Re: [qubes-devel] Possible regression: vm-to-vm RPC calls stopped working

2018-02-21 Thread Elias Mårtenson
On Thursday, 22 February 2018 00:52:03 UTC+8, Yuraeitha wrote: > This is really weird indeed... there somehow seems to be a time or random > factor involved? I believe there were a few before us too, who also had > problems for a while even after a restart, but it was resolved eventually on >

Re: [qubes-devel] QSB #38: Qrexec policy bypass and possible information leak

2018-02-21 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Feb 21, 2018 at 08:58:52PM +, Pedro Martins wrote: > On 20-02-2018 00:49, Marek Marczykowski-Górecki wrote: > >Resolution > >=== > > > >We've decided to deprecate the '$' character from qrexec-related usage. > >Instead, to denote

Re: [qubes-devel] QSB #38: Qrexec policy bypass and possible information leak

2018-02-21 Thread Pedro Martins
On 20-02-2018 00:49, Marek Marczykowski-Górecki wrote: Resolution === We've decided to deprecate the '$' character from qrexec-related usage. Instead, to denote special tokens, we will use the '@' character, which we believe is less likely to be interpreted in a special way by the relev

Re: [qubes-devel] Possible regression: vm-to-vm RPC calls stopped working

2018-02-21 Thread Yuraeitha
On Wednesday, February 21, 2018 at 4:59:39 PM UTC+1, Elias Mårtenson wrote: > On Wednesday, 21 February 2018 23:42:18 UTC+8, Yuraeitha wrote: > > > On another bright side or bonus, Qubes > > even seem more smooth now. It's like old > > creeky wheels has gotten some oil and > > it's running mor

Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-21 Thread 'awokd' via qubes-devel
On Wed, February 21, 2018 4:41 pm, qubenix wrote: >> So let me be blunt as this is likely the last email from me to qubes >> > anyway; > > Bye, I'm happy to see you go away finally. It was killing me inside that > you were working on the new gui controller. Fuck off back to bcash. Tom had some con

Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-21 Thread qubenix
> So let me be blunt as this is likely the last email from me to qubes anyway; Bye, I'm happy to see you go away finally. It was killing me inside that you were working on the new gui controller. Fuck off back to bcash. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received t

Re: [qubes-devel] Possible regression: vm-to-vm RPC calls stopped working

2018-02-21 Thread Elias Mårtenson
On Wednesday, 21 February 2018 23:42:18 UTC+8, Yuraeitha wrote: > On another bright side or bonus, Qubes > even seem more smooth now. It's like old > creeky wheels has gotten some oil and > it's running more smooth. It can > definitely be felt, at least on my > system. For example one notice

Re: [qubes-devel] Possible regression: vm-to-vm RPC calls stopped working

2018-02-21 Thread Yuraeitha
On Wednesday, February 21, 2018 at 8:25:52 AM UTC+1, Elias Mårtenson wrote: > On Wednesday, 21 February 2018 02:26:16 UTC+8, Marek Marczykowski-Górecki > wrote: > > > qvm-copy command takes only filename, the VM name you give in qrexec > > confirmation prompt. > > After doing a full reboot of t

Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-21 Thread 'Tom Zander' via qubes-devel
On Wednesday, 21 February 2018 12:12:06 CET Wojtek Porczyk wrote: > This is bad UX. This is frustrating, I spent too many emails making the point clear that this is an API level escape token. Not a user-visible one, and then you respond to the thread showing you still completely missed that. S

Re: [qubes-devel] Permission denied when using Qubes().domains

2018-02-21 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Feb 20, 2018 at 10:45:55PM -0500, Chris Laprise wrote: > Using python3 in dom0, trying to access qubes.Qubes().domains results in the > following error: > > /dev/mapper/control: open failed: Permission denied > Failure to communicate with ke

Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-21 Thread Wojtek Porczyk
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Feb 20, 2018 at 04:27:16PM +0100, Tom Zander wrote: > On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote: > > On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel > wrote: > > > On Tuesday, 20 February 2018 01:4