[qubes-users] Announcement: Qubes Tor onion services are available again!

2019-04-17 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

We previously announced that the Qubes Tor onion services were no
longer being maintained due to lack of resources. [1] However, Unman
generously agreed to bring them back, and they're now available once
again!

Here are the new onion service URLs:

Website:  www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion
Yum repo: yum.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion
Deb repo: deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion
ISOs: iso.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion

Soon, you will be able to get the new, correct repo definitions just by
updating dom0 and your TemplateVMs. However, if you can't wait, you can
edit your repository definitions by following the instructions below.


Instructions


Follow these instructions *only if* you wish to update dom0 and your
TemplateVMs over Tor (via `sys-whonix`). This is an opt-in feature. If,
instead, you wish to update over your regular network connection (aka
"clearnet"), *or if you are not sure*, then *do not* follow these
instructions.

In order to use the new onion services, you must ensure that *every*
line that contains an onion address uses the appropriate *new* address
above. We'll go through this for dom0, Fedora templates, and Debian
templates. Whonix templates do not require any action; their onion
addresses are still the same as before. For additional information, see
"Onionizing Repositories" on the Whonix wiki. [2]


dom0


1. In dom0, open `/etc/yum.repos.d/qubes-dom0.repo` in a text editor.

2. Comment out all the `baseurl = https://yum.qubes-os.org/[...]` and
   `metalink` lines.

3. Uncomment all the `baseurl = [...].onion` lines.

4. Update every `.onion` address to
   `yum.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion`.
   The affected lines should look like this:

   #baseurl = https://yum.qubes-os.org/r$releasever/current/dom0/fc25
   baseurl = 
http://yum.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/r$releasever/current/dom0/fc25
   #metalink = 
https://yum.qubes-os.org/r$releasever/current/dom0/fc25/repodata/repomd.xml.metalink

5. Open `/etc/yum.repos.d/qubes-templates.repo` in a text editor and
   repeat steps 2-4.

6. In *Qubes Global Settings*, set *Dom0 UpdateVM* to `sys-whonix`.


Fedora TemplateVMs
==

1. In the TemplateVM, open `/etc/yum.repos.d/qubes-r4.repo` in a text
   editor.

2. Comment out every line that contains `yum.qubes-os.org`.

3. Uncomment every line that contains `.onion`.

4. Update every `.onion` address to
   `yum.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion`.
   The affected lines should look like this:

   #baseurl = https://yum.qubes-os.org/r4.0/current/vm/fc$releasever
   baseurl = 
http://yum.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/r4.0/current/vm/fc$releasever

5. In dom0, ensure that the first non-comment line in
   `/etc/qubes-rpc/policy/qubes.UpdatesProxy` is:

   $type:TemplateVM$defaultallow,target=sys-whonix


Debian TemplateVMs
==

1. In the TemplateVM, open `/etc/apt/sources.list.d/qubes-r4.list` in a
   text editor.

2. Comment out every line that contains `deb.qubes-os.org`.

3. Uncomment every line that contains `.onion`.

4. Update every `.onion` address to
   `deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion`.
   The affected lines should look like this:

   # Main qubes updates repository
   #deb [arch=amd64] https://deb.qubes-os.org/r4.0/vm stretch main
   #deb-src https://deb.qubes-os.org/r4.0/vm stretch main


   # Qubes Tor updates repositories
   # Main qubes updates repository
   deb [arch=amd64] 
http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/r4.0/vm
 stretch main
   #deb-src 
http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/r4.0/vm
 stretch main

5. In dom0, ensure that the first non-comment line in
   `/etc/qubes-rpc/policy/qubes.UpdatesProxy` is:

   $type:TemplateVM$defaultallow,target=sys-whonix


[1] 
https://www.qubes-os.org/news/2018/01/23/qubes-whonix-next-gen-tor-onion-services/
[2] https://www.whonix.org/wiki/Onionizing_Repositories

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/04/17/tor-onion-services-available-again/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAly36YEACgkQ203TvDlQ
MDD+/g//eGzEagElqNLg/6tQdHTUNZaFQQmEZlNYFt7ZU8QhS7TNQqFR77bHpy+W
1Fbwz2tGMcJwUVj/sQ1A7CQXhhKRL96BtxMjDxTYt5ZQVv7oKs7m1MYUc/3I1hg/
GtNsT7qlPjwMb4XZdrmjyeJg96lYp75msKWDXDsHiAp5Nlq/vuw190TCnw+lGfUJ
+1gf99rGUcfwZZLPl8ZaGlOCjAo6e8qb4ysJH01YvYUt04GQhuUKTyS6OJ8Vq9AV
7cQ1L/Mkc8wNq88T+VEXEmiF/wuVZXDijEV4k/JDyDF0V2ZeljJtMILs5tuvNycK

Re: [qubes-users] backup with debian-10-minimal based sys-usb fails

2019-04-17 Thread Sven Semmler
On 4/15/19 6:25 PM, unman wrote:
> Why do you say this? Backup works fine with a buster qube. What is the
> exact problem that you have?

