Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-13 Thread list . wget
On Friday, 12 July 2019 12:15:07 UTC, steve.coleman  wrote:
> On 7/11/19 9:36 PM, list...@gmail.com wrote:
> > On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> >> On 7/10/19 2:02 AM,  wrote:
> >>> On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
>  On 7/9/19 7:25 AM,  wrote:
> > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org 
> > using
> >
> > $ sudo dnf install 
> > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> >
> > and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > running template I'm asked for a password when I try to sudo my way 
> > into apt-get update.
> >
> > Does anyone know the password for 'user'?
> >
> > Thanks.
> >
> 
>  If you can not sudo, you can always try running your command from Dom0
>  as user root:
> 
>  $ qvm-run -a --user root  "apt-get update"
> >>>
> >>> Thanks.
> >>> I not only want to update, I also want to run all other kinds of commands 
> >>> as sudo. Do you think I can run any command like this inside the qube 
> >>> from within dom0?
> >>
> >> You can also run any other command as root, like "passwd user" to set
> >> the password to a know value, or "gedit /etc/sudoers" and modify who can
> >> sudo, add yourself to the wheel group, etc... I can't say why your
> >> particular appvm prevents you from sudoing without testing the vm
> >> myself, but whatever the problem is, you now have a way to get a root
> >> shell to fix it.
> >>
> >> hope this helps
> > 
> > It did, thanks for your help.
> > The funny thing is,
> > 
> > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo 
> > user"
> > 
> > didn't work, even after
> > 
> > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> > 
> > although 'user' was added to the sudo group as could be seen from
> > 
> > user@stretch-minimal:~$  cat /etc/group | grep sudo
> > sudo:x:27:user
> > 
> > so I had to edit the sudoers file directly, then restarted the sudo service:
> > 
> > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> > 
> > and that worked, so I wrote a little script to more or less automate and 
> > explain the process: https://pastebin.com/UcJa0DvC
> >
> For what it is worth, you might just find it easier to start a root 
> terminal (e.g. gnome-terminal, xterm, etc) so that you can run all those 
> commands as root interactively at a command line. Chances are your 
> "stretch-minimal" may not have many choices of terminals, but then you 
> can always just add one to make your life a little easier. I don't know 
> stretch, but I would guess that the 'xterm' application is likely 
> already installed.
> 
> $ qvm-run -a --user root stretch-minimal xterm
> 
> 'gnome-terminal' is execelent if that is already installed.

Yes, there is an XTerm available in stretch-minimal.
Good suggestion to run that as root from dom0, thanks, but I'm already in de 
sudo group now. ;-)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a7e2e004-a112-4043-98c2-d3fec70f891e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-12 Thread Steve Coleman

On 7/11/19 9:36 PM, list.w...@gmail.com wrote:

On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:

On 7/10/19 2:02 AM,  wrote:

On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:

On 7/9/19 7:25 AM,  wrote:

Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using

$ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm

and that works 'fabelhaft' (German for 'fabulously' :), but inside the running 
template I'm asked for a password when I try to sudo my way into apt-get update.

Does anyone know the password for 'user'?

Thanks.



If you can not sudo, you can always try running your command from Dom0
as user root:

$ qvm-run -a --user root  "apt-get update"


Thanks.
I not only want to update, I also want to run all other kinds of commands as 
sudo. Do you think I can run any command like this inside the qube from within 
dom0?


