Re: [qubes-users] Anyone gotten bitcoind to install via snapcraft on an AppVM?

2020-03-05 Thread tetrahedra via qubes-users

On Tue, Mar 03, 2020 at 11:17:53AM +, qubenix wrote:

That's true, but using a pruned bitcoind will limit its usefulness as a
backend for other software (eg. electrum servers, block explorers). You
may be able to use it for a specific purpose (eg. joinmarket), but the
point of my guides is that you can keep adding new software that comes
out (eg. btcpayserver, lnd, c-lightning, esplora) and connect it to your
bitcoind VM without having to reindex the chain.


Makes sense.

- it would be really nice to use bind-dirs to avoid creating a second 
 

Whonix WS templateVM (which takes up lots of disk space) --  
unfortunately I haven't figured out how to create a new user and keep  
that user persistent (see prior email)



This is a good point. Unfortunately I don't have a lot of extra
time/motivation currently to make sweeping changes like that. That's why
my btcpayserver branch hasn't been worked on since November.


Yes, I tried to do it (see earlier email in this thread) but it's not 
quite trivial. Bind-dir'ing /etc/passwd and related files seemed to 
break `adduser`.



It's nice to know that someone somewhere is paying attention to work
I've done with these. Thank you for that.


Thank you for doing them!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200305131523.GA1307%40danwin1210.me.


Re: [qubes-users] Manual VPN installation issues

2020-03-05 Thread tetrahedra via qubes-users

On Tue, Mar 03, 2020 at 09:18:54AM -0500, Chris Laprise wrote:
Assuming nothing's terribly wrong, it may be worth posting your public 
key fingerprint used for code signing somewhere!


The B281C952 key is a subkey of F07F1886; Import both and the former 
will be listed under the latter.


Ok, thanks for clarifying!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200305131627.GB1307%40danwin1210.me.


Re: [qubes-users] Building an X-230 into a Qubes machine.

2020-03-05 Thread tetrahedra via qubes-users

On Wed, Mar 04, 2020 at 04:51:38AM -0800, ggg...@gmail.com wrote:

As I could not afford a Privacy Beast, I bought a refurbished X-230 Core
I5, 4 GB RAM to convert on my own.  Soon I will get the 16 GB of RAM to put
into it.  I am looking to buy a ch-431a to program it from Amazon.  I know
the guys at Insurgo list on they use from China, but right now, I am not
much interested in ordering one delivered from China.   Not sure when it
would be delivered, and whether I want it into my house.


Most of these products come from China. If you use a Raspberry Pi then 
it comes from the UK, I think.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200305131754.GC1307%40danwin1210.me.


Re: [qubes-users] Why not make it possible to use a custom key combination for changing the keyboard layout when installing Qubes OS ?

2020-03-05 Thread tetrahedra via qubes-users

On Thu, Mar 05, 2020 at 03:33:54AM -0800, A wrote:

When installing Qubes OS, it’s possible to choose between some predetermined 
key combinations for changing the keyboard layout.

Why not also make it possible for the user to make his or her own key 
combination for changing the keyboard layout when installing Qubes OS ?


I still haven't figured out how to change the key combination once the 
install is complete...


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200305131950.GD1307%40danwin1210.me.


Re: [qubes-users] Obtaining genuine Qubos installer

2020-03-07 Thread tetrahedra via qubes-users

On Thu, Mar 05, 2020 at 06:33:38PM +, Mark Fernandes wrote:
By the way, I consider that I am being completely reasonable with my 
threat

model, whilst also employing critical thinking. How hard is it to go to a
large PC store, and pick at random one Linux distribution, to take home, to
better ensure you have system integrity?


Sounds like the solution is pretty easy: go to a large PC store, buy a 
PC and pick a random Linux distribution off the shelf, then use all that 
to do your verifying.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200307145241.GA1104%40danwin1210.me.


Re: [qubes-users] Why not make it possible to use a custom key combination for changing the keyboard layout when installing Qubes OS ?

2020-03-13 Thread tetrahedra via qubes-users

On Tue, Mar 10, 2020 at 11:58:21AM -0700, 'M' via qubes-users wrote:

torsdag den 5. marts 2020 kl. 14.19.59 UTC+1 skrev tetra...@danwin1210.me:


On Thu, Mar 05, 2020 at 03:33:54AM -0800, A wrote:
>When installing Qubes OS, it’s possible to choose between some
predetermined key combinations for changing the keyboard layout.
>
>Why not also make it possible for the user to make his or her own key
>combination for changing the keyboard layout when installing Qubes OS ?

I still haven't figured out how to change the key combination once the
install is complete...




You can't.

It's made as so as a security measure.


This makes no sense to me. The Qubes security model is that dom0 is assumed 
clean, and if dom0 is compromised the whole machine is compromised. How would 
making it impossible to change the key combination from dom0 improve security?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200313184016.GA2050%40danwin1210.me.


[qubes-users] Cloning a DVM: some apps don't start disposably

2020-03-27 Thread tetrahedra via qubes-users
I have a dispVM `my-dvm` where everything works as it should: if I open 
Firefox, that Firefox instance starts in a new disp VM.


I want to clone that dispVM and create a new dispVM connected to a 
different network-providing VM, so I do exactly that: clone `my-dvm` and 
set the netVM for `my-new-dvm` to `my-other-netvm`.


When I start XTerm in `my-new-dvm` the new XTerm window starts in a 
disp disposable VM, as it should.


When I start Firefox in `my-new-dvm`, however, Firefox starts up in the 
underlying `my-new-dvm` template, not in a disp disposable VM. This 
means that the Firefox browsing history and prefs are saved, any malware 
gets to persist, etc.


Comparing the output of `qvm-prefs my-new-dvm` and `qvm-prefs my-dvm`, 
all settings are identical except for things that should obviously be 
different (the netvm, the GUID, the IP address, etc).


Any idea what the problem could be?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200327090912.GA1402%40danwin1210.me.


Re: [qubes-users] Cloning a DVM: some apps don't start disposably

2020-03-31 Thread tetrahedra via qubes-users

On Fri, Mar 27, 2020 at 09:09:12AM +, tetrahedra via qubes-users wrote:
I have a dispVM `my-dvm` where everything works as it should: if I 
open Firefox, that Firefox instance starts in a new disp VM.


I want to clone that dispVM and create a new dispVM connected to a 
different network-providing VM, so I do exactly that: clone `my-dvm` 
and set the netVM for `my-new-dvm` to `my-other-netvm`.


When I start XTerm in `my-new-dvm` the new XTerm window starts in a 
disp disposable VM, as it should.


When I start Firefox in `my-new-dvm`, however, Firefox starts up in 
the underlying `my-new-dvm` template, not in a disp disposable VM. 
This means that the Firefox browsing history and prefs are saved, any 
malware gets to persist, etc.


Comparing the output of `qvm-prefs my-new-dvm` and `qvm-prefs my-dvm`, 
all settings are identical except for things that should obviously be 
different (the netvm, the GUID, the IP address, etc).


After further testing, the problem does not appear when cloning a Whonix 
workstation dispVM -- the problem only appears when cloning a 
Fedora-based dispVM.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200331213554.GA1071%40danwin1210.me.


[qubes-users] Making boot-from-CD permanent for an appVM

2020-04-19 Thread tetrahedra via qubes-users
Is it possible to make the `--drive` option for `qvm-start` permanent? 
For example, to configure a Tails AppVM with no persistency but also 
without creating a separate TemplateVM, DispVM template, and then 
DispVM.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200419102746.GA1095%40danwin1210.me.


[qubes-users] Salt worm

2020-05-05 Thread tetrahedra via qubes-users

Qubes uses Salt, and there's something nasty going around:
https://saltexploit.com/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200506055615.GA1083%40danwin1210.me.


Re: [qubes-users] Salt worm

2020-05-07 Thread tetrahedra via qubes-users

On Wed, May 06, 2020 at 02:17:15PM +0100, unman wrote:

Salt is used to provision the qubes at initial install - I'd also argue
that you *should* use salt to set up and control your templates and
qubes, since it allows you to rebuild your system automatically. No more
trying to remember what packages you installed in a template, or how you
set up a particular qube.


That sounds excellent. I've never used Salt. Is there a writeup anywhere 
explaining how to use it for setting up & controlling templates?



In Qubes, by default, there is one minion, in dom0, which isn't
networked. So there is no scope for this vulnerability to impact the salt
configuration that Qubes uses, and to undermine the security of dom0.


Great, thanks for clearing this up!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200506164258.GA2789%40danwin1210.me.


Re: [qubes-users] Salt worm

2020-05-15 Thread tetrahedra via qubes-users

On Fri, May 08, 2020 at 02:29:02PM +0100, unman wrote:

If there is a basic writeup out there with examples how to automate
tempalte setup for Qubes ... that would be really great.



I ran some training a few years back, and the notes are here:
https://github.com/unman/notes/tree/master/salt


Thanks!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200515181443.GA1086%40danwin1210.me.


Re: [qubes-users] Hallo, es kann langsam losgehen mit Qubes Deutschland Forum, sowie mit der Software Übersetzung in deutsche Sprache

2020-05-15 Thread tetrahedra via qubes-users

On Fri, May 15, 2020 at 10:27:06AM -0700, wirsindei...@gmail.com wrote:

Hallo liebe Mädels und Jungs,

das ist jetzt mein Qubes Forum in deutsche Sprache.

https://qubes-deutschland-forum.gegenseitige-hilfe.org/index.php

Bitte schaut mal rein und sagt mir, was man noch verbessern bzw. umsetzen
kann.
Ihr könnt euere Verbesserungsvorschläge hier reinschreiben.
https://qubes-deutschland-forum.gegenseitige-hilfe.org/viewforum.php?f=138


Verbesserungsvorschlag: email-liste statt Webforum! Oder mindestens 
Discourse (was beides macht)


(ich, vermutlich auch andere, finde es viel leichter Updates per Mail zu 
bekommen)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200515182324.GB1086%40danwin1210.me.


[qubes-users] A lot of dom0 updates recently

2020-06-17 Thread tetrahedra via qubes-users
dom0 seems to be getting a lot of updates at the moment (3x in the last 
1-2 weeks?) ... are there any security holes we should know about?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200617045326.GA5613%40danwin1210.me.


Re: [qubes-users] A lot of dom0 updates recently

2020-06-21 Thread tetrahedra via qubes-users

On Fri, Jun 19, 2020 at 04:41:03AM +, Logan wrote:
I've been noticing this, too. Something interesting has been occurring 
in about half of my Dom0 updates lately:



In the "details" section of the Qubes Updater it shows no detail, only:




Fairly ambiguous. Did it even update?


Same thing happening to me. Must be those NSA "ghost updates" when they 
install the backdoor :)



note to tinfoil hat crowd: JUST KIDDING (hopefully)

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200621165723.GA1138%40danwin1210.me.


Re: [qubes-users] Re: A lot of dom0 updates recently

2020-06-21 Thread tetrahedra via qubes-users

On Fri, Jun 19, 2020 at 07:28:52AM -0700, Lorenzo Lamas wrote:
Security issues are always published in Qubes Security Bulletins, which 
are

also in the News section of Qubes website.
The only recent Security Bulletin is about the new Intel CPU
vulnerabilities, but that isn't in the stable updates repository yet, so
unless you updated dom0 with testing repository, all your recent updates
are not security updates.


Thanks! Yes, I haven't seen any announcements, so that's why I was 
wondering.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200621165753.GB1138%40danwin1210.me.


Re: [qubes-users] Some questions about Electrum split wallet

2020-06-21 Thread tetrahedra via qubes-users

On Sun, Jun 21, 2020 at 03:33:57PM +, 'Totally Zoid' via qubes-users wrote:
The instructions for using Electrum split wallet on the Qubes website 
recommend installing electrum with dnf. However this gives electrum 
3.3.4, which is not the most recent version, that is 3.3.8, available 
from electrum's website. Would it be safer to install the most recent 
version from the website?