I apologize. The issue was between chair and keyboard. In Fedora
external drives are mounted under /run/media/user and in Debian under
/media/user ... sorry for wasting your time. I must have been very tired
last time I tried.

It all works now. Funny enough all of my qubes are based on modified
debian-minimal templates, which makes me very happy as there are no
unneeded packages installed. OCD granted. The only qube I have to run
with the full debian template is sys-usb. I'll keep searching what is
needed (natuilus and qubes-core-agent-nautilus alone are not enough). If
I figure it out, I will reply here.

Thank you!

/Sven


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f9e9494b-303f-0118-54af-226efb419181%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] randomizing VPN servers i connect to with my vpnvm?

2019-04-17 Thread Stumpy
I was thinking the line "remote random" in my .ovpn file, along with the 
ip addresses would make the VPN VM randomly select different servers but 
that doesnt *seem* to be the case, the bit that was included in the 
.ovpn files that I think is relevant is:


remote-random
resolv-retry infinite
nobind
cipher AES-256-CBC
auth SHA512
comp-lzo
verb 3

Is there something else i need to do? I assumed it would either change 
when it reconnects or is restarted but that doesnt seem to be the case.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3a99819e-a6fe-60a4-0b64-112ffc679e81%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Spontaneous rebooting

2019-04-17 Thread Michael Siepmann
On 4/13/19 7:56 AM, unman wrote:
> On Sat, Apr 13, 2019 at 08:36:19AM +0200, David Hobach wrote:
>> On 4/12/19 5:24 PM, Michael Siepmann wrote:
>>> On 8/10/18 12:37 PM, Kelly Dean wrote:
>>>
 Am I the only one having a problem with Qubes spontaneously rebooting on 
 Intel hardware? Only other reports I see are about AMD problems, but I'm 
 using an Intel Core i3.

 Happens every few weeks. Sometimes just 1 or 2 weeks, sometimes 5 or 6. 
 Got it on Qubes 3.2, and now 4.0 too (new installation, not upgrade), 
 multiple times.

 Unlikely to be a hardware problem. The system passed both memtest86 and a 
 multi-day mersenne prime stress test. And other OSes tested on this 
 hardware before I switched to Qubes, including Debian and Windows, never 
 had a problem.

 The rebooting seems completely random. No apparent trigger, and no 
 warning. Acts like an instant hard reset. Sometimes even when the system 
 is idle, and I haven't touched the console for hours.

 It's wearingly inevitable enough that I don't even bother intentionally 
 rebooting after system updates anymore, in order to minimize how many 
 reboots I have to deal with (setting my workspace back up is an ordeal), 
 because I know the system will end up spontaneously rebooting a week or 
 two later anyway.
>>> I'm having this problem too. I hadn't had it for a while but in the past
>>> week or so it's happened a few times. I have a Lenovo ThinkPad T440p
>>> with Intel Core i7, and Qubes 4.0 which I keep updated.
>> Same here, but only since 4.0 and since coreboot & ME-cleaner on a T530.
>>
>> I've always suspected that it's related to memory kills (there was an OOM
>> issue on github), but there's absolutely nothing in the journal after such a
>> "forced" reboot.
>>
> I dont see this on any machine, including long running desktops.
> Is it possible that you are suffering from over-heating? That would
> account for symptoms.

I'm now monitoring temperatures with the "sensors" command in a dom0
terminal and although the problem hasn't yet happened again, the
temperatures I'm seeing are often getting close to or even reaching
"Critical":

coretemp-isa-
Adapter: ISA adapter
Package id 0: +100.0°C  (high = +84.0°C, crit = +100.0°C)
Core 0:    +99.0°C  (high = +84.0°C, crit = +100.0°C)
Core 1:   +100.0°C  (high = +84.0°C, crit = +100.0°C)

acpitz-virtual-0
Adapter: Virtual device
temp1:    +99.0°C  (crit = +200.0°C)

thinkpad-isa-
Adapter: ISA adapter
fan1:    4788 RPM

If over-heating is the cause, does that suggest a hardware problem, or
is there something I can do to configure Qubes differently to stop it
from getting so hot?

