[qubes-users] Re: Help: Qubes dom0 update interrupted, kernel panic resulted

2018-10-02 Thread Otto Kratik
Just to clarify, the original abort/glitch happened after all updates were 
successfully *downloaded*, but during the upgrade/install process itself.

At present when I try to do:

sudo dnf check-update

I get:

Failed to synchronize cache for repo 'qubes-dom0-cached', disabling.

I have already tried doing:

qubes-dom0-update --clean

and it has no effect on the issue.


I believe some packages are still "stuck" in the local qubes-dom0-cached repo, 
but I have no idea how go about fixing this issue and getting back on track.

Could someone please advise next steps to get this resolved?

Thanks..

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b952462-7461-4559-82a1-8be13e2792e6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Help: Qubes dom0 update interrupted, kernel panic resulted

2018-10-02 Thread Otto Kratik
Qubes 3.2

Last night I was updating dom0, but in the middle of the update I accidentally 
hit some keys on the keyboard, which I now in hindsight realize must have 
included Ctrl-Z.

At that point the update just stopped and froze at item 13/42 which just so 
happened to be qubes kernel 4.14.67-1.

I tried to exit the console but was told there were stopped jobs (update was 
backgrounded no doubt). Not knowing any better in the moment, I force restarted 
my computer and retried the dom0 update. 

It did successfully re-download and install the new kernel, but also said that 
was the only new thing to be installed, and did not make any attempt to pick up 
where it left off and download the other remaining items, 14-through-42 of 42. 
I did qubes-dom0-update a few more times with the same result - it says there's 
nothing new available. The system seemed to think and act as though the other 
packages had all already been updated/installed, even though they hadn't.

The next time I tried a reboot, the boot-up failed with a kernel panic and went 
into a boot loop. Choosing advanced options and using the older kernel 
4.14.57-1 allowed me to boot up, and here I am.

So what should I do from here? Is there any way to force the dom0 update to 
refresh or redo or reset, so that it gets everything it needs to function 
correctly with the newer kernel? I'm not sure what command to use or what 
file(s) to edit in order to forcibly instruct it to re-download and install all 
possible missing packages, when the normal qubes-dom0-update insists there's no 
update available. Right now I have a half-broken system and am not sure how to 
proceed.

Any help would be very greatly appreciated..

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0d3a9655-c941-47f4-82ad-6c987e37d8d3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Intel ME Manufacturing Mode? (Lenovo)

2018-10-02 Thread Steve Coleman
Not just an Apple problem, as Lenovo was also mentioned in the article. 
Any Intel box could theoretically come this way.


One way to look deep inside ME?

Intel ME Manufacturing Mode: obscured dangers and their relationship to 
Apple MacBook vulnerability CVE-2018-4251

http://blog.ptsecurity.com/2018/10/intel-me-manufacturing-mode-macbook.html

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/12996d17-8bda-b422-7141-839aae6d1323%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Whonix-Workstation VM and associate AppVMs not connecting in Qubes 3.2

2018-10-02 Thread John S.Recdep
On 9/29/18 4:12 PM, 'Setherson' via qubes-users wrote:
> I am using Qubes 3.2. All TemplateVMs and dom0 have been updated sometime 
> within the past week.
> 
> Since about the same time, my Workstation TemplateVM and every AppVM based on 
> it has been unable to connect to the internet.
> 
> The Whonix Gateway TemplateVM works fine, as does the sys-whonix NetVM. 
> Furthermore, all the AppVMs based on the Fedora and Debian templates work 
> even when routed through sys-whonix. I also have all the TemplateVMs set to 
> update through sys-whonix, and every one of them is able to do this with the 
> sole exception of whonix-ws-14. So if I had to guess, I’d say the problem 
> lies with the Whonix Workstation TemplateVM itself.
> 
> When I try updating whonix-ws-14, it “hits” everything until the 10th 
> repository. Once it gets there, the screen shows “[working]” and stays there.
> 
> Has anyone else run into this problem? What steps can I take to begin 
> troubleshooting it?
> 
> Thanks in advance!
> 

OK looks solved

https://forums.whonix.org/t/unable-to-connect-to-internet-from-within-whonix-workstation-based-appvms-qubes-3-2/6092/5

issue was autoremove  removed the workstation  , sigh

sudo apt-get install qubes-whonix-workstation   which looks to be about
1000 packages  LOL

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b5c78007-e964-5d6a-ddb4-52ee030b28bd%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Post installation - VMs are not starting

2018-10-02 Thread rafudk
New Qubes user! First install today.