For the "hot" side of the wallet you probably want the most recent 
version. For the "cold" / offline side it should not matter.


Also does anyone know if it's possible to have a split wallet with a 
bitcoin-core own node instead of relying on electrum?


Yes, see the howto using `electrs` or Electrum Personal Server:
https://github.com/qubenix/qubes-whonix-bitcoin

Note that for real privacy you will need to use JoinMarket. I don't know 
if Qubenix takes donations but if so it's definitely worth supporting 
him for putting together such an epic HOWTO!


Another thing is that a lot of menu options in electrum lead to web 
addresses and these very frustratingly open in Firefox inside the 
electrum VM. Is there a way to force these links to open in a dispVM?


That should work the same as changing the default URL for any other 
application. I think that is already covered in the Qubes docs.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200621170258.GC1138%40danwin1210.me.


[qubes-users] Google requiring login to access qubes-users

2020-08-15 Thread tetrahedra via qubes-users
WHen I try to access the Google Groups qubes-users site, sometimes 
(circa 50%) I'm presented with a Google login prompt and can't access 
the qubes-users group unless I have a Google account.


Since Qubes is privacy-focused it seems like maybe the Qubes mailing 
lists should migrate to a less Orwellian mailing list provider.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200815193919.GA1104%40danwin1210.me.


Re: [qubes-users] Calling all humans! (from Nina)

2020-10-12 Thread tetrahedra via qubes-users

On Sun, Oct 11, 2020 at 11:42:27PM +0500, Stumpy wrote:
Thanks for this, I have filled it out and volunteered but really really 
really wanted to iterate one big (for me) point, and that is include at 
least some of the things listed in the documentation as an option in 
the setup.


Side idea: include the documentation in the base install!

And then it's easier to point to the relevant bits of the documentation 
post-install...


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20201012180112.GC1220%40danwin1210.me.


Re: [qubes-users] [unofficial] Qubes security advisory

2020-11-05 Thread tetrahedra via qubes-users

On Mon, Oct 26, 2020 at 04:04:30PM -0400, Chris Laprise wrote:

On 10/25/20 10:24 PM, 'J.M. Porup' via qubes-users wrote:

One morning last week, I launched a disposable Debian 10 template with my preset
defaults of no netvm and a blank page preset--but instead a default page of
"https://www.youtube.com/"; appeared. It only happened once, but it was enough.


So to clarify, you launched a dispVM with no networking, and a youtube 
page was loaded and rendered on screen?


That seems highly unlikely to be an accidental input or glitch.


No, he's saying the Firefox homepage in his Debian-10 template was 
changed from about:blank to youtube.com, leading the debian-10 
template-based DispVM to launch Firefox with youtube.com as the default 
page.


Ergo someone compromised his Debian-10 template and changed the Firefox 
homepage... or, there was an error in the template configuration leading 
to him accidentally changing the hompeage in what sounds like a 
stressful situation.


J.M., assuming you are indeed correct about a major attack, most of the 
major Xen vulnerabilities that threaten a Qubes full compromise involve 
sys-net. Since Five Eyes may get advance notice of Xen holes, if your 
machine was indeed fully rooted it could be you were hit by the PCI 
vulnerability from a while back.


Due to precisely these kinds of issues, there is discussion for using 
the much-harder-to-exploit OpenBSD as an operating system for the 
sys-net VM:

https://github.com/QubesOS/qubes-issues/issues/5294

You may want to give it a go (after buying a new laptop, of course).

Additionally, if a sys-net based attack is indeed a concern for your 
threat model, consider disabling wi-fi entirely and using an ethernet 
cable, wi-fi drivers are generally terrible.


Nevertheless if you are really up against serious Five Eyes type 
adversaries then it's unlikely you'll be able to keep *any* computer 
secure for long and should probably buy that cabin in the Rockies you 
always wanted...


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20201105222013.GA1107%40danwin1210.me.


[qubes-users] Opening applications using qvm-run

2021-02-27 Thread tetrahedra via qubes-users
I'm trying to figure out how to open applications in VMs from dom0 using 
qvm-run, and how to do so without blocking the terminal in dom0.


For example:
```
$ qvm-run anon "torbrowser qubes-os.org"
Running 'torbrowser qubes-os.org' on anon

```

The above command sucessfully launches Tor Browser in the `anon` VM, but 
I can't run another command in the same dom0 terminal window until Tor 
Browser (in the VM) finishes (exits).


Alternately I can do something like
```
$ qvm-run anon "gnome-terminal -- torbrowser qubes-os.org"
```
but that leaves a terminal window running in the `anon` VM.

I've also tried all the usual variations on `nohup`, `disown`, `&`, and 
the like, but none of them seem to do the trick.


Any ideas?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YDjjDMmmzJzTkk0J%40danwin1210.me.


[qubes-users] Opening applications using qvm-run

2021-02-27 Thread tetrahedra via qubes-users
I'm trying to figure out how to open applications in VMs from dom0 using 
qvm-run, and how to do so without blocking the terminal in dom0.


For example:
```
$ qvm-run anon "torbrowser qubes-os.org"
Running 'torbrowser qubes-os.org' on anon

```

The above command sucessfully launches Tor Browser in the `anon` VM, but I 
can't run another command in the same dom0 terminal window until Tor Browser 
(in the VM) finishes (exits).


Alternately I can do something like
```
$ qvm-run anon "gnome-terminal -- torbrowser qubes-os.org"
```
but that leaves a terminal window running in the `anon` VM.

I've also tried all the usual variations on `nohup`, `disown`, `&`, and the 
like, but none of them seem to do the trick.


Any ideas?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YDpUQIsYO4hJyRt4%40danwin1210.me.


Re: [qubes-users] Opening applications using qvm-run

2021-02-28 Thread tetrahedra via qubes-users

On Sat, Feb 27, 2021 at 11:57:32PM +, unman wrote:

Is this Torbrowser specific? Because it doesn't block with other
programs (or at least doesn't seem to do so for me).
On what is the "anon" qube based? How is it configured to run torbrowser
with no path?


It's not Torbrowser specific for me, that was just an example using a 
Whonix Workstation VM. (it does work as stated -- I did test it)


In actuality I want to launch specific applications (that launch fine 
using applications menu) from a dom0 script, but the only way I can find 
to launch them without blocking the script execution is using 
gnome-terminal. And that opens an extra (unneeded) terminal window.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YDuQ6zSFT31ESepY%40danwin1210.me.


Re: [qubes-users] Opening applications using qvm-run

2021-03-01 Thread tetrahedra via qubes-users

On Sun, Feb 28, 2021 at 11:49:04PM +, unman wrote:
It's not Torbrowser specific for me, that was just an example using a 
Whonix

Workstation VM. (it does work as stated -- I did test it)

In actuality I want to launch specific applications (that launch fine using
applications menu) from a dom0 script, but the only way I can find to launch
them without blocking the script execution is using gnome-terminal. And that
opens an extra (unneeded) terminal window.



Do you have the same problem with non Whonix qubes?
I dont use Whonix, and dont have this problem with any of my other
template based qubes.


Yes. But the other solution (qubes.StartApp) did the trick.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YDz2ddi0Rrp6RuLw%40danwin1210.me.


Re: [qubes-users] Opening applications using qvm-run

2021-03-01 Thread tetrahedra via qubes-users

On Sun, Feb 28, 2021 at 08:03:47PM +0100, airelemental via qubes-users wrote:

Try:

$ qvm-run --service anon qubes.StartApp+janondisttorbrowser
$ qvm-run --service untrusted qubes.StartApp+firefox
$ qvm-run --service personal qubes.StartApp+thunderbird


Thanks, that did the trick!

Two questions:

1. Is there any way to pass arguments?

2. for some applications the name I have to pass to qubes.StartApp is 
not the same as the command used on the command line (e.g 
`janondisttorbrowser` instead of `torbrowser`). How do I find out the 
correct name for an arbitrary application? is it always the same as the 
name of the .desktop file in /usr/share/applications?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YDwdXuakojz8gdV8%40danwin1210.me.


[qubes-users] Qubes AEM: write protecting BIOS is not possible

2021-03-09 Thread tetrahedra via qubes-users
The [Qubes AEM docs](https://github.com/QubesOS/qubes-antievilmaid) 
recommend:



Some hints: connect the write protect pin on BIOS flash chip to ground
(prevents attacker from booting their own software which would bypass
BIOS protections and overwrite it) and make sure physically accessing
the chip will be tamper-evident by eg. covering the screws holding
laptop body together in glitter and taking high-res photos, then
examining before each use.


However, the given suggestion will do nothing on most laptops, providing 
a false sense of security.


The reason is that many/most BIOS flash chips require the SRWD and block 
protect bits to be set **in software** before the **hardware** write 
protect pins will do anything.


Unfortunately, Flashrom does not currently support setting these bits, 
though there is an open proposal to add support:

https://github.com/flashrom/flashrom/issues/142
https://github.com/flashrom/flashrom/issues/185

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YEagdOwtmnEOZ6PR%40danwin1210.me.


Re: [qubes-users] Survey from HackerNCoder: Colors in QubesOS

2021-03-16 Thread tetrahedra via qubes-users

On Mon, Mar 15, 2021 at 10:16:04PM +, hackerncoder wrote:
I have created a survey about colors in Qubes, to help understand 
users: Are there too many colors? Too few? What do users associate with 
the colors? what are they used for?


There wasn't any space in the survey for general comments, so let me say 
here: more colors, please! I find it makes the most sense to be able to 
isolate *both* by threat level and theme, and there simply aren't enough 
colors to do that.


Colors are not just about preventing one VM from pretending to be 
another VM.


Colors also really help prevent *user error*, where you accidentally 
confuse e.g your chat window with Mom with the chat window you use for 
communicating with journalistic sources -- and end up asking Mom to get 
undercover footage from North Korea. Woops!


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YFD9hgjWUbvDtUvA%40danwin1210.me.


[qubes-users] Qubes-backup verify only verifies dom0, not appVMs

2021-08-25 Thread tetrahedra via qubes-users

When I verify my backups, it happens ~instantaneously. It used to take
hours, because it would extract every VM backup and verify it. Judging
by the logs, it's only verifying dom0.

Unless something has changed with how Qubes verifies its backups, there
may be a bug that causes verification to only check dom0, rather than
verifying the AppVMs as well.

This is really bad, because what I care about is the data in the
AppVMs... being able to restore the AppVMs is more important than being
able to restore dom0!


Here's how I back up:
```
nice qvm-backup \
--verbose \
--passphrase-file $PASSFILE \
--exclude $IGNORE_VM \
--dest-vm $DEST_VM \
--compress \
--yes \
$BACKUP_DIR
```

And here's how I restore:
```
qvm-backup-restore \
--dest-vm $DEST_VM \
--passphrase-file $PASSFILE \
--verify-only \
--verbose \
$BACKUP_FILE
```

When it starts restoring, it shows that none of my VMs will be restored,
except for dom0:
```
The following VMs are included in the backup:

+--+---+-++
   name | type |  template |   netvm |  
label |
+--+---+-++
   dom0 |  AdminVM |   n/a |   (default) |  
black |
   myvm | StandaloneVM |   n/a | my-net-vm-x | 
orange | <-- Excluded from restore
my-other-vm-xxx |AppVM | debian-10 |   (default) |   
blue | <-- Excluded from restore
  another-vm-xx |AppVM | fedora-33 |   (default) |  
green | <-- Excluded from restore
  [... continuing for the list of all VMs ...]
```

And in fact only dom0 gets verified, the others seem to be ignored.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YSYjit8%2BhYGbkJrI%40danwin1210.me.