Thanks!


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ed85497-3b60-757f-c74a-0b7cc20bb5bb%40TechDesignPsych.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Qubes - the future of gaming!

2019-04-17 Thread Chris Laprise

On 4/17/19 12:03 PM, unman wrote:

Wrong right there.
If you think that the 88% market share for Windows in laptop/desktops is
down to gaming then you are indeed in fantasy land. (That's about 44%
computer usage).
Steam reports a woeful 0.82% linux clients - that's been fairly consistent
for the past 4 years.

I'm reminded of that saying - "To a man with a hammer, everything looks
like a nail"


I agree with unman, but for specific reasons. Despite the trend in Linux 
gaining something like ABI stability, as you go up in the stack there is 
less and less commitment to stable interfaces. Nowhere is this chaos 
more apparent than in User interfaces, which are near the top of the stack.


The primary role of an interface is to make a promise of stability - 
"you can keep addressing me this way and I'll respond that way". Linux 
fails badly at this so its the last platform app developers think of 
when they plan to do new and exciting things; as a platform it 
constantly shakes and twists. So without that certain combination of 
stability where app devs can base their new and exciting projects - and 
making most users who try it feel unsettled by the experience - people 
of a conventional mindset will not flock to Linux.


Imagine you have to do tech support for an app with many novice users: 
How do you direct them through the GUI? You can't on Linux except in 
terms that are too generalized to provide reassurance. So you fall back 
on giving most instructions in the CLI, which is what most Linux people 
do... and I rest my case... UI/UX fail.


Linux has a certain *runtime* stability. It does not have *feature* 
stability with a well-defined set of rich (PC appropriate) features and 
interfaces the way Windows and OS X do. The chaos also follows into 
hardware choices, since the regular Linux distro mindset is "Use Wintel 
hand-me-downs".


It should also be apparent that Android averted most of these 
anti-patterns, despite being based on the Linux kernel and despite the 
dependency on Google which creates problems of its own.


-

Having Steam and X-number *ported* games is not going to be a big draw 
to Linux. Having ported apps won't do much better. Users and devs must 
first see a rich platform that is not going to shift under their feet. 
They must see some unified hardware + software vision (again, see Android).


Apple and MS and Google think this way: How do I draw app developers 
here as a great place to attract and interface with their user audience? 
Vertical integration brings interesting silicon/OS features to users' 
fingertips.


FOSS people think this way: U be system programmer / app developer / 
system administrator, all in one. Tinker, take things apart, maybe build 
a supercomputer someday. Vertical integration is a threat to my freedom, 
unless I'm the one integrating it.


Both of these camps suffer from their own kind of delusions, greed and 
negative politics. In FOSS, if you took the most focused and wise 
designers from Mozilla, Canonical and Google, I think you could make 
some kind of broadly attractive platform that is more open and secure 
than Android. It would be a fantastic thing to see.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f62b1c93-5b60-8369-4a68-29b7fca7bc09%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing databases on templates and they need updates.

2019-04-17 Thread Sergio Matta
> I run a number of databases using bind-dirs without any issues: the
> larger ones contain significant amounts of data.
> I also run a caching proxy using bind-dirs to store the log files and
> cached packages.
> I have never encountered any issues with this. YMMV

That's good to know. I have few server applications with a lot of dependence on 
other systems. I also had good solutions specializing templates and changing 
their file system. /rw is a good way too. I have no experience with bind-dirs. 
With your guidance, I was already going to use it for configuration files, but 
I'll use it for large files as well.
Thank you Unman!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/35dd544d-7d6c-45a6-b865-9cecddc660c4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing Mirage Firewall

2019-04-17 Thread 799
Hello Claudio

Claudio Chinicz  schrieb am Mi., 17. Apr. 2019, 15:39:

> Hi All,
>
> I'm trying to install/test/play with Mirage, following instructions from
> https://github.com/mirage/qubes-mirage-firewall.
>
> Honestly, I've got entirely lost, since I'm not a pro and not proficient
> with Linux.
>
> Can anyone provide a step-by-step recipe how to install the unikernel?
>

I was also struggling with the installation, therefore (and to save time
for the Mirage Pros to develop the firewall not helping newbies like
myself) I have created a howto:

https://github.com/Qubes-Community/Contents/blob/master/docs/customization/mirage-firewall.md

You can run all steps from dom0 ;-)
If you need further help, to not hesitate to ask.
I'd like to hear your feedback, if we can improve the howto.