"Qubes-R4.0-x86_64.iso" (DD image) is installed.
Downloaded today (2nd October 2018) 

During the install during options for TemplateVMs, Sys-usb, etc. following 
error appeared: 


--

[Dom 0] Error
['/usr/bin/qubes-prefs','default-kernel','4.14.18-1'] failed:
stdout:""
stderr: "Traceback (most recent call last):
File "/usr/bin/qubes-prefs", line 5, in 
sys.exit(main())
File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qubes_prefs.py", line 
42, in main
return qubesadmin.tools.qvm_prefs.process_actions(parser, args, target)
File "/usr/lib/python3.5/site-packafes/qybesadmin/tools/qvm_prefs.py", line 
116, in process_actions
setattr(target, args.property, args.value)
File "/usr/lib/python3.5/site-packages/qubesadmin/base.py", line 283, in 
__setattr__
str(value).encode('utf-8'))
File "/usr/lib/python3.5/site-packages/qubesadmin/app.py" line 466, in 
qubesd_call
client_socket.connect(qubesadmin.config.QUBSED.SOCKET)
FileNotFoundError: [Errno 2] No such file or directory



When I press OK, I can finish the setup and boot in Qubes OS. BUT there is no 
sys-net, sys-usb or any TemplateVMs. 

I then used the command "sudo journalctl" in terminal




Results (red text):

(1)
"tpm tpm0: A TPM error (6) occurred attempting to read pcr value"

### in white (TPM is disabled/deactivated (0x6))

(2) 
"TDB: tdb_open_ex: could not open file /var/lib/xenstored/tdb: No such file or 
directory"
"Checking store ..."
"Checking store complete."

(3)
"Failed to start Qubes OS daemon."


--2 hours later--

(4)
Some ACPI errors

(5)
Failed to find module 'uinput'





I have been searching GitHub and Reddit. This could be similar. 

#3028 https://github.com/QubesOS/qubes-issues/issues/3028#issuecomment-322330133

If it is the same problem, why do I get it when I haven't used R3.2? remains 
from a previous owner? And what do I need to do to fix it?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c76725a6-18d4-4910-82cb-5a474a9bfe28%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Whonix-Workstation VM and associate AppVMs not connecting in Qubes 3.2

2018-10-02 Thread john s.
On 10/1/18 10:23 AM, Setherson wrote:
>> I should have said in my previous email that I got the same error you just 
>> pasted. What I did was comment out the onion server in 
>> /etc/apt/sources.list.d/whonix.list as well.
>>
>> That fixed the problem for me.
>>
>> --
>> You received this message because you are subscribed to the Google Groups 
>> "qubes-users" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to qubes-users+unsubscr...@googlegroups.com.
>> To post to this group, send email to qubes-users@googlegroups.com.
>> To view this discussion on the web visit 
>> [https://groups.google.com/d/msgid/qubes-users/14B90DBC-970F-44E7-8613-4ABBA7018C5B%40protonmail.ch](https://groups.google.com/d/msgid/qubes-users/14B90DBC-970F-44E7-8613-4ABBA7018C5B%40protonmail.ch?utm_medium=email_source=footer).
>> For more options, visit https://groups.google.com/d/optout.
> 
> Just to be absolutely clear, I meant that commenting out the onion server in 
> whonix.list fixed the updating problem, not any of the other ones.
> 


Another symptom is that  in  anon-whonix  NOR whonix-ws-14   , there is
no  whonixcheck  available

strange

sys-whonix-14   has whonixcheck  which seems to complete fine,  maybe
thing to do is reinstall   whonix-ws-14   at this stage ??




-- 
A895 0C7C A244 8E2E FD77 A3DB 180B 7D4D D158 F8B6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e41da4d4-2c9f-c8ed-4d3c-cb30f3ccaae2%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: qubes-u2f not installing on templates

2018-10-02 Thread John S.Recdep
On 9/26/18 9:48 AM, paigemarie-sgozh3hwpm2stnjn9+b...@public.gmane.org
wrote:
> 
>  
>> All u2f-related packages area already in stable repository (since
>> yesterday), so the above is not needed anymore.
> 
> When I run `sudo apt install qubes-u2f` in my Debian template or `sudo dnf 
> install qubes-u2f` in my Fedora template, I get errors about not being able 
> to locate or match the package.
> 
> I was able to install the dom0 package.
> 
> I'm using Qubes v3.2
> 

Debian-9 and
Fedora-28  Templates ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/570134bb-5491-9852-a7c9-88311c5d11cd%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation, no AMD-vi, interrupt mapping, etc.

2018-10-02 Thread Sergio Matta
Em terça-feira, 2 de outubro de 2018 09:17:43 UTC-3, Sergio Matta  escreveu:
> Em segunda-feira, 1 de outubro de 2018 19:55:24 UTC-3, Sergio Matta  escreveu:
> > Em segunda-feira, 1 de outubro de 2018 16:04:34 UTC-3, naas...@gmail.com  
> > escreveu:
> > > Installation went fine except for a libxenlight config error of some 
> > > kind. I still can't enable IOMMU using either of the approaches described 
> > > in that Ubuntu thread, even though it successfully worked with raw Linux.
> > > 
> > > What boot parameters did you add? I have the earlier rev.1 Sabertooth 
> > > 990FX mobo that you have.
> > 
> > 
> > My mobo is rev.2, firmware 2901
> > I used (ivrs_ioapic[7]=00:14.0 ivrs_ioapic[8]=00:00.2). I am not using 
> > anymore and my qubes 4.0 is working fine.
> > 
> > But ubuntu forum has a solved solution with different ioapic:
> > Quick solution for Sabertooth 990FX (R1.0):
> > Edit file /etc/default/grub, find line "GRUB_CMDLINE_LINUX_DEFAULT=", edit 
> > it to look like:
> > Code:
> > GRUB_CMDLINE_LINUX_DEFAULT="quiet splash ivrs_ioapic[7]=00:14.0 
> > ivrs_ioapic[8]=00:00.1"
> > 
> > There are iommu info here too:
> > from Xen https://wiki.xen.org/wiki/VTd_HowTo
> > 
> > If you can not solve the iommu problem, change all vms to PV. Maybe this is 
> > the cause of libxenlight error. Change all vms to PV, including sys-net.
> > Later I will send you the commands to start networking.
> 
> My cpu is a AMD 1100T and PVH is not much more fast then PV.
> 
> If you want to test it without iommu:
> Change the VMs to PV, including sys-net and sys-firewall (qvm-prefs 
> yourvmname virt_mode PV)
> Using sys-firewall terminal do:
> sudo cp /etc/resolv2.conf /etc/resolv.conf (resolv2.conf has your preferred 
> nameservers)
> ping -c 2 10.137.0.8 (to create vif interface)
> sudo ip link set vif3.0 up
> sudo ip addr add 10.137.0.4//255.255.255.255 dev vif3.0
> sudo ip route add 10.137.0.8/255.255.255.255 dev vif3.0
> - Save the commands above in /rw/config/rc.local and make it executable 
> (chmod +x /rw/config/rc.local):
> Using sys-net terminal do:
> Save then in /rw/config/rc.local and make it executable:
> ip link set vif2.0 up
> ip addr add 10.137.0.3/255.255.255.255 dev vif2.0
> ip route add 10.137.0.4 dev vif2.0
> It should works.

PS: in the command "sudo ip route add 10.137.0.8/255.255.255.255 dev vif3.0", 
change the 10.137.0.8 to your correct VM IP

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b428062f-b0c2-48d7-af00-043326d80816%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation, no AMD-vi, interrupt mapping, etc.

2018-10-02 Thread Sergio Matta
Em segunda-feira, 1 de outubro de 2018 19:55:24 UTC-3, Sergio Matta  escreveu:
> Em segunda-feira, 1 de outubro de 2018 16:04:34 UTC-3, naas...@gmail.com  
> escreveu:
> > Installation went fine except for a libxenlight config error of some kind. 
> > I still can't enable IOMMU using either of the approaches described in that 
> > Ubuntu thread, even though it successfully worked with raw Linux.
> > 
> > What boot parameters did you add? I have the earlier rev.1 Sabertooth 990FX 
> > mobo that you have.
> 
> 
> My mobo is rev.2, firmware 2901
> I used (ivrs_ioapic[7]=00:14.0 ivrs_ioapic[8]=00:00.2). I am not using 
> anymore and my qubes 4.0 is working fine.
> 
> But ubuntu forum has a solved solution with different ioapic:
> Quick solution for Sabertooth 990FX (R1.0):
> Edit file /etc/default/grub, find line "GRUB_CMDLINE_LINUX_DEFAULT=", edit it 
> to look like:
> Code:
> GRUB_CMDLINE_LINUX_DEFAULT="quiet splash ivrs_ioapic[7]=00:14.0 
> ivrs_ioapic[8]=00:00.1"
> 
> There are iommu info here too:
> from Xen https://wiki.xen.org/wiki/VTd_HowTo
> 
> If you can not solve the iommu problem, change all vms to PV. Maybe this is 
> the cause of libxenlight error. Change all vms to PV, including sys-net.
> Later I will send you the commands to start networking.

My cpu is a AMD 1100T and PVH is not much more fast then PV.

If you want to test it without iommu:
Change the VMs to PV, including sys-net and sys-firewall (qvm-prefs yourvmname 
virt_mode PV)
Using sys-firewall terminal do:
sudo cp /etc/resolv2.conf /etc/resolv.conf (resolv2.conf has your preferred 
nameservers)
ping -c 2 10.137.0.8 (to create vif interface)
sudo ip link set vif3.0 up
sudo ip addr add 10.137.0.4//255.255.255.255 dev vif3.0
sudo ip route add 10.137.0.8/255.255.255.255 dev vif3.0
- Save the commands above in /rw/config/rc.local and make it executable (chmod 
+x /rw/config/rc.local):
Using sys-net terminal do:
Save then in /rw/config/rc.local and make it executable:
ip link set vif2.0 up
ip addr add 10.137.0.3/255.255.255.255 dev vif2.0
ip route add 10.137.0.4 dev vif2.0
It should works.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f74db636-c0e9-478a-94bc-918043982959%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Question before buying a new laptop

2018-10-02 Thread taii...@gmx.com
On 10/02/2018 04:53 AM, ben.thomp...@vfemail.net wrote:
> Hi,
> some time ago i discovered qubes, but my laptop did not support it and i
> did not follow the developments.
> Now my old laptop is broken and i am about to buy a new one.

This question has been asked and then answered like 20+ times by me,
twice in the last week.

> 
> I have a few questions:
> How well does passing a dedicated graphics card to a vm work / is gaming
> in a vm feasible or do i still need dual-boot?

Yeah very feasible many people do it including me.

Of course you need the right system you would need an eGPU capable
laptop such as the W520 which you should install an quad core ivy bridge
cpu in so you get pci-e 3.0 for the expresscard slot. As always I
recommend installing coreboot - the ivy/sandy coreboot port has open
cpu/ram init and supports me cleaner to nerf your me (again disabling is
impossible)

I would probably just pick up a workstation board like the KCMA-D8
though as laptop dgpu gaming needs an external monitor if you want to do
it in a VM.

> 
> Did anyone try a Lenovo Legion Y530 and can me write how well it works
> with qubes? (i would upgrade the ram to 16 or 32 GB)
> (I did not see any entry in the list (https://www.qubes-os.org/hcl/).)
> 
> Best
> ben
> 
> 
> -
> 
> ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of
> the NSA's hands!

Haha.

> $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No
> bandwidth quotas!

No such thing as a lifetime account FYI, eventually these services get
too top heavy and run out of money.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd16a5c6-5ee7-04e2-8e50-a76aaa05fb5a%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] nftables vs iptables

2018-10-02 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/1/18 11:48 PM, mfreemon wrote:
> What is the best practice recommendation on this (for R4, Fedora
> 28 template)?  Are we to be using, exclusively, nftables in R4?

The intended benefit was that in case of nftables qubes firewall not
needed to be reloaded all the time.

But: until nftables is not a complete iptables replacement, Qubes is
still needs iptables too.

My personal opinion that this mixed setup causing more confusion, and
do not provide any real benefits at all.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=vNfP
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9e016ed-3066-e219-6d9a-4837fe7f50ee%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] boot qubes with detached luks header on sdcard ?

2018-10-02 Thread Bernhard
I wonder if I could encrypt my (only) disc is a "headerless" more and 
store the header on a separate sdcard. Once any linux-type system is 
completely is booted this is easy. But can the qubes bootloader do that? 
(this needs to find and mount the sdcard first, then fetch the header 
there ). Some experience with that? Cheers, Bernhard


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/770005ca-4733-d831-136e-6ee5dcc5fedd%40web.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Question before buying a new laptop

2018-10-02 Thread ben . thompson

Hi,
some time ago i discovered qubes, but my laptop did not support it and  
i did not follow the developments.

Now my old laptop is broken and i am about to buy a new one.

I have a few questions:
How well does passing a dedicated graphics card to a vm work / is  
gaming in a vm feasible or do i still need dual-boot?


Did anyone try a Lenovo Legion Y530 and can me write how well it works  
with qubes? (i would upgrade the ram to 16 or 32 GB)

(I did not see any entry in the list (https://www.qubes-os.org/hcl/).)

Best
ben


-

ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the 
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!  
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!  


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181002085350.Horde.bTmFcronTqAakq6a-rpB9bT%40www.vfemail.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] nftables vs iptables

2018-10-02 Thread Ivan Mitev



On 10/2/18 1:32 AM, Chris Laprise wrote:
> On 10/01/2018 05:48 PM, mfreemon wrote:
>> On 1/11/18 3:01 PM, Chris Laprise wrote:
>>  > On 01/10/2018 03:47 PM, Connor Page wrote:
>>  >> The official templates use nftables so shouldn’t be mixed with
>> iptables. I didn’t have time to learn about nftables, so just removed
>> nftables package from debian 9 template. YMMV.
>>  >>
>>  >
>>  > Hmmm, I was just thinking how Qubes' own guest scripts still use
>>  > iptables even in fedora-26.
>>  >
>>  > IIUC, iptables and nft are two different interfaces to netfilter. I
>>  > don't know if it really matters, at least for the R4.0 window. I'd
>>  > prefer to put the syntax change (for docs) off until a later release.
>>
>> I was recently thrown by the mix of both nftables and iptables in R4.
>>
>> The qubes docs don't clarify much.  The qubes firewall scripts use
>> nft. Most of the discussion on the qubes website documentation is
>> about iptables, but there are also a few mentions of nft.  The upgrade
>> instructions (going from R3.2 to R4) did not mention converting rules
>> from iptables to nftables.  It looks like other related projects (one
>> example is qubes-tunnel) is using iptables.
>>
>> Just reading a few things and trying to come up to speed, I get the
>> impression that nftables and iptables should not both by used at the
>> same time.  Even if technically possible (i.e. both sets of rules
>> applied correctly), it strikes me as not a great idea to maintain
>> packet filtering rules in two different ways.
>>
>> What is the best practice recommendation on this (for R4, Fedora 28
>> template)?  Are we to be using, exclusively, nftables in R4?
> 
> The last I read about this (for 4.0) is that nftables is used in Fedora
> Qubes code, but Debian Qubes is still using iptables. That still appears
> to be the case since nftables is not installed in my debian-9 templates.
> 
> I've submitted qubes-tunnel to Qubes with iptables commands only, with
> the intention to transition to nftables (or that other new interface in
> Linux, name escapes me just now) for Qubes 4.1. Someone who is just
> starting a project might be better off going with nftables.

... until yet another packet filtering mechanism replaces nftables (in
that case, bpfilter [1]).

I understand the rationale behind using nftables [2] but given how it is
widespread (hint: close to 0 even amongst seasoned sysadmins) IMHO it
wasn't worth it. The OP's post confirms there's quite some confusion
about how it interacts with iptables, and the official documentation is
far from helpful.
I'm quite proficient with iptables and networking in general but it took
me half an hour to understand how to tweak Qubes' nftables rules last
time I wanted to change something in the firewall, while I would have
done that task in less than one minute with iptables. I could have spent
a few hours learning nftables to improve the official doc but at my age
I prefer to spend time learning tech that significantly improves things
(eg. Qubes OS over standard linux distribution) over loosing time
learning stuff that is only marginally better.
Anyway - I digress :)

[1] https://old.lwn.net/Articles/747551/
[2]
https://github.com/QubesOS/qubes-issues/issues/1815#issuecomment-245109500

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/038dbfeb-9bbc-2bd5-2a96-06c761d54a52%40maa.bz.
For more options, visit https://groups.google.com/d/optout.