You can also run any other command as root, like "passwd user" to set
the password to a know value, or "gedit /etc/sudoers" and modify who can
sudo, add yourself to the wheel group, etc... I can't say why your
particular appvm prevents you from sudoing without testing the vm
myself, but whatever the problem is, you now have a way to get a root
shell to fix it.

hope this helps


It did, thanks for your help.
The funny thing is,

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user"

didn't work, even after

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

although 'user' was added to the sudo group as could be seen from

user@stretch-minimal:~$  cat /etc/group | grep sudo
sudo:x:27:user

so I had to edit the sudoers file directly, then restarted the sudo service:

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

and that worked, so I wrote a little script to more or less automate and 
explain the process: https://pastebin.com/UcJa0DvC

For what it is worth, you might just find it easier to start a root 
terminal (e.g. gnome-terminal, xterm, etc) so that you can run all those 
commands as root interactively at a command line. Chances are your 
"stretch-minimal" may not have many choices of terminals, but then you 
can always just add one to make your life a little easier. I don't know 
stretch, but I would guess that the 'xterm' application is likely 
already installed.


$ qvm-run -a --user root stretch-minimal xterm

'gnome-terminal' is execelent if that is already installed.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9f201d68-e9b0-d3ab-a60d-e78b50d545db%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-11 Thread list . wget
On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> On 7/10/19 2:02 AM,  wrote:
> > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> >> On 7/9/19 7:25 AM,  wrote:
> >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> >>>
> >>> $ sudo dnf install 
> >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> >>>
> >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> >>> running template I'm asked for a password when I try to sudo my way into 
> >>> apt-get update.
> >>>
> >>> Does anyone know the password for 'user'?
> >>>
> >>> Thanks.
> >>>
> >>
> >> If you can not sudo, you can always try running your command from Dom0
> >> as user root:
> >>
> >> $ qvm-run -a --user root  "apt-get update"
> > 
> > Thanks.
> > I not only want to update, I also want to run all other kinds of commands 
> > as sudo. Do you think I can run any command like this inside the qube from 
> > within dom0?
> 
> You can also run any other command as root, like "passwd user" to set 
> the password to a know value, or "gedit /etc/sudoers" and modify who can 
> sudo, add yourself to the wheel group, etc... I can't say why your 
> particular appvm prevents you from sudoing without testing the vm 
> myself, but whatever the problem is, you now have a way to get a root 
> shell to fix it.
> 
> hope this helps

It did, thanks for your help.
The funny thing is,

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user"

didn't work, even after

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

although 'user' was added to the sudo group as could be seen from

user@stretch-minimal:~$  cat /etc/group | grep sudo
sudo:x:27:user

so I had to edit the sudoers file directly, then restarted the sudo service:

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

and that worked, so I wrote a little script to more or less automate and 
explain the process: https://pastebin.com/UcJa0DvC

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0768f19-3a7c-46ac-8d1f-79f337195f84%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-11 Thread list . wget
On Friday, 12 July 2019 01:27:43 UTC, list...@gmail.com  wrote:
> On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> > On 7/10/19 2:02 AM,  wrote:
> > > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> > >> On 7/9/19 7:25 AM,  wrote:
> > >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org 
> > >>> using
> > >>>
> > >>> $ sudo dnf install 
> > >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> > >>>
> > >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > >>> running template I'm asked for a password when I try to sudo my way 
> > >>> into apt-get update.
> > >>>
> > >>> Does anyone know the password for 'user'?
> > >>>
> > >>> Thanks.
> > >>>
> > >>
> > >> If you can not sudo, you can always try running your command from Dom0
> > >> as user root:
> > >>
> > >> $ qvm-run -a --user root  "apt-get update"
> > > 
> > > Thanks.
> > > I not only want to update, I also want to run all other kinds of commands 
> > > as sudo. Do you think I can run any command like this inside the qube 
> > > from within dom0?
> > 
> > You can also run any other command as root, like "passwd user" to set 
> > the password to a know value, or "gedit /etc/sudoers" and modify who can 
> > sudo, add yourself to the wheel group, etc... I can't say why your 
> > particular appvm prevents you from sudoing without testing the vm 
> > myself, but whatever the problem is, you now have a way to get a root 
> > shell to fix it.
> > 
> > hope this helps
> 
> It did, thanks for your help.
> The funny thing is, 
> 
> [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo 
> user"
> 
> didn't work, even after 
> 
> [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> 
> although 'user' was added to the sudo group as could be seen from 
> 
> user@stretch-minimal:~$  cat /etc/group | grep sudo
> sudo:x:27:user
> 
> so I had to edit the sudoers file directly, then restarted the sudo service:
> 
> [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> [user@dom0 ~]$ 
> qvm-run -p --user stretch-minimal "service sudo restart"
> 
> and that worked, so I wrote a little script to more or less automate and 
> explain the process: https://pastebin.com/UcJa0DvC