- O/799

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2uKdGKCV6fxZrT53s7qs7KMpyyYPdundjkJ8o_DEyM9UQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes - the future of gaming!

2019-04-17 Thread unman
On Wed, Apr 17, 2019 at 07:47:27AM -0700, Alex A wrote:
> Good now i've got your attention,
> Lets discuss the now VIABLE future of gaming on Linux (specifically on Qubes)
> And YES you non gamer workstation only people SHOULD CARE about this (tell 
> you why in a moment)
> 
> Quick video  for those no up to date on the state of gaming on Linux:
> https://youtu.be/Co6FePZoNgE
> TL;DR
> Steam is now supported on Linux,
> Over 5,000 native linux games
> + Protondb.com is a new tool released by Valve Software that has been 
> integrated with Steam Play to make playing Windows games on Linux as simple 
> as hitting the Play button. 
> ++ lutris.net also opens up many more games at the press of a button
>  Google Stadia is running on Linux servers & using Vulkan is their 
> graphics API
> And because of all this.. NVIDIA is working overtime to match AMDs already 
> comprehensive open source drivers. 
> = Gaming revolution coming to Linux
> 
> Some distros already like "Pop OS & Manjaro" are even coming "game ready" 
> with steam pre-installed as well as UPDATED DRIVERS.
> Even the HTC Vive Virtual reality is reported working well on Linux
> https://youtu.be/2Db-zkHC8s0
> 
> COULD THIS BE IT?
> Could finally my dreams of have a secure OS and still game without having to 
> touch windows ever again be coming TRUE?
> 
> In the past when i've looked into gaming on Qubes, I (unsuccessfully) tried 
> to setup a Qubes Windows VM running PCIe pass through (I wasnt even 
> successful getting the Win7 VM setup),
> But i would imagine a Linux based VM with PCIe pass through would be easier 
> to support?
> 
> Now, WHY should all you serious Sams & Susans Care about games?
> Because gaming is ultimately what keeps everyone bound to windows. Any 
> platform that enables users to dump Microsoft, and still have a holistic 
> experience, is going to tremendous growth.
> And larger community will accelerate development and secure the future of 
> that platform.
> 
> Thus, Qubes SHOULD get on this train!!
> Having a "game ready" VM will grow the community.
> Maybe the "Game VM" may also be able to GPU accelerate rendering. video 
> editing etc? Opening the door to even more users.
> 
> 
> Ok, now your free to tell me why im wrong and living in fantasy land..?
> 


gaming is ultimately what keeps everyone bound to windows.


Wrong right there.
If you think that the 88% market share for Windows in laptop/desktops is
down to gaming then you are indeed in fantasy land. (That's about 44%
computer usage).
Steam reports a woeful 0.82% linux clients - that's been fairly consistent
for the past 4 years.

I'm reminded of that saying - "To a man with a hammer, everything looks
like a nail"


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190417160317.txg2ge7hkb2ffzuy%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing databases on templates and they need updates.

2019-04-17 Thread unman
On Wed, Apr 17, 2019 at 06:16:00AM -0700, Sergio Matta wrote:
> > Look at bind-dirs  - www.qubes-os.org/doc/bind-dirs
> 
> Thank you Unman. I am using Qubes since 3.2 and I did not remember this 
> solution. 
> It is time to me to read the Qubes documentation all over again. 
> 
> I will use bind-dirs to solve my other need with configuration files located 
> in /etc and /usr/share dirs, but I did not like it to databases. 
> 
> I think they need a better sized area, file-system, eventually SSD, and some 
> personalized things. In my mind the solution was something like a persistent 
> and shared mount point with the vm and its template, easely listed and 
> configurable in Qubes settings.
> 

I run a number of databases using bind-dirs without any issues: the
larger ones contain significant amounts of data.
I also run a caching proxy using bind-dirs to store the log files and
cached packages.
I have never encountered any issues with this. YMMV

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190417152934.pysu67st2wdcxgvq%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes - the future of gaming!

2019-04-17 Thread Alex A
Good now i've got your attention,
Lets discuss the now VIABLE future of gaming on Linux (specifically on Qubes)
And YES you non gamer workstation only people SHOULD CARE about this (tell you 
why in a moment)

Quick video  for those no up to date on the state of gaming on Linux:
https://youtu.be/Co6FePZoNgE
TL;DR
Steam is now supported on Linux,
Over 5,000 native linux games
+ Protondb.com is a new tool released by Valve Software that has been 
integrated with Steam Play to make playing Windows games on Linux as simple as 
hitting the Play button. 
++ lutris.net also opens up many more games at the press of a button
 Google Stadia is running on Linux servers & using Vulkan is their graphics 
API
And because of all this.. NVIDIA is working overtime to match AMDs already 
comprehensive open source drivers. 
= Gaming revolution coming to Linux

Some distros already like "Pop OS & Manjaro" are even coming "game ready" with 
steam pre-installed as well as UPDATED DRIVERS.
Even the HTC Vive Virtual reality is reported working well on Linux
https://youtu.be/2Db-zkHC8s0

COULD THIS BE IT?
Could finally my dreams of have a secure OS and still game without having to 
touch windows ever again be coming TRUE?

In the past when i've looked into gaming on Qubes, I (unsuccessfully) tried to 
setup a Qubes Windows VM running PCIe pass through (I wasnt even successful 
getting the Win7 VM setup),
But i would imagine a Linux based VM with PCIe pass through would be easier to 
support?

Now, WHY should all you serious Sams & Susans Care about games?
Because gaming is ultimately what keeps everyone bound to windows. Any platform 
that enables users to dump Microsoft, and still have a holistic experience, is 
going to tremendous growth.
And larger community will accelerate development and secure the future of that 
platform.

Thus, Qubes SHOULD get on this train!!
Having a "game ready" VM will grow the community.
Maybe the "Game VM" may also be able to GPU accelerate rendering. video editing 
etc? Opening the door to even more users.


Ok, now your free to tell me why im wrong and living in fantasy land..?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fbf2591a-ee53-40eb-af83-eeff0b322196%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing databases on templates and they need updates.

2019-04-17 Thread Sergio Matta

> On 4/17/19 3:16 PM, Sergio Matta wrote:
> 
> > In my mind the solution was something like a persistent and shared
> > mount point with the vm and its template,
> 
> This is a very bad idea.
> You would ruin the separation between the VMs, as one compromised VM
> would be able to compromise the template -> then all the VMs based on
> that template...
> 
> 
> - -- 
> Zrubi

Dear Zrubi, you are right!  
Reading my text again I understand you, the word "shared" was misplaced and the 
"vm and its template" is not a direction. My intention is to keep persistent to 
the VM. The shared area is from the template to vm, not back from vm to 
template.
Thank you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0f7cd09f-d611-4e2e-9854-4128fbdd2fee%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installing Mirage Firewall

2019-04-17 Thread Claudio Chinicz

Hi All,

I'm trying to install/test/play with Mirage, following instructions from 
https://github.com/mirage/qubes-mirage-firewall.


Honestly, I've got entirely lost, since I'm not a pro and not proficient 
with Linux.


Can anyone provide a step-by-step recipe how to install the unikernel?

Thanks a lot in advance,

Claudio

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/q97a9j%242gcj%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing databases on templates and they need updates.

2019-04-17 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 4/17/19 3:16 PM, Sergio Matta wrote:

> In my mind the solution was something like a persistent and shared
> mount point with the vm and its template,

This is a very bad idea.
You would ruin the separation between the VMs, as one compromised VM
would be able to compromise the template -> then all the VMs based on
that template...


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=g81s
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24bf93b9-0624-131d-f3bb-7c60c9d06163%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing databases on templates and they need updates.

2019-04-17 Thread Sergio Matta
> Look at bind-dirs  - www.qubes-os.org/doc/bind-dirs

Thank you Unman. I am using Qubes since 3.2 and I did not remember this 
solution. 
It is time to me to read the Qubes documentation all over again. 

I will use bind-dirs to solve my other need with configuration files located in 
/etc and /usr/share dirs, but I did not like it to databases. 

I think they need a better sized area, file-system, eventually SSD, and some 
personalized things. In my mind the solution was something like a persistent 
and shared mount point with the vm and its template, easely listed and 
configurable in Qubes settings.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed07b260-9890-4164-be46-d5c7709ee6b8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.