Re: [qubes-users] Qubes-backup verify only verifies dom0, not appVMs

2021-08-26 Thread tetrahedra via qubes-users

On Wed, Aug 25, 2021 at 07:31:33AM -0700, Andrew David Wong wrote:

And in fact only dom0 gets verified, the others seem to be ignored.



I cannot seem to reproduce this. My verify-only attempts also verify 
domUs. I'm using the same qvm-backup-restore command, just without 
`--verbose`.


That's very strange. Are restore settings stored anywhere on the local
machine, like how VMs can have an "exclude from backups" option?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YSeUe5O1IEUt12if%40danwin1210.me.


Re: [qubes-users] Trezor in Qubes

2021-08-27 Thread tetrahedra via qubes-users

On Thu, Aug 26, 2021 at 02:27:35PM +, 'taran1s' via qubes-users wrote:
Hello all, I would like to start to use Trezor with my qubes. I would 
like to follow this guide here https://wiki.trezor.io/Qubes_OS. My 
intention is to use the Trezor HW wallet in a anon-whonix AppVm with 
Trezor Suite qube through Tor. I run qubes on X230 Nitropad.


I would like to check if the guide to install the Trezor Bridge and 
Udev rules in the sys-usb (see the official Trezor guide) is advised 
by qubes community or is it good practice not to install anything in 
the sys-usb and instead install the packages (bridge, udev rules and 
suite) in the target anon-whonix AppVM.


It should be fine. See my pull request for step by step instructions:
https://github.com/Qubes-Community/Contents/pull/145
https://github.com/Qubes-Community/Contents/blob/3e1785a11e90b52e086fb8b3b246e5c2de7faca5/docs/common-tasks/setup-trezor-cryptocurrency-hardware-wallet.md

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YSjVraLa/O2lQYOX%40danwin1210.me.


Re: [qubes-users] Trezor error with qubes

2021-09-04 Thread tetrahedra via qubes-users

have you seen this?
https://github.com/Qubes-Community/Contents/blob/e7443c960228c1abec9b97f2c2027dbc01f45f63/docs/common-tasks/setup-trezor-cryptocurrency-hardware-wallet.md


On Tue, Aug 31, 2021 at 02:53:47PM +, 'taran1s' via qubes-users wrote:

Hello,

In my last message I mentioned my attempts to start using the Trezor 
with qubes.


I try to follow this guide, from the official trezor website: 
https://wiki.trezor.io/Qubes_OS


I use the sys-usb based on debian-10 and tried the same with sys-usb 
based on debian-10-minimal with similar error. My online AppVM in 
anon-whonix.


After I finished the procedures described in the guide, I installed 
the trezor Bridge and Udev rules in the sys-usb, and the Trezor Suite 
in the anon-whonix, with sudo dpkg -i required-package.


Once I start both sys-usb and anon-whonix and attach the trezor-T I 
get following error (suite is seen by the sys-usb):


2021-08-31T14:38:06.967Z - ERROR(process-trezord): Status error: 
request to http://127.0.0.1:21325/ failed, reason: connect 
ECONNREFUSED 127.0.0.1:21325


Do you see any workarounds to make it work?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/753fdebf-f149-5ba4-8f24-f19802a0b525%40mailbox.org.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YTPcR2PRFOL/AjKf%40danwin1210.me.


Re: [qubes-users] Trezor in Qubes

2021-09-04 Thread tetrahedra via qubes-users

On Fri, Sep 03, 2021 at 07:54:56AM +, taran1s wrote:
Thank you for the guide. I tried to follow the official guide on 
trezor wiki, abstaining from fedora a bit more, but still erroring.


To your guide. The last 4 lines:

copy to fedora-3x

in fedora-3x sudo rpm -i /path/to/trezor.rpm

...are to be done in the fedora-3x template, right? Will it work on 
fedora-33-minimal too, or it needs to be full template?


I don't know.

All done, but I wasnt able to find any signed hash of the bridge or 
something and so I get this error:


[user@fedora-33-min-trezor ~]$ sudo rpm -i trezor-bridge-2.0.27-1.x86_64.rpm
warning: trezor-bridge-2.0.27-1.x86_64.rpm: Header V4 RSA/SHA256 
Signature, key ID b9a02a3d: NOKEY
	package trezor-bridge-2.0.27-1.x86_64 does not verify: Header V4 
RSA/SHA256 Signature, key ID b9a02a3d: NOKEY


Weird. You have to install the Trezor verification key. I had to do this
the first time I installed, but after re-imaging my system, it wasn't
necessary on the most recent install, so I took the section out of my
notes. Unfortunately I don't remember what the steps were to install the
key!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YTPfjQCizVDm8sen%40danwin1210.me.


Re: [qubes-users] Qubes-backup verify only verifies dom0, not appVMs

2021-09-13 Thread tetrahedra via qubes-users

On Thu, Aug 26, 2021 at 07:11:49AM -0700, Andrew David Wong wrote:
It's possible to create "backup profiles," but I haven't personally 
used them, so I'm not familiar with the details of how they work. This 
option is mentioned in the `--help` text for qvm-backup but not 
qvm-backup-restore.


It looks like the profiles are stored in /etc/qubes/backup/. I checked
that directory and there are no profiles, so that can't be the problem.

Unfortunately at this point I'm all out of ideas for troubleshooting
this -- even though it's a very important issue! Unverified backups are
very dangerous, and I've caught problems before because backups failed
to verify.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YT%2BOWhaS0TGZke4v%40danwin1210.me.


[qubes-users] Re: Trezor error with qubes

2021-09-25 Thread tetrahedra via qubes-users

Ah, I think I forgot to verify. You need to install the public key so
you can verify the trezor-bridge RPM file.

Unfortunately I don't remember how to do this.


On Fri, Sep 24, 2021 at 01:58:34PM +, taran1s wrote:

Dear tetrahedra,

I am just resending the email in case it didn't catch your attention 
last time.


Could you please have a look at the issue and guide me a little? I 
tried everything but wasn't able to make it run.


Thank you a ton!
taran1s

taran1s:





have you seen this?
https://github.com/Qubes-Community/Contents/blob/e7443c960228c1abec9b97f2c2027dbc01f45f63/docs/common-tasks/setup-trezor-cryptocurrency-hardware-wallet.md


Actually I did do the process based on this guide. Everything is set 
up except bridge verification. The issue is that once I download the 
bridge from https://wallet.trezor.io/#/bridge I cannot verify it 
with gpg2 --verify It returns:


[user@fedora-33-min-trezor ~]$ gpg2 --verify 
trezor-bridge-2.0.27-1.x86_64.rpm

gpg: no valid OpenPGP data found.
gpg: the signature could not be verified.
Please remember that the signature file (.sig or .asc)
should be the first file given on the command line.

If I try to use rpm directly, it returns this:

[user@fedora-33-min-trezor ~]$ sudo rpm -i 
trezor-bridge-2.0.27-1.x86_64.rpm
warning: trezor-bridge-2.0.27-1.x86_64.rpm: Header V4 RSA/SHA256 
Signature, key ID b9a02a3d: NOKEY
package trezor-bridge-2.0.27-1.x86_64 does not verify: Header 
V4 RSA/SHA256 Signature, key ID b9a02a3d: NOKEY


Fedora min template has following packages installed: gnome-keyring 
qubes-core-agent-nautilus qubes-mgmt-salt-vm-connector 
qubes-usb-proxy and of course trezor-common







On Tue, Aug 31, 2021 at 02:53:47PM +, 'taran1s' via 
qubes-users wrote:

Hello,

In my last message I mentioned my attempts to start using the 
Trezor with qubes.


I try to follow this guide, from the official trezor website: 
https://wiki.trezor.io/Qubes_OS


I use the sys-usb based on debian-10 and tried the same with 
sys-usb based on debian-10-minimal with similar error. My online 
AppVM in anon-whonix.


After I finished the procedures described in the guide, I 
installed the trezor Bridge and Udev rules in the sys-usb, and 
the Trezor Suite in the anon-whonix, with sudo dpkg -i 
required-package.


Once I start both sys-usb and anon-whonix and attach the 
trezor-T I get following error (suite is seen by the sys-usb):


2021-08-31T14:38:06.967Z - ERROR(process-trezord): Status error: 
request to http://127.0.0.1:21325/ failed, reason: connect 
ECONNREFUSED 127.0.0.1:21325


Do you see any workarounds to make it work?

--
You received this message because you are subscribed to the 
Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from 
it, send an email to qubes-users+unsubscr...@googlegroups.com.

To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/753fdebf-f149-5ba4-8f24-f19802a0b525%40mailbox.org.





--
Kind regards
taran1s

gpg: 12DDA1FE5FB39C110F3D1FD5A664B90BD3BE59B3


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YU8wtsy8Y8/P7lwX%40danwin1210.me.


[qubes-users] Whonix upgrade fails after interruption

2021-10-08 Thread tetrahedra via qubes-users

I started uprading Whonix using the salt command, but the process was
interrupted.

On retrying, it fails, unable to create the whonix WS VM due to
"permission denied". From journalctl:
Oct 08 11:24:35 dom0 qubesd[2098]: permission denied for call 
b'admin.vm.Create.AppVM'+b'whonix-ws-16' (b'dom0' → b'dom0') with payload of 31 
bytes

(see below for the salt output)

When I run the qvm-create command from the salt output manually, it also
fails, because the whonix-ws-16 template doesn't exist:
$ qvm-create --verbose whonix-ws-16-dvm --class=AppVM --template=whonix-ws-16 
--label=red
2021-10-08 11:33:54,499 [MainProcess qvm_create.main:177] app: Error creating 
VM: Got empty response from qubesd. See journalctl in dom0 for details.

I assume all this is related to the failed previous attempt.

How do I reset the state so that I can successfully do the upgrade?




[user@dom0 ~]$ sudo qubesctl state.sls qvm.anon-whonix

[WARNING ] /var/cache/salt/minion/extmods/states/ext_state_qvm.py:146: 
DeprecationWarning: BaseException.message has been deprecated as of Python 2.6
  status = Status(retcode=1, result=False, stderr=err.message + '\n')

[ERROR   ] == ['features'] ==
Virtual Machine does not exist!

== ['tags'] ==
[SKIP] Skipping due to previous failure!
[ERROR   ] == ['present'] ==
== stderr ==
/usr/bin/qvm-create whonix-ws-16-dvm --class=AppVM --template=whonix-ws-16 
--label=red
app: Error creating VM: Got empty response from qubesd. See journalctl in dom0 
for details.

== ['prefs'] ==
Virtual Machine does not exist!

== ['features'] ==
[SKIP] Skipping due to previous failure!

== ['tags'] ==
[SKIP] Skipping due to previous failure!
local:
--
  ID: template-whonix-ws-16
Function: pkg.installed
Name: qubes-template-whonix-ws-16
  Result: True
 Comment: Package qubes-template-whonix-ws-16 is already installed
 Started: 11:24:14.138294
Duration: 5796.629 ms
 Changes:
--
  ID: whonix-ws-tag
Function: qvm.vm
Name: whonix-ws-16
  Result: False
 Comment: == ['features'] ==
  Virtual Machine does not exist!

