I'm thinking an attacker could:
1 Take control of the VM through any given means, and gain the ability to
edit the .desktop file
2 Alter the desktop file so that it opens a malware URL in the VM dedicated
to web browsing
3 Send information from the Thunderbird VM to the less-trusted web browsing
On Tuesday, March 28, 2017 at 8:07:30 PM UTC-4, Nemo wrote:
> On Tuesday, March 28, 2017 at 7:34:45 PM UTC-4, Unman wrote:
> > On Tue, Mar 28, 2017 at 03:23:26PM -0700, Nemo wrote:
> > > On Tuesday, March 28, 2017 at 12:27:52 PM UTC-4, Nemo wrote:
> > > > I'm really h
On Tuesday, March 28, 2017 at 7:34:45 PM UTC-4, Unman wrote:
> On Tue, Mar 28, 2017 at 03:23:26PM -0700, Nemo wrote:
> > On Tuesday, March 28, 2017 at 12:27:52 PM UTC-4, Nemo wrote:
> > > I'm really having a lot of trouble getting consistent results with the
> > >
On Tuesday, March 28, 2017 at 12:27:52 PM UTC-4, Nemo wrote:
> I'm really having a lot of trouble getting consistent results with the
> updates proxy. I've managed to break it on Firewall as well, despite only
> removing and then re-adding qubes-updates-proxy (as far as I
> On 03/28/2017 08:14 AM, Nemo wrote:
>
>> Yes, I did follow the official documentation to create the proxy.
>>
>> The only thing I've borrowed from the Rudd-O version is having Firewall
>> downstream from VPN, and setting the VPN's firewall settings to blo
, 2017 7:37 AM, "Chris Laprise" <tas...@openmailbox.org> wrote:
On 03/28/2017 04:33 AM, Nemo wrote:
> On Tuesday, March 28, 2017 at 4:32:12 AM UTC-4, Nemo wrote:
>
>> I have a set of chained VMs set up like this
>>
>> Net <- Firewall <- VPN <- Firewal
On Tuesday, March 28, 2017 at 4:32:12 AM UTC-4, Nemo wrote:
> I have a set of chained VMs set up like this
>
> Net <- Firewall <- VPN <- Firewall-VPN <- TemplateVMs/AppVMs
>
> While my AppVMs have perfect internet connection, I cannot get the Updates
> Pr
I have a set of chained VMs set up like this
Net <- Firewall <- VPN <- Firewall-VPN <- TemplateVMs/AppVMs
While my AppVMs have perfect internet connection, I cannot get the Updates
Proxy to work for my TemplateVMs.
Skipping the VPN does work fine:
Net <- Firewall <- TemplateVMs
The Net,
On Saturday, March 25, 2017 at 9:25:46 PM UTC-4, Nemo wrote:
> On Friday, March 24, 2017 at 3:48:22 PM UTC-4, Nemo wrote:
> > My TemplateVMs have a recurring and unpredictable problem starting dnf.
> >
> > dnf will display no output for a number of minutes and then exit wi
t; On Fri, Mar 24, 2017 at 03:32:47PM -0700, Nemo wrote:
> > On Friday, March 24, 2017 at 6:07:51 PM UTC-4, Unman wrote:
> > > On Thu, Mar 23, 2017 at 08:00:57PM -0700, Nemo wrote:
> > > > On Thursday, March 23, 2017 at 10:37:58 PM UTC-4, Andrew David Wong
> wrote:
On Friday, March 24, 2017 at 3:48:22 PM UTC-4, Nemo wrote:
> My TemplateVMs have a recurring and unpredictable problem starting dnf.
>
> dnf will display no output for a number of minutes and then exit with an
> error like (not always this)
>
> Error: Failed to synchronize cac
On Friday, March 24, 2017 at 6:07:51 PM UTC-4, Unman wrote:
> On Thu, Mar 23, 2017 at 08:00:57PM -0700, Nemo wrote:
> > On Thursday, March 23, 2017 at 10:37:58 PM UTC-4, Andrew David Wong wrote:
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA512
> > &
My TemplateVMs have a recurring and unpredictable problem starting dnf.
dnf will display no output for a number of minutes and then exit with an error
like (not always this)
Error: Failed to synchronize cache for repo 'qubes-vm-r3.2-current'
or
Error: Failed to synchronize cache for repo
On Thursday, March 23, 2017 at 10:37:58 PM UTC-4, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-03-23 19:28, Nemo wrote:
> > I've been writing a bash script that manages firewall settings
> > from dom0, via qvm-firew
I've been writing a bash script that manages firewall settings from dom0, via
qvm-firewall and qvm-run for ping.
Everything had been safe until an hour ago, when I added in the qvm-run/ping
function. I let it run for about 20 mins, and when I came back three of my
qubes were damaged in a way
15 matches
Mail list logo