Sorry, that last line should read:
[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d4ea0cbe-7af8-489b-9170-e1cc23ff4158%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-11 Thread list . wget
On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> On 7/10/19 2:02 AM,  wrote:
> > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> >> On 7/9/19 7:25 AM,  wrote:
> >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> >>>
> >>> $ sudo dnf install 
> >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> >>>
> >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> >>> running template I'm asked for a password when I try to sudo my way into 
> >>> apt-get update.
> >>>
> >>> Does anyone know the password for 'user'?
> >>>
> >>> Thanks.
> >>>
> >>
> >> If you can not sudo, you can always try running your command from Dom0
> >> as user root:
> >>
> >> $ qvm-run -a --user root  "apt-get update"
> > 
> > Thanks.
> > I not only want to update, I also want to run all other kinds of commands 
> > as sudo. Do you think I can run any command like this inside the qube from 
> > within dom0?
> 
> You can also run any other command as root, like "passwd user" to set 
> the password to a know value, or "gedit /etc/sudoers" and modify who can 
> sudo, add yourself to the wheel group, etc... I can't say why your 
> particular appvm prevents you from sudoing without testing the vm 
> myself, but whatever the problem is, you now have a way to get a root 
> shell to fix it.
> 
> hope this helps

It did, thanks for your help.
The funny thing is, 

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user"

didn't work, even after 

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

although 'user' was added to the sudo group as could be seen from 

user@stretch-minimal:~$  cat /etc/group | grep sudo
sudo:x:27:user

so I had to edit the sudoers file directly, then restarted the sudo service:

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
[user@dom0 ~]$ 
qvm-run -p --user stretch-minimal "service sudo restart"

and that worked, so I wrote a little script to more or less automate and 
explain the process: https://pastebin.com/UcJa0DvC

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f144ec75-8a24-40a3-8c3a-d8c4a4e0c4a1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-10 Thread Steve Coleman

On 7/10/19 2:02 AM, list.w...@gmail.com wrote:

On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:

On 7/9/19 7:25 AM,  wrote:

Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using

$ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm

and that works 'fabelhaft' (German for 'fabulously' :), but inside the running 
template I'm asked for a password when I try to sudo my way into apt-get update.

Does anyone know the password for 'user'?

Thanks.



If you can not sudo, you can always try running your command from Dom0
as user root:

$ qvm-run -a --user root  "apt-get update"


Thanks.
I not only want to update, I also want to run all other kinds of commands as 
sudo. Do you think I can run any command like this inside the qube from within 
dom0?


You can also run any other command as root, like "passwd user" to set 
the password to a know value, or "gedit /etc/sudoers" and modify who can 
sudo, add yourself to the wheel group, etc... I can't say why your 
particular appvm prevents you from sudoing without testing the vm 
myself, but whatever the problem is, you now have a way to get a root 
shell to fix it.


