |
 I do not fear computers,|  '-.-'  |
 I fear lack of them.'-._ :  ,-'
-- Isaac Asimov `^-^-_>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161004205150.GW5213%40invisiblethingslab.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature