Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Friday, 12 July 2019 12:15:07 UTC, steve.coleman wrote: > On 7/11/19 9:36 PM, list...@gmail.com wrote: > > On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman wrote: > >> On 7/10/19 2:02 AM, wrote: > >>> On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman wrote: > On 7/9/19 7:25 AM, wrote: > > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org > > using > > > > $ sudo dnf install > > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > > > > and that works 'fabelhaft' (German for 'fabulously' :), but inside the > > running template I'm asked for a password when I try to sudo my way > > into apt-get update. > > > > Does anyone know the password for 'user'? > > > > Thanks. > > > > If you can not sudo, you can always try running your command from Dom0 > as user root: > > $ qvm-run -a --user root "apt-get update" > >>> > >>> Thanks. > >>> I not only want to update, I also want to run all other kinds of commands > >>> as sudo. Do you think I can run any command like this inside the qube > >>> from within dom0? > >> > >> You can also run any other command as root, like "passwd user" to set > >> the password to a know value, or "gedit /etc/sudoers" and modify who can > >> sudo, add yourself to the wheel group, etc... I can't say why your > >> particular appvm prevents you from sudoing without testing the vm > >> myself, but whatever the problem is, you now have a way to get a root > >> shell to fix it. > >> > >> hope this helps > > > > It did, thanks for your help. > > The funny thing is, > > > > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo > > user" > > > > didn't work, even after > > > > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" > > > > although 'user' was added to the sudo group as could be seen from > > > > user@stretch-minimal:~$ cat /etc/group | grep sudo > > sudo:x:27:user > > > > so I had to edit the sudoers file directly, then restarted the sudo service: > > > > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" > > > > and that worked, so I wrote a little script to more or less automate and > > explain the process: https://pastebin.com/UcJa0DvC > > > For what it is worth, you might just find it easier to start a root > terminal (e.g. gnome-terminal, xterm, etc) so that you can run all those > commands as root interactively at a command line. Chances are your > "stretch-minimal" may not have many choices of terminals, but then you > can always just add one to make your life a little easier. I don't know > stretch, but I would guess that the 'xterm' application is likely > already installed. > > $ qvm-run -a --user root stretch-minimal xterm > > 'gnome-terminal' is execelent if that is already installed. Yes, there is an XTerm available in stretch-minimal. Good suggestion to run that as root from dom0, thanks, but I'm already in de sudo group now. ;-) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a7e2e004-a112-4043-98c2-d3fec70f891e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On 7/11/19 9:36 PM, list.w...@gmail.com wrote: On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman wrote: On 7/10/19 2:02 AM, wrote: On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman wrote: On 7/9/19 7:25 AM, wrote: Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using $ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm and that works 'fabelhaft' (German for 'fabulously' :), but inside the running template I'm asked for a password when I try to sudo my way into apt-get update. Does anyone know the password for 'user'? Thanks. If you can not sudo, you can always try running your command from Dom0 as user root: $ qvm-run -a --user root "apt-get update" Thanks. I not only want to update, I also want to run all other kinds of commands as sudo. Do you think I can run any command like this inside the qube from within dom0? You can also run any other command as root, like "passwd user" to set the password to a know value, or "gedit /etc/sudoers" and modify who can sudo, add yourself to the wheel group, etc... I can't say why your particular appvm prevents you from sudoing without testing the vm myself, but whatever the problem is, you now have a way to get a root shell to fix it. hope this helps It did, thanks for your help. The funny thing is, [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user" didn't work, even after [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" although 'user' was added to the sudo group as could be seen from user@stretch-minimal:~$ cat /etc/group | grep sudo sudo:x:27:user so I had to edit the sudoers file directly, then restarted the sudo service: [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" and that worked, so I wrote a little script to more or less automate and explain the process: https://pastebin.com/UcJa0DvC For what it is worth, you might just find it easier to start a root terminal (e.g. gnome-terminal, xterm, etc) so that you can run all those commands as root interactively at a command line. Chances are your "stretch-minimal" may not have many choices of terminals, but then you can always just add one to make your life a little easier. I don't know stretch, but I would guess that the 'xterm' application is likely already installed. $ qvm-run -a --user root stretch-minimal xterm 'gnome-terminal' is execelent if that is already installed. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9f201d68-e9b0-d3ab-a60d-e78b50d545db%40jhuapl.edu. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman wrote: > On 7/10/19 2:02 AM, wrote: > > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman wrote: > >> On 7/9/19 7:25 AM, wrote: > >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using > >>> > >>> $ sudo dnf install > >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > >>> > >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the > >>> running template I'm asked for a password when I try to sudo my way into > >>> apt-get update. > >>> > >>> Does anyone know the password for 'user'? > >>> > >>> Thanks. > >>> > >> > >> If you can not sudo, you can always try running your command from Dom0 > >> as user root: > >> > >> $ qvm-run -a --user root "apt-get update" > > > > Thanks. > > I not only want to update, I also want to run all other kinds of commands > > as sudo. Do you think I can run any command like this inside the qube from > > within dom0? > > You can also run any other command as root, like "passwd user" to set > the password to a know value, or "gedit /etc/sudoers" and modify who can > sudo, add yourself to the wheel group, etc... I can't say why your > particular appvm prevents you from sudoing without testing the vm > myself, but whatever the problem is, you now have a way to get a root > shell to fix it. > > hope this helps It did, thanks for your help. The funny thing is, [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user" didn't work, even after [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" although 'user' was added to the sudo group as could be seen from user@stretch-minimal:~$ cat /etc/group | grep sudo sudo:x:27:user so I had to edit the sudoers file directly, then restarted the sudo service: [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" and that worked, so I wrote a little script to more or less automate and explain the process: https://pastebin.com/UcJa0DvC -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c0768f19-3a7c-46ac-8d1f-79f337195f84%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Friday, 12 July 2019 01:27:43 UTC, list...@gmail.com wrote: > On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman wrote: > > On 7/10/19 2:02 AM, wrote: > > > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman wrote: > > >> On 7/9/19 7:25 AM, wrote: > > >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org > > >>> using > > >>> > > >>> $ sudo dnf install > > >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > > >>> > > >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the > > >>> running template I'm asked for a password when I try to sudo my way > > >>> into apt-get update. > > >>> > > >>> Does anyone know the password for 'user'? > > >>> > > >>> Thanks. > > >>> > > >> > > >> If you can not sudo, you can always try running your command from Dom0 > > >> as user root: > > >> > > >> $ qvm-run -a --user root "apt-get update" > > > > > > Thanks. > > > I not only want to update, I also want to run all other kinds of commands > > > as sudo. Do you think I can run any command like this inside the qube > > > from within dom0? > > > > You can also run any other command as root, like "passwd user" to set > > the password to a know value, or "gedit /etc/sudoers" and modify who can > > sudo, add yourself to the wheel group, etc... I can't say why your > > particular appvm prevents you from sudoing without testing the vm > > myself, but whatever the problem is, you now have a way to get a root > > shell to fix it. > > > > hope this helps > > It did, thanks for your help. > The funny thing is, > > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo > user" > > didn't work, even after > > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" > > although 'user' was added to the sudo group as could be seen from > > user@stretch-minimal:~$ cat /etc/group | grep sudo > sudo:x:27:user > > so I had to edit the sudoers file directly, then restarted the sudo service: > > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" > [user@dom0 ~]$ > qvm-run -p --user stretch-minimal "service sudo restart" > > and that worked, so I wrote a little script to more or less automate and > explain the process: https://pastebin.com/UcJa0DvC Sorry, that last line should read: [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d4ea0cbe-7af8-489b-9170-e1cc23ff4158%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman wrote: > On 7/10/19 2:02 AM, wrote: > > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman wrote: > >> On 7/9/19 7:25 AM, wrote: > >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using > >>> > >>> $ sudo dnf install > >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > >>> > >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the > >>> running template I'm asked for a password when I try to sudo my way into > >>> apt-get update. > >>> > >>> Does anyone know the password for 'user'? > >>> > >>> Thanks. > >>> > >> > >> If you can not sudo, you can always try running your command from Dom0 > >> as user root: > >> > >> $ qvm-run -a --user root "apt-get update" > > > > Thanks. > > I not only want to update, I also want to run all other kinds of commands > > as sudo. Do you think I can run any command like this inside the qube from > > within dom0? > > You can also run any other command as root, like "passwd user" to set > the password to a know value, or "gedit /etc/sudoers" and modify who can > sudo, add yourself to the wheel group, etc... I can't say why your > particular appvm prevents you from sudoing without testing the vm > myself, but whatever the problem is, you now have a way to get a root > shell to fix it. > > hope this helps It did, thanks for your help. The funny thing is, [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user" didn't work, even after [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" although 'user' was added to the sudo group as could be seen from user@stretch-minimal:~$ cat /etc/group | grep sudo sudo:x:27:user so I had to edit the sudoers file directly, then restarted the sudo service: [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart" [user@dom0 ~]$ qvm-run -p --user stretch-minimal "service sudo restart" and that worked, so I wrote a little script to more or less automate and explain the process: https://pastebin.com/UcJa0DvC -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f144ec75-8a24-40a3-8c3a-d8c4a4e0c4a1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On 7/10/19 2:02 AM, list.w...