hope this helps




--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7aef641a-2065-ad04-8279-0de94d0c97de%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-09 Thread list . wget
On Tuesday, 9 July 2019 13:35:39 UTC, unman  wrote:
> On Tue, Jul 09, 2019 at 08:30:37AM -0400, Steve Coleman wrote:
> > On 7/9/19 7:25 AM,  wrote:
> > > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> > > 
> > > $ sudo dnf install 
> > > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> > > 
> > > and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > > running template I'm asked for a password when I try to sudo my way into 
> > > apt-get update.
> > > 
> > > Does anyone know the password for 'user'?
> > > 
> > > Thanks.
> > > 
> > 
> > If you can not sudo, you can always try running your command from Dom0 as
> > user root:
> > 
> > $ qvm-run -a --user root  "apt-get update"
> > 
> 
> This doesnt look right: I havent used a trusty for a while, and dont
> support it as its no longer LTS.
> If it's the minimal template, have you installed the
> qubes-core-agent-passwordless-root package? I could build it for you if
> you have problems building yourself.
> 
> unman

Thanks for replying, and me thinking that 14.04 was 'stretch'. :)

Whatever command I try to do as sudo, it responds the same:

user@stretch-minimal:~$ sudo nano
We trust blahblah
[sudo] password for user:

Entering the 'empty password' then gives:
"Sorry, try again."

Against better knowledge I also tried in dom0

[user@dom0 Desktop]$ sudo dnf install qubes-core-agent-passwordless-root
but that gave a "no package qubes-core-agent-passwordless-root available.

If the software package I was planning to run in the VM didn't specifically ask 
for 14.04 I'd have chosen a newer Ubuntu version of course.

It seems coleman's suggestion works as after entering his command inside my 
stretch-minimal VM ps aux indicates a running qrexec-agent and 'apt-get update'.

When that's finished I'll try to run another command from within dom0 that 
would give me root access. 
Such as creating a password for user 'user' and entry into wheel.
Does that sound correct?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6098924a-5a5e-469f-b255-287a27835a3c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-09 Thread list . wget
On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> On 7/9/19 7:25 AM,  wrote:
> > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> > 
> > $ sudo dnf install 
> > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> > 
> > and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > running template I'm asked for a password when I try to sudo my way into 
> > apt-get update.
> > 
> > Does anyone know the password for 'user'?
> > 
> > Thanks.
> > 
> 
> If you can not sudo, you can always try running your command from Dom0 
> as user root:
> 
> $ qvm-run -a --user root  "apt-get update"

Thanks.
I not only want to update, I also want to run all other kinds of commands as 
sudo. Do you think I can run any command like this inside the qube from within 
dom0?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0829bd06-9fee-4142-9e1d-b3fb20174ced%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-09 Thread unman
On Tue, Jul 09, 2019 at 08:30:37AM -0400, Steve Coleman wrote:
> On 7/9/19 7:25 AM, list.w...@gmail.com wrote:
> > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> > 
> > $ sudo dnf install 
> > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> > 
> > and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > running template I'm asked for a password when I try to sudo my way into 
> > apt-get update.
> > 
> > Does anyone know the password for 'user'?
> > 
> > Thanks.
> > 
> 
> If you can not sudo, you can always try running your command from Dom0 as
> user root:
> 
> $ qvm-run -a --user root  "apt-get update"
> 

This doesnt look right: I havent used a trusty for a while, and dont
support it as its no longer LTS.
If it's the minimal template, have you installed the
qubes-core-agent-passwordless-root package? I could build it for you if
you have problems building yourself.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190709133536.atz4reae7tz2biv4%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-09 Thread Steve Coleman

On 7/9/19 7:25 AM, list.w...@gmail.com wrote:

Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using

$ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm

and that works 'fabelhaft' (German for 'fabulously' :), but inside the running 
template I'm asked for a password when I try to sudo my way into apt-get update.

Does anyone know the password for 'user'?

Thanks.



If you can not sudo, you can always try running your command from Dom0 
as user root:


$ qvm-run -a --user root  "apt-get update"


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f5edfbc-0129-7d61-50c2-7060434cef85%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-09 Thread list . wget
Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using

$ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm 

and that works 'fabelhaft' (German for 'fabulously' :), but inside the running 
template I'm asked for a password when I try to sudo my way into apt-get update.

Does anyone know the password for 'user'?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2aadd939-9550-4416-b557-00703f53c878%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.