  == ['tags'] ==
  [SKIP] Skipping due to previous failure!
 Started: 11:24:19.979281
Duration: 271.503 ms
 Changes:
--
  ID: whonix-ws-update-policy
Function: file.prepend
Name: /etc/qubes-rpc/policy/qubes.UpdatesProxy
  Result: True
 Comment: File /etc/qubes-rpc/policy/qubes.UpdatesProxy is in correct state
 Started: 11:24:20.261980
Duration: 14.769 ms
 Changes:
--
  ID: whonix-get-date-policy
Function: file.prepend
Name: /etc/qubes-rpc/policy/qubes.GetDate
  Result: True
 Comment: File /etc/qubes-rpc/policy/qubes.GetDate is in correct state
 Started: 11:24:20.277092
Duration: 12.533 ms
 Changes:
--
  ID: template-whonix-gw-16
Function: pkg.installed
Name: qubes-template-whonix-gw-16
  Result: True
 Comment: Package qubes-template-whonix-gw-16 is already installed
 Started: 11:24:20.289981
Duration: 1.316 ms
 Changes:
--
  ID: whonix-gw-tag
Function: qvm.vm
Name: whonix-gw-16
  Result: True
 Comment: == ['features'] ==
  [SKIP] Feature already in desired state: ENABLE 'whonix-gw' = 
Enabled

  == ['tags'] ==
  [SKIP] All requested tags already set: 
created-by-dom0,whonix-updatevm
 Started: 11:24:20.291708
Duration: 4714.395 ms
 Changes:
--
  ID: whonix-gw-update-policy
Function: file.prepend
Name: /etc/qubes-rpc/policy/qubes.UpdatesProxy
  Result: True
 Comment: File /etc/qubes-rpc/policy/qubes.UpdatesProxy is in correct state
 Started: 11:24:25.006518
Duration: 7.468 ms
 Changes:
--
  ID: sys-net
Function: qvm.exists
  Result: True
 Comment: /usr/bin/qvm-check sys-net None
 Started: 11:24:25.014322
Duration: 2048.565 ms
 Changes:
--
  ID: sys-firewall
Function: qvm.exists
  Result: True
 Comment: /usr/bin/qvm-check sys-firewall None
 Started: 11:24:27.065077
Duration: 1868.662 ms
 Changes:
--
  ID: sys-whonix
Function: qvm.exists
  Result: True
 Comment: /usr/bin/qvm-check sys-whonix None
 Started: 11:24:28.935733
Duration: 1744.59 ms
 Changes:
--
  ID: whonix-ws-16-dvm
Function: qvm.vm
  Result: False
 Comment: == ['present'] ==
  == stderr ==
  /usr/bin/qvm-create whonix-ws-16-dvm --class=AppVM 
--template=whonix-ws-16 --label=red
  app: Error creating VM: Got empty response from qubesd. See 
journalctl in dom0 for details.

  == ['prefs'] ==
  Virtual Machine does not exist!

  

[qubes-users] qubes.TemplateSearch is missing

2022-04-29 Thread tetrahedra via qubes-users

The process of upgrading my debian-11 and fedora-34 templates to 4.1 did
not work out, and I need to reinstall those templates.

When I go to do
sudo qubes-dom0-update --action=reinstall qubes-template-debian-11

I get the error:

$ sudo qubes-dom0-update --action=reinstall qubes-template-debian-11
Redirecting to 'qvm-template reinstall  debian-11'
[Qrexec] /bin/sh: /etc/qubes-rpc/qubes.TemplateSearch: No such file or directory
ERROR: qrexec call 'qubes.TemplateSearch' failed.

Where can I get the TemplateSearch service?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YmpHNFL4o1fYfB%2BG%40danwin1210.de.


[qubes-users] Re: qubes.TemplateSearch is missing

2022-04-29 Thread tetrahedra via qubes-users

On Thu, Apr 28, 2022 at 07:51:14AM +, tetrahe...@danwin1210.de wrote:

Where can I get the TemplateSearch service?


The solution is to ensure the UpdateVM is using a 4.1-compatible
template:
https://github.com/QubesOS/qubes-issues/issues/7120

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YmpfbuBeLQneMzT1%40danwin1210.de.


Re: [qubes-users] Re: How to check that an 'in-place upgrade' from Qubes R4.0 to R4.1 was successful?

2022-06-01 Thread tetrahedra via qubes-users

On Tue, May 31, 2022 at 11:54:24PM -0700, Viktor Ransmayr wrote:

I've performed the same task today - and - the same 14 packages were
removed again ...

So it's clear now that something went wrong with my 'in-place upgrade' !

Anything that I could try, beside a completely fresh installation of Qubes
OS R4.1 ?


I've had similar issues:
https://github.com/QubesOS/qubes-issues/issues/7503

Maybe try some of the ideas suggested there?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YpfiIoiraPydfevk%40danwin1210.de.


Re: [qubes-users] Re: sys-firewall freezing on resume from suspend

2022-06-04 Thread tetrahedra via qubes-users

On Fri, Jun 03, 2022 at 04:00:20PM +0200, 'qtpie' via qubes-users wrote:
So, apparently, this is not a sys-firewall, but a clocksync issue. To 
root out any causes, I moved the clocksync service to a separate, 
brand new qube (named sys-clock). And voila: sys-firewall no longer 
'crashes' on resume from suspend, now it's sys-clock.


This should probably be filed as an issue:
github.com/QubesOS/qubes-issues

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YpssUiKTrfhVS/og%40danwin1210.de.


Re: [qubes-users] Re: whonix tor browser customization

2019-09-10 Thread tetrahedra via qubes-users

On Fri, Sep 06, 2019 at 09:00:00AM +, Patrick Schleizer wrote:

panina:

On 8/9/19 9:05 AM, Patrick Schleizer wrote:

panina:
Namely, they removed NoScript from the toolbar, so that the
NoScript cannot be used as intended.



We did not. Decision by upstream, The Tor Project.



https://forums.whonix.org/t/workstation-15-dropped-both-noscript-and-https/7733

Thanks, duly noted. Is there any chance to get them to add a setting for
this? Or re-think their decision?



It's not up to me at all. The Tor Project is the only point of contact
fo this.


Did upstream (Tor) also change the NoScript settings to block all
javascript on all sites by default, even at the lowest Tor Browser
security level?

This is what seems to be happening for me. It is a pain, since any
attempt to fix the settings goes away once the disposable Whonix VM
dies.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190908102257.GA997%40danwin1210.me.


[qubes-users] Is it safe to reinstall templates automatically again?

2019-09-11 Thread tetrahedra via qubes-users

The docs on template reinstallation indicate that QSB 050 means it is
not safe to automatically reinstall templates:
https://www.qubes-os.org/doc/reinstall-template/

However QSB 050 suggests that patches were pushed out some time ago:
https://www.qubes-os.org/news/2019/07/24/qsb-050/

Indeed `sudo qubes-dom0-update --enablerepo=qubes-dom0-security-testing`
says no new patches are available.

Does this mean that (contrary to the template reinstall docs) it is safe
to use automatic reinstallation now?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190911074607.GA2011%40danwin1210.me.


[qubes-users] Making a DispVM permanent

2019-09-21 Thread tetrahedra via qubes-users

I start working on a project with some untrusted data in a DispVM.

Then I decide the project is bigger or going to take longer than anticipated 
and I need to keep the DispVM around, so I don't lose my work prematurely.

Is there a way to turn currently-running DispVM instance into a regular 
permanent AppVM, which I can delete later?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190921112708.GA1007%40danwin1210.me.


[qubes-users] Per-VM stream isolation in Whonix

2019-09-22 Thread tetrahedra via qubes-users

Is there any way to automatically do stream isolation on a per-VM basis?

For example:

I start AppVM "A", with networking via Whonix, and interact with the
internet as "Alice"

I start AppVM "B", with networking via Whonix, and interact with the
internet as "Bob"

Naturally I want Alice to appear to be using a different IP address than
Bob, else the two identities are linked.

Right now it appears this is not necessarily the case -- the network
traffic of AppVMs A and B may end up using the same Tor circuits (and
exit nodes).

Is there a way to set this up?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190922142428.GB2032%40danwin1210.me.


Re: [qubes-users] Per-VM stream isolation in Whonix

2019-09-22 Thread tetrahedra via qubes-users

On Sun, Sep 22, 2019 at 02:51:00PM +, 'awokd' via qubes-users wrote:

tetrahedra via qubes-users:

Is there any way to automatically do stream isolation on a per-VM basis?



Right now it appears this is not necessarily the case -- the network
traffic of AppVMs A and B may end up using the same Tor circuits (and
exit nodes).

Is there a way to set this up?


Stream isolation is enabled out of the box- per application in most
cases, per tab & TLD in Tor Browser's
(https://www.whonix.org/wiki/Stream_Isolation).


I am referring to stream isolation for non-Whonix Workstation based VMs,
and/or for applications which are not wrapped by `uwt`.  (e.g Signal)

It would seem that different VMs ought to be stream isolated by default
(they are different VMs, we obviously want them isolated as much as
possible!)...

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190922160655.GA2477%40danwin1210.me.


Re: [qubes-users] using two whonix-gw instances

2019-09-26 Thread tetrahedra via qubes-users

On Wed, Sep 25, 2019 at 11:32:20PM +, 'awokd' via qubes-users wrote:

Sven Semmler:

On 9/25/19 5:26 PM, 'Jackie' via qubes-users wrote:

even different applications within the same vm, will use different tor circuits.


I know this is true of apps that come with whonix-ws, but is it the 
case for apps added later like Signal? I think you'd still be OK if 
Signal was the only thing added, but don't know about something like 
Signal and Discord in the same AppVM.


I'm fairly sure the answer is "no, stream isolation is only automatic
for apps which are wrapped by `uwt` or which otherwise take steps to be
isolated, and this just happens to be the case for most whonix-default
apps"...

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190926092207.GA1787%40danwin1210.me.


Re: [qubes-users] Per-VM stream isolation in Whonix

2019-09-28 Thread tetrahedra via qubes-users

On Fri, Sep 27, 2019 at 01:37:06PM +, Claudia wrote:
Isolating apps in the same VM is a different issue, but you're saying 
traffic from different VMs is appearing to come from the same address?


Hmm, that definitely should not be happening. VM isolation is enabled 
out of the box. Different VMs, whonix or otherwise, should never share 
circuits. IsolateClientAddr (on by default) in whonix-gw's torrc 
should isolate streams originating from different addresses/VMs, no 
matter what OS or apps they're running.


I don't see that setting in
/usr/local/etc/torrc.d/40_tor_control_panel.conf or in 50_user.conf ...
which torrc is that setting supposed to be in?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190928110536.GA1832%40danwin1210.me.


Re: [qubes-users] Per-VM stream isolation in Whonix

2019-09-30 Thread tetrahedra via qubes-users

On Sun, Sep 29, 2019 at 02:42:29PM +, Claudia wrote:
You can try viewing your active tor settings in Nyx (preinstalled in 
Whonix) rather than from torrc directly. Just in case some setting is 
being overridden or something like that. See 
https://www.whonix.org/wiki/Tor_Controller and 
https://nyx.torproject.org/#config_editor


I don't see any mention of the relevant settings at all in the "Arm tor
controller" app. Nyx does not appear to be installed at all.

On further troubleshooting it looks like separate VMs may have been
connecting to the same IP addresses (as part of checking for updates) at
the same time, and that may have been producing the effects I have seen.

IsolateSOCKSAuth appears to be working as intended.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190930141749.GA1010%40danwin1210.me.


[qubes-users] vif-route-qubes fails when setting up a 'provides network' VM

2019-09-30 Thread tetrahedra via qubes-users

I am trying to duplicate a previously-successful configuration of a
Debian based ProxyVM/'provides network' VM.

However with the new VM (call it proxy2) the client VMs are
unable to reach the proxy (ping returns 'Destination Host Unreachable').