@gmail.com wrote: On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman wrote: On 7/9/19 7:25 AM, wrote: Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using $ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm and that works 'fabelhaft' (German for 'fabulously' :), but inside the running template I'm asked for a password when I try to sudo my way into apt-get update. Does anyone know the password for 'user'? Thanks. If you can not sudo, you can always try running your command from Dom0 as user root: $ qvm-run -a --user root "apt-get update" Thanks. I not only want to update, I also want to run all other kinds of commands as sudo. Do you think I can run any command like this inside the qube from within dom0? You can also run any other command as root, like "passwd user" to set the password to a know value, or "gedit /etc/sudoers" and modify who can sudo, add yourself to the wheel group, etc... I can't say why your particular appvm prevents you from sudoing without testing the vm myself, but whatever the problem is, you now have a way to get a root shell to fix it. hope this helps -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7aef641a-2065-ad04-8279-0de94d0c97de%40jhuapl.edu. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Tuesday, 9 July 2019 13:35:39 UTC, unman wrote: > On Tue, Jul 09, 2019 at 08:30:37AM -0400, Steve Coleman wrote: > > On 7/9/19 7:25 AM, wrote: > > > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using > > > > > > $ sudo dnf install > > > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > > > > > > and that works 'fabelhaft' (German for 'fabulously' :), but inside the > > > running template I'm asked for a password when I try to sudo my way into > > > apt-get update. > > > > > > Does anyone know the password for 'user'? > > > > > > Thanks. > > > > > > > If you can not sudo, you can always try running your command from Dom0 as > > user root: > > > > $ qvm-run -a --user root "apt-get update" > > > > This doesnt look right: I havent used a trusty for a while, and dont > support it as its no longer LTS. > If it's the minimal template, have you installed the > qubes-core-agent-passwordless-root package? I could build it for you if > you have problems building yourself. > > unman Thanks for replying, and me thinking that 14.04 was 'stretch'. :) Whatever command I try to do as sudo, it responds the same: user@stretch-minimal:~$ sudo nano We trust blahblah [sudo] password for user: Entering the 'empty password' then gives: "Sorry, try again." Against better knowledge I also tried in dom0 [user@dom0 Desktop]$ sudo dnf install qubes-core-agent-passwordless-root but that gave a "no package qubes-core-agent-passwordless-root available. If the software package I was planning to run in the VM didn't specifically ask for 14.04 I'd have chosen a newer Ubuntu version of course. It seems coleman's suggestion works as after entering his command inside my stretch-minimal VM ps aux indicates a running qrexec-agent and 'apt-get update'. When that's finished I'll try to run another command from within dom0 that would give me root access. Such as creating a password for user 'user' and entry into wheel. Does that sound correct? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6098924a-5a5e-469f-b255-287a27835a3c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman wrote: > On 7/9/19 7:25 AM, wrote: > > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using > > > > $ sudo dnf install > > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > > > > and that works 'fabelhaft' (German for 'fabulously' :), but inside the > > running template I'm asked for a password when I try to sudo my way into > > apt-get update. > > > > Does anyone know the password for 'user'? > > > > Thanks. > > > > If you can not sudo, you can always try running your command from Dom0 > as user root: > > $ qvm-run -a --user root "apt-get update" Thanks. I not only want to update, I also want to run all other kinds of commands as sudo. Do you think I can run any command like this inside the qube from within dom0? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0829bd06-9fee-4142-9e1d-b3fb20174ced%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Tue, Jul 09, 2019 at 08:30:37AM -0400, Steve Coleman wrote: > On 7/9/19 7:25 AM, list.w...@gmail.com wrote: > > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using > > > > $ sudo dnf install > > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > > > > and that works 'fabelhaft' (German for 'fabulously' :), but inside the > > running template I'm asked for a password when I try to sudo my way into > > apt-get update. > > > > Does anyone know the password for 'user'? > > > > Thanks. > > > > If you can not sudo, you can always try running your command from Dom0 as > user root: > > $ qvm-run -a --user root "apt-get update" > This doesnt look right: I havent used a trusty for a while, and dont support it as its no longer LTS. If it's the minimal template, have you installed the qubes-core-agent-passwordless-root package? I could build it for you if you have problems building yourself. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709133536.atz4reae7tz2biv4%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On 7/9/19 7:25 AM, list.w...@gmail.com wrote: Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using $ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm and that works 'fabelhaft' (German for 'fabulously' :), but inside the running template I'm asked for a password when I try to sudo my way into apt-get update. Does anyone know the password for 'user'? Thanks. If you can not sudo, you can always try running your command from Dom0 as user root: $ qvm-run -a --user root "apt-get update" -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2f5edfbc-0129-7d61-50c2-7060434cef85%40jhuapl.edu. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using $ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm and that works 'fabelhaft' (German for 'fabulously' :), but inside the running template I'm asked for a password when I try to sudo my way into apt-get update. Does anyone know the password for 'user'? Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2aadd939-9550-4416-b557-00703f53c878%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.