Re: [qubes-devel] qubes-url-redirector v2.1 released!

2018-02-25 Thread Andrew Clausen
On 22 February 2018 at 15:52, Jean-Philippe Ouellet wrote: > > One possible solution would be to add a new type of Qubes RPC rule: > present > > the user with the most recently opened DispVM to use as a default (that > they > > can change before clicking OK). It might look

Re: [qubes-devel] qubes-url-redirector v2.1 released!

2018-02-22 Thread Jean-Philippe Ouellet
On Sun, Feb 4, 2018 at 5:16 AM, Andrew Clausen wrote: > On 3 February 2018 at 17:09, Raffaele Florio >> 4) This option adds a lot of complexity and "DispVM" automatically become >> a sort of "SessionVM". Furthermore this option increase,

Re: [qubes-devel] qubes-url-redirector v2.1 released!

2018-02-22 Thread 'Raffaele Florio' via qubes-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Andrew, I'm implementing these features. I'll release the v2.1.1 soon. The extension itself could be automatically updated. However I'll not enable this feature because: 1. There isn't any way to verify updated extension in Chrome/Chromium.

Re: [qubes-devel] qubes-url-redirector v2.1 released!

2018-02-05 Thread Andrew Clausen
Hi Raffaele, On 5 February 2018 at 08:10, Raffaele Florio wrote: > > Yes, a lower number would be better. I used 20 for dramatic effect, > because this is enough to crash a computer. > Maybe 10 is enough. I think to add this value as parameter in the settings. >

Re: [qubes-devel] qubes-url-redirector v2.1 released!

2018-02-05 Thread 'Raffaele Florio' via qubes-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Andrew, > It introduces an extra point of failure. I could owned by a corrupted "git > clone" operation. I could also get cloned by a corrupted wget operation. > It's one extra thing to audit (if I want to be careful). Yeah, as I wrote the

Re: [qubes-devel] qubes-url-redirector v2.1 released!

2018-02-04 Thread Andrew Clausen
Hi Raffaele, On 4 February 2018 at 17:25, Raffaele Florio wrote: > > The "make firefox" rule uses wget to get a few files. Is this because > you don't want to distribute signatures on Github? Ideally, it would use > local files only. > I was referring to the

Re: [qubes-devel] qubes-url-redirector v2.1 released!

2018-02-04 Thread Andrew Clausen
Hi Raffaele, On 3 February 2018 at 17:09, Raffaele Florio wrote: > 1) I partially agree. Can you explain better please? > The "make firefox" rule uses wget to get a few files. Is this because you don't want to distribute signatures on Github? Ideally, it would

Re: [qubes-devel] qubes-url-redirector v2.1 released!

2018-02-03 Thread 'Raffaele Florio' via qubes-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Andrew, Thanks for the comments! 1) I partially agree. Can you explain better please? 2) I don't consider this case an issue. This extension is designed to block and redirect non whitelisted URLs, that is opened through the browser (e.g. with

Re: [qubes-devel] qubes-url-redirector v2.1 released!

2018-02-03 Thread Andrew Clausen
Hi Raffaele, I just tried it. A few comments: (1) I'm not thrilled about using wget to install things. (I don't trust https very much.) What's wrong with using the locally distributed copies of files from git? (2) It wreaks havoc! When I restarted Firefox, and did "restore old tabs", it

[qubes-devel] qubes-url-redirector v2.1 released!

2018-02-02 Thread 'Raffaele Florio' via qubes-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi all :), I've just released the qubes-url-redirector extension. The GitHub repo is at [0] and the issue on QubesOS's repo is at [2]. The extension is based on the gsoc idea [1]. Soon I'll work on the Thunderbird one :). Here a brief