The proxy2 VM only shows two network interfaces in the output of
`ifconfig`: eth0 and lo

The (working, older) proxy1 VM shows three network interfaces in the
output of `ifconfig: eth0, lo, and vif22.0

When I start a client VM, the following lines appear in the output of 
`journalctl` on proxy2:
Sep 30 16:08:03 proxy2 root[5360]: /etc/xen/scripts/vif-route-qubes: offline 
type_if=vif XENBUS_PATH=backend/vif/51/0
Sep 30 16:08:03 proxy2 root[5372]: /etc/xen/scripts/vif-route-qubes: Writing 
backend/vif/51/0/hotplug-error /etc/xen/scripts/vif-route-qubes failed; error 
detected. backend/vif/51/0/hotplug-status error to xenstore.
Sep 30 16:08:03 proxy2 root[5374]: /etc/xen/scripts/vif-route-qubes: 
/etc/xen/scripts/vif-route-qubes failed; error detected.

This suggests that vif-route-qubes is failing to set up the interface,
but I am not sure how to fix it.

Any suggestions?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190930143458.GB1010%40danwin1210.me.


Re: [qubes-users] Per-VM stream isolation in Whonix

2019-09-30 Thread tetrahedra via qubes-users

On Mon, Sep 30, 2019 at 08:05:44AM +, Claudia wrote:
Glad to hear it's working. I guess I should have asked at the 
beginning... What brought you to the conclusion they were using the 
same circuits? I assumed you were using check.torproject.org or 
another "what is my IP" site, but if looking at tcpdump or something, 
there are plenty of reasons they might connect to the same IP. 
Although, I think you would only see the local connection to 
sys-whonix, so I'm still not exactly sure what's going on here.


I am using the Onion Circuits GUI app to display all outgoing circuits
and their destination IPs.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191001022935.GA1014%40danwin1210.me.


Re: [qubes-users] using two whonix-gw instances

2019-09-30 Thread tetrahedra via qubes-users

On Thu, Sep 26, 2019 at 10:09:04AM -0500, Sven Semmler wrote:
My understanding is that TOR actually runs in the gateway and the the workstation(s) enable typical Qubes style compartmentalization. Meaning that if app-anon-1 is compromised, the sys-whonix and a potential app-anon-2 are not. When I create a second sys-whonix-id I can see via the Tor control panel that it uses a different Onion circuits than the first instance. 


Would it be recommended to use a separate sys-whonix gateway for
applications where one needs to expose the Tor ControlPort to AppVMs?

While the ControlPort would be protected by a password (this is
mandatory for non-local access) it seems conceivable that either:

a) the AppVM that has legitimate access (and the password) to the
ControlPort might get compromised, or

b) another AppVM (without legit access or the password) might be used to
exploit a vulnerability in the exposed ControlPort

A 2nd sys-whonix gateway for this situation would seem to reduce the
vulnerability. Or maybe I am just being paranoid?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191001025926.GA1477%40danwin1210.me.


Re: [qubes-users] vif-route-qubes fails when setting up a 'provides network' VM

2019-09-30 Thread tetrahedra via qubes-users

On Mon, Sep 30, 2019 at 04:34:58PM +0200, tetrahedra via qubes-users wrote:

I am trying to duplicate a previously-successful configuration of a
Debian based ProxyVM/'provides network' VM.

However with the new VM (call it proxy2) the client VMs are
unable to reach the proxy (ping returns 'Destination Host Unreachable').

The proxy2 VM only shows two network interfaces in the output of
`ifconfig`: eth0 and lo

The (working, older) proxy1 VM shows three network interfaces in the
output of `ifconfig: eth0, lo, and vif22.0

When I start a client VM, the following lines appear in the output of 
`journalctl` on proxy2:
Sep 30 16:08:03 proxy2 root[5360]: /etc/xen/scripts/vif-route-qubes: offline 
type_if=vif XENBUS_PATH=backend/vif/51/0
Sep 30 16:08:03 proxy2 root[5372]: /etc/xen/scripts/vif-route-qubes: Writing 
backend/vif/51/0/hotplug-error /etc/xen/scripts/vif-route-qubes failed; error 
detected. backend/vif/51/0/hotplug-status error to xenstore.
Sep 30 16:08:03 proxy2 root[5374]: /etc/xen/scripts/vif-route-qubes: 
/etc/xen/scripts/vif-route-qubes failed; error detected.

This suggests that vif-route-qubes is failing to set up the interface,
but I am not sure how to fix it.

Any suggestions?


This issue has since resolved itself.

The solution... was to reboot the whole system.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191001030738.GA1767%40danwin1210.me.


Re: [qubes-users] Per-VM stream isolation in Whonix

2019-10-02 Thread tetrahedra via qubes-users

On Mon, Sep 30, 2019 at 04:15:26PM +, Claudia wrote:
To make sure IsolateClientAddr is working (as opposed to 
IsolateSOCKSAuth), you can run


curl.anondist-orig https://check.torproject.org

in two different whonix-ws VMs at the same time, and make sure they 
output different addresses. You should also see 
check.torproject.org:443 pop up in Onion Circuits under different 
circuits. If they show up under the same circuit, or output the same 
address, then IsolateClientAddr is indeed broken.


Bonus points: try running that command twice in the **same** VM, and 
it should (usually) output the same address both times.


Both steps worked exactly as they should have. Thank you for your help!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191002113420.GA2217%40danwin1210.me.


[qubes-users] Tabs mangled when copying between AppVMs

2019-10-07 Thread tetrahedra via qubes-users

When copying from AppVM to AppVM, tabs and/or spaces often get mangled
(additional tabs/spaces inserted).

For example, if I have a block of text in one AppVM that looks like:

def my_function():
   msg = "foo"
   othermsg = "bar"
   print(msg + othermsg)


When I Ctrl-C (or Ctrl-Insert) and Ctrl-Shift-C this block of text, then
Ctrl-Shift-V and Shift-Insert it into an editor in another VM, it
sometimes comes out looking like:

def my_function():
   msg = "foo"
   othermsg = "bar"
   print(msg + othermsg)

The issue does not crop up every time. Unfortunately, I haven't been
able to figure out a pattern or logic for when it occurs vs when it does
not occur.

Any suggestions for how to stop this happening?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191007075323.GA1939%40danwin1210.me.


Re: [qubes-users] Tabs mangled when copying between AppVMs

2019-10-09 Thread tetrahedra via qubes-users

On Tue, Oct 08, 2019 at 08:26:34PM -0500, Andrew David Wong wrote:

Are you, by any chance, copying into Vi/Vim? That sort of thing happens
when you have "smart indentation" (or similar) enabled in Vim.


Ah, yes, that would explain it. Thanks!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191009100510.GA1203%40danwin1210.me.


[qubes-users] VMs refuse to start after being shut down (following latest update)

2019-10-11 Thread tetrahedra via qubes-users

After the latest round of updates I have started seeing some odd
behavior: VMs will only start once per system boot. This is rather a
problem (it makes Qubes much less usable!), should I also add it to the
Github tracker?

Further details: After a VM has been shut down, when I try to start it
again I get the notification:

"Domain MYVM has failed to start: Cannot connect to qrexec agent for 60
seconds, see /var/log/xen/console/guest-MYVM.log for details"

In the relevant file I find the following block of ugly text. The "start
job is running" part is interesting as there is a similar message when I
go to reboot the machine (which I need to do to use the VM again!)... on
shut down, it hangs at the various "stop job is running" messages (which
it rotates through) until timeout. There are also further errors which
scroll past, but which I could not note down in time.

[3.659414] intel_rapl: Found RAPL domain core
[3.659429] intel_rapl: Found RAPL domain uncore
[.[0;1;31mFAILED.[0m] Failed to start Init Qubes Services settings.
See 'systemctl status qubes-sysinit.service' for details.
[.[0;32m  OK  .[0m] Found device /dev/hvc0.
[.[0;32m  OK  .[0m] Found device /dev/xvdc1.
[.[0;1;31mFAILED.[0m] Failed to activate swap /dev/xvdc1.
See 'systemctl status dev-xvdc1.swap' for details.
[.[0;1;33mDEPEND.[0m] Dependency failed for Swap.
[.[0;1;31mFAILED.[0m] Failed to start Initialize and mount /rw and /home.
See 'systemctl status qubes-mount-dirs.service' for details.
[.[0;1;31mFAILED.[0m] Failed to start Adjust root filesystem size.
See 'systemctl status qubes-rootfs-resize.service' for details.
^M[   .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… 
progress polling (30s / n
o limit)^M.[K[  .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for 
Monitori… progress polli
ng (30s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m*  .[0m] A start job is 
running for Monitori… pro
gress polling (31s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m*   .[0m] A 
start job is running for Monitori… progress polling (31s / no 
limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for 
Monitori… progress polling (32s / no limit)^M.[K[.[0m.[0;31m* .[0m] A start 
job is running for Monitori… progress polling (33s / no 
limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for 
Monitori… progress polling (33s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m* 
  .[0m] A start job is running for Monitori… progress polling (34s / no 
limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m*  .[0m] A start job is running for 
Monitori… progress polling (34s / no limit)^M.[K[  
.[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… 
progress polling (35s / no limit)^M.[K[   .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A 
start job is running for Monitori… progress polling (36s / no limit)^M.[K[
.[0;31m*.[0;1;31m*.[0m] A start job is running for Monitori… progress polling 
(36s / no limit)^M.[K[ .[0;31m*.[0m] A start job is running for Monitori… 
progress polling (37s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m] A start job 
is running for Monitori… progress polling (37s / no limit)^M.[K[   
.[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… 
progress polling (38s / no limit)^M.[K[  .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A 
start job is running for Monitori… progress polling (38s / no limit)^M.[K[ 
.[0;31m*.[0;1;31m*.[0m.[0;31m*  .[0m] A start job is running for Monitori… 
progress polling (39s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m*   .[0m] A 
start job is running for Monitori… progress polling (40s / no 
limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for 
Monitori… progress polling (40s / no limit)^M.[K[.[0m.[0;31m* .[0m] A start 
job is running for Monitori… progress polling (41s / no 
limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for 
Monitori… progress polling (41s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m* 
  .[0m] A start job is running for Monitori… progress polling (42s / no 
limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m*  .[0m] A start job is running for 
Monitori… progress polling (43s / no limit)^M.[K[  
.[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… 
progress polling (43s / no limit)^M.[K[   .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A 
start job is running for Monitori… progress polling (44s / no limit)^M.[K[
.[0;31m*.[0;1;31m*.[0m] A start job is running for Monitori… progress polling 
(44s / no limit)^M.[K[ .[0;31m*.[0m] A start job i:

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191011154426.GA1244%40danwin1210.me.


Re: [qubes-users] VMs refuse to start after being shut down (following latest update)

2019-10-11 Thread tetrahedra via qubes-users

On Fri, Oct 11, 2019 at 05:44:26PM +0200, tetrahedra via qubes-users wrote:

After the latest round of updates I have started seeing some odd
behavior: VMs will only start once per system boot. This is rather a
problem (it makes Qubes much less usable!), should I also add it to the
Github tracker?

Further details: After a VM has been shut down, when I try to start it
again I get the notification:

"Domain MYVM has failed to start: Cannot connect to qrexec agent for 60
seconds, see /var/log/xen/console/guest-MYVM.log for details"


Key discovery: when I updated Qubes, around the same time I decreased
the starting memory for some VMs to 200MB (from 400MB), and only those
VMs were affected by this issue.

Solution: raise the starting memory back to 400MB.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191012034520.GA1020%40danwin1210.me.


[qubes-users] How to set template-wide gnome-terminal default profile?

2019-10-11 Thread tetrahedra via qubes-users

Common scenario:
1) create new appVM
2) open terminal
3) "oh no, the color scheme and font and terminal settings are all wrong"
4) spend some time clicking around in menus fixing it

Is there a way to create a template-wide default gnome-terminal profile?

(The terminal profile that I set in the template is not propagated to
appVMs based on that template)

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191012034803.GB1020%40danwin1210.me.


Re: [qubes-users] How to set template-wide gnome-terminal default profile?

2019-10-14 Thread tetrahedra via qubes-users

On Sun, Oct 13, 2019 at 01:39:42PM +0100, unman wrote:


The settings are stored in .config/dconf
Configure the template.
Copy .config/dconf to /etc/skel in the template.
Now every new appVM you create will inherit your configuration.


Perfect, just what I wanted.

Added an issue to get this put in the community docs:
https://github.com/Qubes-Community/Contents/issues/73

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191014132708.GA2138%40danwin1210.me.


[qubes-users] `sanity-squashfs` available and removed notifications

2019-10-15 Thread tetrahedra via qubes-users

Dom0 device notifications (same style as when attaching a USB stick)
keep popping up, along the lines of:

/tmp/sanity-squashfs-290* (deleted) is available
/tmp/sanity-squashfs-290* (deleted) is removed

As far as I know there is no update process running in the background.
journalctl in dom0 doesn't show anything useful either. 


Does anyone know what this is?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191016033119.GA1665%40danwin1210.me.


[qubes-users] Fixing a VM's botched grub install

2019-10-16 Thread tetrahedra via qubes-users

As a result of some issues in a standaloneVM (debian-9), I ended up
using the Xen hypervisor serial console to migrade to debian-9-testing --
part way.

Sadly the hypervisor console does NOT support curses-style modal dialog
boxes, and the process of updating GRUB involves navigating one of
these. I did my best, but I do not think it worked.

I have included a copy of the console output at the end of this message
for reference.

Now when I do `sudo file -s /dev/xvda[1..3]` I do not see any grub
installation, and running `grub-emu` also suggests that the system will
not recover from being rebooted: it is all "error: no such device" and
"error: can't find command `linux`" and "error: can't find command
`initrd`"...

Unfortunately the Qubes documentation does not really describe what kind
of bootloader Qubes expects to find on VM images, nor where it expects
to find them.

Any suggestions?



Console output:

.[1;23r.[4l.)0.[m.(B.[1;23r.[H.[J.[1;1HPackage configuration.[6;20H.[1K ┌───┤ Configuring grub-pc ├───┐.[7;20H.[1K │ GRUB 
install devices:.[15C│.[8;20H.[1K │.[37C│.[9;20H.[1K │[.[7m .[m.(B] /dev/xvda (21223 MB; ???)│.[10;20H.[1K │[ ] /dev/xvdb 
(4349 MB; ???).[5C│.[11;20H.[1K │[ ] /dev/xvdc (10737 MB; ???)│.[12;20H.[1K │[ ] /dev/xvdd (524 MB; ???).[6C│.[13;20H.[1K 
│[ ] /dev/xvda3 (21010 MB; ???)   │.[14;20H.[1K │.[37C│.[15;20H.[1K │.[37C│.[16;20H.[1K │.[15C.[18C│.[17;20H.[1K 
│.[37C│.[18;20H.[1K └─┘.[9;30H.[9;27H .[10;27H.[7m .[10;30H.[10;27H.[m.(B .[11;27H.[7m 
.[11;30H.[11;27H.[m.(B .[12;27H.[7m .[12;30H.[12;27H.[m.(B .[13;27H.[7m .[13;3.[1;23r.[4l.)0.[m.(B.[1;23r.[H.[J.[1;1HPackage 
configuration.[3;2H┌──┤ Configuring grub-pc ├──┐.[4;2H│.[75C│.[5;2H│ You chose not to 
install GRUB to any devices. If you continue, the boot   │.[6;2H│ loader may not be properly configured, and when this computer 
next.[8C│.[7;2H│ starts up it will use whatever was previously in the boot sector. If.[6C│.[8;2H│ there is an earlier version of GRUB 
2 in the boot sector, it may be.[7C│.[9;2H│ unable to load modules or handle the current configuration 
file..[10C│.[10;2H│.[75C│.[11;2H│ If you are already using a different boot loader and want to carry on.[5C│.[12;2H│ doing so, or if 
this is a special environment where you do not need a.[5C│.[13;2H│ boot loader, then you should continue anyway. Otherwise, you 
should.[7C│.[14;2H│ install GRUB somewhere..[51C│.[15;2H│.[75C│.[16;2H│ Continue without installing 
GRUB?.[41C│.[17;2H│.[75C│.[18;2H│.[20C.[23C.[7m.[23C.[m.(B│.[19;2H│.[75C│.[20;2H└───┘.[18;52H.[18;23H.[7m.[23C.[m.(B.[23C.[18;24.[23C.[7m.[23C.[18;52H.[18;23H.[23C.[m.(B.[23C.[18;24H.[2Generating
 grub configuration file ...

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191017041105.GA3805%40danwin1210.me.


Re: [qubes-users] Fixing a VM's botched grub install

2019-10-17 Thread tetrahedra via qubes-users

On Thu, Oct 17, 2019 at 04:58:00AM +, 'awokd' via qubes-users wrote:

In Qube Settings, is the kernel set to None? If not, it boots from a
kernel provided by Qubes anyways so you don't need grub in that case. It
might be a good idea to qvm-copy out anything you need while you still
can, in case you can't get it to boot up again. Also try "sudo
grub-install /dev/xvda" if your kernel is set to none.


No, kernel is set to the default value. Looks like I'm safe then!
Backups have already been made :)

Thanks!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191017064043.GA4554%40danwin1210.me.


Re: [qubes-users] Fixing a VM's botched grub install

2019-10-18 Thread tetrahedra via qubes-users

On Thu, Oct 17, 2019 at 01:06:24PM -0700, Jin-oh Kang wrote:

This is what I see from your output:

https://asciinema.org/a/2sMvgiISVELkjTxAjDlfoNP5Z


That's really cool!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191019035452.GA1016%40danwin1210.me.


Re: [qubes-users] Fixing a VM's botched grub install

2019-10-18 Thread tetrahedra via qubes-users

On Thu, Oct 17, 2019 at 01:24:00PM -0700, Jin-oh Kang wrote:

The escape sequence crippling is caused by 
https://github.com/QubesOS/qubes-vmm-xen/blob/xen-4.8/patch-tools-xenconsole-replace-ESC-char-on-xenconsole-outp.patch
 , which is reasonable given the Qubes security model.

For interactive console you could use `qvm-console-dispvm ` provided by 
the qubes-core-admin package.


I wish I had seen that tool earlier! Here's a PR for the community docs:

https://github.com/Qubes-Community/Contents/pull/74

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191019044205.GB1016%40danwin1210.me.


Re: [qubes-users] Fixing a VM's botched grub install

2019-10-20 Thread tetrahedra via qubes-users

On Sun, Oct 20, 2019 at 01:28:29PM +0900, Jin-oh Kang wrote:

I'll submit the correction PR when I get to have some free time for it. I
apologize for not having made this clear. Meanwhile if you'd like to do it
instead -- since you're also the author of the article -- then I'd
appreciate it ;)


awokd beat us to it. But please do submit a more in-depth explanation
when you get a moment!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191020195710.GA4476%40danwin1210.me.


[qubes-users] whonix-ws-15-dvm terminal opens in template

2019-10-21 Thread tetrahedra via qubes-users

Expected behavior:

choosing "Disposable: whonix-ws-15 dvm" | Xfce Terminal from the
applications menu opens a terminal window in a new DispVM


Actual behavior:

terminal opens in the whonix-ws-15-dvm template (equivalent to qvm-run
-a)

did I miss something somewhere, or is this a bug?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191021131528.GA1622%40danwin1210.me.


Re: [qubes-users] whonix-ws-15-dvm terminal opens in template

2019-10-21 Thread tetrahedra via qubes-users

On Tue, Oct 22, 2019 at 12:09:27AM +, 'Jackie' via qubes-users wrote:

Is the appmenus-dispvm feature turned on for the dvm template?

qvm-features dvm-template-name appmenus-dispvm 1

https://www.qubes-os.org/doc/disposablevm-customization/


Tor Browser opens in a DispVM (only xfce-terminal opens in the template)
and `qvm-features dvm-template-name` returns
appmenus-dispvm 1

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191022040833.GA2748%40danwin1210.me.


[qubes-users] Activating FDE on lid close

2019-10-24 Thread tetrahedra via qubes-users

From Ratliff's "The Mastermind":


"...they were told to close the computer immediately. The TrueCrypt
software would be activated as soon as the laptop lid was shut."

While most Qubes users are probably not interested in starting global
criminal empires, this specific idea seems useful enough.

Currently there is no option in Xfce Power Manager to shut down the
laptop entirely, and "hibernate" is not supported by Xen.

Is there another way to ensure FDE gets fully enabled when the laptop
lid is shut?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191024131738.GA6294%40danwin1210.me.


Re: [qubes-users] Activating FDE on lid close

2019-10-31 Thread tetrahedra via qubes-users

On Thu, Oct 31, 2019 at 11:47:31AM +, Claudia wrote:
There is also the possibility of a physical attacker booting their 
own OS that pretends to be your FDE lock prompt as a way to steal 
your passphrase.


This all depends on the scenario. Specifically, it assumes an evil 
maid attack, where the machine is compromised and then used by the 
rightful user again. There are other scenarios where the idea would be 
useful. Consider if your suspended laptop is just simply stolen by 
your local county police (who don't know how to mount a real evil maid 
attack but can perform a cold boot attack). There's a big difference 
between the key being in RAM or not.


The original scenario is that the user shuts the laptop lid knowing that
an adversary is about to take control of the machine. In this case, an
evil maid attack is not really an issue... by the time the user gets the
laptop back, the old infosec adage "nuke it from orbit, it's the only
way to be sure" is liable to apply.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191101063853.GA2577%40danwin1210.me.


Re: [qubes-users] Using Mullvad VPN in Qubes

2019-11-02 Thread tetrahedra via qubes-users

On Fri, Nov 01, 2019 at 06:36:20PM -0400, 'Micah Lee' via qubes-users wrote:

In case anyone is interested, I just wrote a blog post about how I
configure Mullvad in Qubes, using NetworkManager, a script to
auto-connect, and the Qubes firewall.

https://micahflee.com/2019/11/using-mullvad-in-qubes/


Any reason you didn't use qubes-vpn-support?

https://github.com/tasket/Qubes-vpn-support

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191102091923.GA4590%40danwin1210.me.


[qubes-users] Days since last backup

2019-11-20 Thread tetrahedra via qubes-users

The built-in Qubes backup functionality is great but it's very easy to
forget to run a backup and end up going days (or weeks, or months...)
without it.

MacOS has a handy feature where it will remind you if it has been more
than 10 days since your last backup.

This would be great to have in Qubes. And it shouldn't be that hard to
run a daily cron job that pops up a notification if there hasn't been a
backup for a while.

However, I am stuck on how to determine how many days it has actually
been since the last backup.

Potential options:
1) Assume all backups are done by a shell script, and that shell script
somehow saves the date to disk. How do we do this in an easy-to-parse
way?

2) Assume backups may happen by command line or GUI (assume we don't
know). Where can we find the date of the last backup on disk, and parse
it into an integer value that can be checked by a notification script?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191121031225.GA9484%40danwin1210.me.


Re: [qubes-users] Days since last backup

2019-11-21 Thread tetrahedra via qubes-users

On Thu, Nov 21, 2019 at 10:04:59AM -0500, Steve Coleman wrote:

However, I am stuck on how to determine how many days it has actually
been since the last backup.


What you are looking for is this command:

qvm-prefs --get $vm backup_timestamp


Perfect, thank you!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191122014408.GA10869%40danwin1210.me.


[qubes-users] AppVM stuck as disposable in menu

2019-11-24 Thread tetrahedra via qubes-users

After creating an AppVM, I experimented with making it (the basis of) a
disposable VM, but then un-did the settings and went back to using it as
a regular AppVM.

Unfortunately it's still showing up in the applications launcher menu as
a Disposable VM, and the menu items no longer work for running the VM.

If I do `qvm-run VMNAME gnome-terminal` then the VM starts and
everything is fine.

I've been through all the documentation related to making an AppVM into
a disposable VM and the settings all *seem* to have been correctly
reverted. I just can't figure out why the menu entries are still wrong.

Does anyone have any ideas what could be wrong?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191124132205.GA3685%40danwin1210.me.


Re: [qubes-users] Days since last backup

2019-11-25 Thread tetrahedra via qubes-users

On Thu, Nov 21, 2019 at 04:12:25AM +0100, tetrahedra via qubes-users wrote:

The built-in Qubes backup functionality is great but it's very easy to
forget to run a backup and end up going days (or weeks, or months...)
without it.

MacOS has a handy feature where it will remind you if it has been more
than 10 days since your last backup.

This would be great to have in Qubes.


I've created a script and user-mode anacrontab to automatically remind
the user if it's been more than N days since the last backup.

Are the qubes-community-docs the best place to document this, or is
there a better place for things that involve scripts?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191126042654.GA5378%40danwin1210.me.


[qubes-users] Modern laptops, Intel ME, and AEM

2019-11-27 Thread tetrahedra via qubes-users

On Tue, Nov 26, 2019 at 01:05:08PM -0800, Lambda wrote:

Lenovo's 2019 laptop is currently on sale and their CPU selection[1]
includes:
- i7-9750H: no vPro, No Out-of-Band Systems Management
- i7-9850H: vPro, Intel ME Disabled


[--]


I'm aware that for AEM support I would need to have ME and TXT 1.2. But
those CPUs have TPM 2.x


What's the state of modern laptops when it comes to disabling ME and/or
using anti-evil-maid features?

The Lenovo X1 Carbon Gen 6 is "unofficially" the standard for Qubes
developers, but only the (much older) X230 supports the HEADS
Anti-Evil-Maid solution (which is different from Qubes AEM, and
apparently better).

(Coreboot is not supported on the Carbon Gen 6 as far as I know)

Similarly I've read that the X230 is the last laptop where it's
reasonable to disable Intel ME, but the above email suggests even much
newer laptops are available without ME.

For users who care about hardware security, do any modern laptops offer
the capabilities of the older ones, or is "an upgrade necessarily a
downgrade" in this case?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191127110801.GA7404%40danwin1210.me.


[qubes-users] Shutting down a VM when applications close

2019-11-27 Thread tetrahedra via qubes-users

DispVMs shut down automatically when the launched application closes.

Is it possible to enable this for certain applications in certain AppVMs
as well?

For example I may not want my "resource-heavy-apps-vm" to keep running
after MemoryHungryApp closes, because that ties up half my system RAM.

How would I configure "resource-heavy-apps-vm" to shutdown automatically
when MemoryHungryApp closes?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191127125250.GA7681%40danwin1210.me.


Re: [qubes-users] Shutting down a VM when applications close

2019-11-27 Thread tetrahedra via qubes-users

On Wed, Nov 27, 2019 at 08:16:28AM -0500, Steve Coleman wrote:

You can try this trick when starting your app/vm:

dom0> qvm-run -a AppVM "resource-heavy-app;shutdown -h now"

When the application closes the next command in line is the shutdown 
command, and the VM will simply exit. As long as the app does not 
background itself by forking a new process to demonize this will 
likely work.


If in testing that command works for you, then you can create a 
specialized AppVM.desktop file, and set the Exec= entry to 
"resource-heavy-app;shutdown -h now". Once that is done then add that 
custom desktop file to your template VM in /usr/share/applications and 
you should then be able to add the application directly to your qubes 
menu for that specific VM.


Thanks!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191128020742.GA1253%40danwin1210.me.


[qubes-users] Making NetVMs follow their AppVMs

2019-11-27 Thread tetrahedra via qubes-users

If I have a NetVM, called my-vpn-vm, that provides network to my-app-vm,
my-vpn-vm will automatically start when I launch an application from
my-app-vm.

However, when my-app-vm shuts down, my-vpn-vm will stay running.

Is there any way to:
a) automatically shut down a NetVM when there are no more VMs connected
to it?

or

b) automatically shut down a VM when a specific other VM is no longer
running?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191128073150.GA2454%40danwin1210.me.


Re: [qubes-users] Re: Shutting down a VM when applications close

2019-11-29 Thread tetrahedra via qubes-users

On Fri, Nov 29, 2019 at 11:03:49AM +, lik...@gmx.de wrote:

On 2019-11-27 12:52, tetrahedra via qubes-users wrote:

DispVMs shut down automatically when the launched application closes.

Is it possible to enable this for certain applications in certain AppVMs
as well?

For example I may not want my "resource-heavy-apps-vm" to keep running
after MemoryHungryApp closes, because that ties up half my system RAM.

How would I configure "resource-heavy-apps-vm" to shutdown automatically
when MemoryHungryApp closes?



You could also use a feature of qubes to shutdown a VM after a certain time. 
You can find steps to enable it to a particular vm in this thread:
https://groups.google.com/forum/#!topic/qubes-users/lyABSZGmKdM

Now it also works for debian templates.


Great!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191130015932.GA3362%40danwin1210.me.


Re: [qubes-users] Fedora 29 has reached EOL

2019-11-29 Thread tetrahedra via qubes-users

On Fri, Nov 29, 2019 at 04:17:39AM -0600, Andrew David Wong wrote:

Please note that no user action is required regarding the OS version in
dom0. For details, please see our Note on dom0 and EOL. [6]


There have been a lot of dom0 updates recently. Is this related to EOL?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191130023731.GA3570%40danwin1210.me.


[qubes-users] What's the logic behind many similar templates?

2019-11-29 Thread tetrahedra via qubes-users

By default Qubes comes with two templates for AppVMs: a Debian template
and a Fedora one.

But many people seem to clone templates, so they also have an e.g
"fedora-minimal" template or a "-multimedia" one or any number of other
variations.

Why not just have "one template to rule them all" for each distribution
(Fedora and Debian)?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191130061640.GA3966%40danwin1210.me.


Re: [qubes-users] Fedora 29 has reached EOL

2019-11-29 Thread tetrahedra via qubes-users

On Fri, Nov 29, 2019 at 11:58:03PM -0600, Andrew David Wong wrote:

No, those were not related to EOL.

P.S. -- Please do not write to both lists.


Ok thanks. Sorry for sending to both, I hit "reply all" and didn't look
at the result.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191130065248.GB3966%40danwin1210.me.


Re: [qubes-users] AppVM stuck as disposable in menu

2019-12-02 Thread tetrahedra via qubes-users

On Mon, Nov 25, 2019 at 03:20:16AM +0100, tetrahedra via qubes-users wrote:

After creating an AppVM, I experimented with making it (the basis of) a
disposable VM, but then un-did the settings and went back to using it as
a regular AppVM.

Unfortunately it's still showing up in the applications launcher menu as
a Disposable VM, and the menu items no longer work for running the VM.

If I do `qvm-run VMNAME gnome-terminal` then the VM starts and
everything is fine.

I've been through all the documentation related to making an AppVM into
a disposable VM and the settings all *seem* to have been correctly
reverted. I just can't figure out why the menu entries are still wrong.

Does anyone have any ideas what could be wrong?


The solution turned out to be:
qvm-features --unset VMNAME appmenus-dispvm

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191203051616.GA1429%40danwin1210.me.


Re: [qubes-users] Activating FDE on lid close

2019-12-07 Thread tetrahedra via qubes-users

On Fri, Nov 01, 2019 at 07:38:53AM +0100, tetrahedra via qubes-users wrote:

The original scenario is that the user shuts the laptop lid knowing that
an adversary is about to take control of the machine. In this case, an
evil maid attack is not really an issue... by the time the user gets the
laptop back, the old infosec adage "nuke it from orbit, it's the only
way to be sure" is liable to apply.


It looks like someone has figured out how to encrypt the laptop on lid
suspend, which is fairly close to the original goal:
https://github.com/QubesOS/qubes-issues/issues/2890

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191208032843.GA1049%40danwin1210.me.


[qubes-users] sys-net keeps dying

2019-12-08 Thread tetrahedra via qubes-users

see the corresponding issue:
https://github.com/QubesOS/qubes-issues/issues/5508

The tldr is that ever since I upgraded to fedora-30, sys-net has started
dying intermittently (or less intermittently, nearly every time) I put
my laptop to sleep.

This is really problematic.

I am wondering if it would make sense to re-create sys-net from scratch.
Could it be that this is something from fedora-29 that is not working
well with fedora-30?

There doesn't seem to be much documentation on how to do this. One post
suggests you just create a new VM and call it sys-net:
https://www.reddit.com/r/Qubes/comments/amvkz3/how_to_create_net_and_firewall_again_with_default/efpl5i2/

However that doesn't seem right, isn't something extra needed to get
the NetworkManager wifi menu widget set up?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191208195653.GA1977%40danwin1210.me.


Re: [qubes-users] Dom0 screencapture with cron

2019-12-09 Thread tetrahedra via qubes-users

On Thu, Nov 28, 2019 at 09:13:22AM -0800, hoff8h...@gmail.com wrote:

I'm just running through some ideas. Something every hour is a little much,
but I would like to take a screenshot of the whole window after a script is
run. Still the same question.


It's not quite capturing screenshots, but here's a quick script I use to
keep track of what I'm doing at regular intervals, logging the current
time and active window name to a log file:

#!/bin/bash
TZ='UTC-0'; export TZ
LOGFILE="time.log"
INTERVAL=300  # 5 minutes
{
   while :
   do
   date
   xdotool getwindowname $(xdotool getactivewindow)
   sleep $INTERVAL
   done
} | tee $LOGFILE

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191209110902.GA2944%40danwin1210.me.


Re: [qubes-users] Days since last backup

2019-12-09 Thread tetrahedra via qubes-users

On Tue, Nov 26, 2019 at 05:26:54AM +0100, tetrahedra via qubes-users wrote:

I've created a script and user-mode anacrontab to automatically remind
the user if it's been more than N days since the last backup.

Are the qubes-community-docs the best place to document this, or is
there a better place for things that involve scripts?


Put in a PR for qubes-community-docs, in case anyone wants to review and
merge it.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191209111246.GB2944%40danwin1210.me.


Re: [qubes-users] sys-net keeps dying

2019-12-10 Thread tetrahedra via qubes-users

On Thu, Dec 05, 2019 at 03:05:42PM +, Claudia wrote:

I am wondering if it would make sense to re-create sys-net from scratch.
Could it be that this is something from fedora-29 that is not working
well with fedora-30?


Did you keep the fedora 29 template installed? If so, I think you 
could just change the template back to 29 for sys-net and see if that 
fixes it. If not, perhaps you could downgrade it, or try explicitly 
installing the fedora 29 template.


No, I just deleted the fedora-29 template recently, not realising it
might be the root of the issue :/




There doesn't seem to be much documentation on how to do this. One post
suggests you just create a new VM and call it sys-net:
https://www.reddit.com/r/Qubes/comments/amvkz3/how_to_create_net_and_firewall_again_with_default/efpl5i2/


However that doesn't seem right, isn't something extra needed to get
the NetworkManager wifi menu widget set up?



Not that I know of. As far as I know, system tray icons are just like 
a regular window, in that any VM can create them without any special 
configuration, and they're colored according to the VM. So when you 
start NetworkManager it should just appear in the tray.


I don't know anything about that guide, but it may be worth trying. 
You can create a new VM called sys-net2 or whatever so you don't have 
to overwrite your existing sys-net. Then just create a temporary AppVM 
with sys-net2 as its NetVM to test it.


I did create sys-net2 and NetworkManager started automatically (no
configuration needed!) and connected to wifi.

However, when I try to configure sys-firewall to use sys-net2 instead of
sys-net for networking, I get the error:
ERROR Basic tab: Failed to access 'netvm' property

I have sys-net2 set up in HVM mode, with "provides network" checked in
the Advanced tab, the NICs configured in Devices, etc.

Other than that the only option I can think of is to debug your 
current sys-net and fix whatever is causing it to crash. Check 
/var/log/qubes, /var/log/xen, and `xl dmesg`.


I did find some relevant log entries, but I'm not sure how to interpret
them. I will post to the relevant Github issue about this:
https://github.com/QubesOS/qubes-issues/issues/4658

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191210081042.GA4088%40danwin1210.me.


Re: [qubes-users] sys-net keeps dying

2019-12-12 Thread tetrahedra via qubes-users

On Wed, Dec 11, 2019 at 11:46:04AM +, 'awokd' via qubes-users wrote:

This should work, but make sure sys-firewall is shutdown before
attempting to change. If it still isn't, try changing with qvm-prefs
sys-firewall.


Ok, I didn't realize sys-firewall had to be shutdown. Most of the time
you can change a VM's networking without shutting it down first... in
any case, once sys-firewall was off, changing networking worked fine.

Unfortunately, creating a new sys-net does not appear to have fixed the
issue, crashes still occur.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191212041425.GA5975%40danwin1210.me.


[qubes-users] Mike's emails

2019-12-12 Thread tetrahedra via qubes-users

On Thu, Dec 12, 2019 at 05:23:47PM +, Mike Keehan wrote:

Qubes won't help in this situation - see
https://www.qubes-os.org/doc/disposablevm/#disposablevms-and-local-forensics

They recommend using Tails for this type of situation.

Mike.


I am getting very many duplicate copies of Mike's emails, but only of
emails from Mike. Is this happening to anyone else?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191213023409.GA6832%40danwin1210.me.


Re: [qubes-users] Mike's emails

2019-12-13 Thread tetrahedra via qubes-users

On Fri, Dec 13, 2019 at 08:59:16AM +0100, David Hobach wrote:

I am getting very many duplicate copies of Mike's emails, but only of
emails from Mike. Is this happening to anyone else?


Probably because he clicked "reply all" on one of your questions like 
I just did.


No, when that happens (as it does with everyone who replies-all to my
emails) I only get 2 messages. However I currently have 15 copies of
Mike's "Qubes won't help in that situation" email...!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191213230930.GA1701%40danwin1210.me.


[qubes-users] sys-net interfaces

2019-12-21 Thread tetrahedra via qubes-users

I haven't been able to find any documentation for what network
interfaces sys-net is expected to expose internally. If I want to create
my own sys-net from scratch, how does Xen/Qubes send network traffic to
sys-net, to be sent onwards to my NIC?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191221153318.GA1931%40danwin1210.me.


Re: [qubes-users] sys-net interfaces

2019-12-26 Thread tetrahedra via qubes-users

On Thu, Dec 26, 2019 at 11:47:37AM +, 'awokd' via qubes-users wrote:

tetrahedra via qubes-users:

I haven't been able to find any documentation for what network
interfaces sys-net is expected to expose internally. If I want to create
my own sys-net from scratch, how does Xen/Qubes send network traffic to
sys-net, to be sent onwards to my NIC?


There's a brief discussion at https://www.qubes-os.org/doc/networking/,
but there may be more detailed notes in the source code for Qubes' VM
networking components. Qubes uses Xen's networking, so that might be the
best place to begin research.


Thanks, that's very helpful.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191227061022.GA1186%40danwin1210.me.


Re: [qubes-users] sys-net interfaces

2019-12-26 Thread tetrahedra via qubes-users

On Thu, Dec 26, 2019 at 11:47:37AM +, 'awokd' via qubes-users wrote:

There's a brief discussion at https://www.qubes-os.org/doc/networking/,
but there may be more detailed notes in the source code for Qubes' VM
networking components. Qubes uses Xen's networking, so that might be the
best place to begin research.


What responsibilties does sys-net have in terms of forwarding DNS? The
documentation specifies how things work for AppVMs, and it says there is
no DNS server in the "network driver domain" (sys-net), but it does not
say what sys-net actually has to do.

Also, the docs don't appear to be entirely accurate. The documentation
specifies a fairly complex set of routing tabels for the "network driver
domain" (sys-net, I assume), but the actual routing table on my sys-net
is fairly simple

The table from the documentation:
Destination Gateway Genmask Flags   Metric  Ref Use 
Iface
10.137.0.16 0.0.0.0 255.255.255.255 UH  0   0   
0   vif4.0
10.137.0.7  0.0.0.0 255.255.255.255 UH  0   0   
0   vif10.0
10.137.0.9  0.0.0.0 255.255.255.255 UH  0
[... many lines removed ...]
192.168.0.0 0.0.0.0 255.255.255.0   U   1   0   0   
eth0
0.0.0.0 192.168.0.1 0.0.0.0 UG  0   0   0   
eth0

The table from my sys-net:
[user@sys-net ~]$ sudo ip route
[user@sys-net ~]$ sudo route
Kernel IP routing table
Destination Gateway Genmask Flags Metric RefUse Iface
default _gateway0.0.0.0 UG60000 wls7
10.137.0.5  0.0.0.0 255.255.255.255 UH32747  00 vif5.0
192.168.0.0 0.0.0.0 255.255.255.0   U 60000 wls7


It looks like the documentation is assuming sys-net has many more
virtual NICs than it actually does?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191227070535.GA1464%40danwin1210.me.


[qubes-users] Troubleshooting Qubes graphical slowness

2019-12-26 Thread tetrahedra via qubes-users

Periodically all graphics-heavy apps (Firefox, ...) in all VMs seem to
slow down simultaneously. Rebooting fixes the situation. Running `sudo
journalctl -f` in dom0 doesn't show anything unusual. What would you
suggest as a next step towards locating the problem?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191227073310.GA1647%40danwin1210.me.


Re: [qubes-users] Troubleshooting Qubes graphical slowness

2019-12-27 Thread tetrahedra via qubes-users

On Fri, Dec 27, 2019 at 08:33:10AM +0100, tetrahedra via qubes-users wrote:

Periodically all graphics-heavy apps (Firefox, ...) in all VMs seem to
slow down simultaneously. Rebooting fixes the situation. Running `sudo
journalctl -f` in dom0 doesn't show anything unusual. What would you
suggest as a next step towards locating the problem?


vim also appears to be affected by the slowdown.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191227080552.GA1906%40danwin1210.me.


Re: [qubes-users] Troubleshooting Qubes graphical slowness

2019-12-27 Thread tetrahedra via qubes-users

On Fri, Dec 27, 2019 at 09:05:52AM +0100, tetrahedra via qubes-users wrote:

On Fri, Dec 27, 2019 at 08:33:10AM +0100, tetrahedra via qubes-users wrote:

Periodically all graphics-heavy apps (Firefox, ...) in all VMs seem to
slow down simultaneously. Rebooting fixes the situation. Running `sudo
journalctl -f` in dom0 doesn't show anything unusual. What would you
suggest as a next step towards locating the problem?


vim also appears to be affected by the slowdown.


Further inspection shows there's a LOT of disk I/O going on.

after installing iotop in dom0, this appears to be coming from command
[NN.xvda-0], presumably one of the VMs. How do I map the NN (number) to
a given running VM?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191227083340.GA1952%40danwin1210.me.


Re: [qubes-users] Troubleshooting Qubes graphical slowness

2019-12-27 Thread tetrahedra via qubes-users

On Fri, Dec 27, 2019 at 08:49:02AM +, 'awokd' via qubes-users wrote:

Further inspection shows there's a LOT of disk I/O going on.

after installing iotop in dom0, this appears to be coming from command
[NN.xvda-0], presumably one of the VMs. How do I map the NN (number) to
a given running VM?


Check xl top. I think you can find the offending VM with that. You might
be running out of system RAM too, which would be shown at the top.


xl top / xentop doesn't show any two-digit number identifying a VM.

However by trial and error it looks like the extreme levels of disk I/O
are a symptom rather than a cause. After shutting down all slowed-down
VMs the disk I/O ended. Then when I re-started a DispVM with Firefox,
the high levels of disk I/O (constant read > 50MB/sec) came back and
Firefox was slow (as before).

Unfortunately I need to get work done so have to reboot to "just make it
go away" but I am still interested in troubleshooting ideas (for when it
happens next).

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191227085716.GA2170%40danwin1210.me.


Re: [qubes-users] Troubleshooting Qubes graphical slowness

2019-12-27 Thread tetrahedra via qubes-users

On Fri, Dec 27, 2019 at 09:57:16AM +0100, tetrahedra via qubes-users wrote:

Unfortunately I need to get work done so have to reboot to "just make it
go away" but I am still interested in troubleshooting ideas (for when it
happens next).


One thing I noticed on reboot -- the initial round of stop jobs (when
shutting down the system, things like unmounting LUKS volumes) all timed
out. Not sure if related.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191227091041.GA1085%40danwin1210.me.


Re: [qubes-users] sys-net interfaces

2019-12-27 Thread tetrahedra via qubes-users

On Fri, Dec 27, 2019 at 08:46:35AM +, 'awokd' via qubes-users wrote:

What responsibilties does sys-net have in terms of forwarding DNS? The
documentation specifies how things work for AppVMs, and it says there is
no DNS server in the "network driver domain" (sys-net), but it does not
say what sys-net actually has to do.

It looks like the documentation is assuming sys-net has many more
virtual NICs than it actually does?


Did you check the Qubes source code responsible for setting these up?
The qubes-devel mailing list might also be appropriate here...


The documentation mentions the vif-route-qubes utility, but I can't tell
if dom0 runs this on sys-net (to set up routing to serve AppVMs) or runs
it on AppVMs / etc ... the documentation does not mention any other
source code (which would be used to e.g set up DNS forwarding).

I will ask on qubes-devel.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191228025332.GA1654%40danwin1210.me.


Re: [qubes-users] Qubes Structure

2019-12-29 Thread tetrahedra via qubes-users

On Sun, Dec 29, 2019 at 10:56:31AM +0100, xao wrote:

Hi! 

Sorry for the bad question structure, don't know how to write it properly.

I've seen some examples of how people setup their system and the most paranoid 
ones create separate standalone vm for each application and firewall that 
allows only this application to connect to the internet.

Currently, I have 4 template vms - debian 10 with all programs I use installed 
in it, fedora 30 minimal for netvms, and whonix templates. All my vms that I 
use on day to day basis are made with debian template. After seeing all those 
setups I feel that my system is an open garden for hackers and they can do 
whatever they want, and I will find it out only after I get completely hacked.

So, my question is how to setup your system for maximum security? Is there any 
guidelines on how to do so?

I understand that it may be a silly question because it mostly depends on from 
whom I protect myself, but let's imagine I need to protect from everyone.


If you need to protect from everyone then you should turn your computer
off, lock it in a vault, embed the vault in a block of solid concrete,
bury the whole mess at the bottom of a mine, and post an armed guard at
the door. Then you *may* be safe.

Ultimately your security is not the product of some "setup" but of the
degree to which you understand how your setup works and what the
implications are of the choices that you make.

If you understand very little, then the most paranoid of setups will get
you very little in terms of security, because you will end up making
choices that compromise that security -- or you will just end up wasting
a great deal of time on things that don't matter.

If you need security but don't understand computers, avoid using
computers!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191230042414.GC1185%40danwin1210.me.


  1   2   >