[qubes-users] Qubes OS Installation Resolution

2019-06-27 Thread '[NOTIFICATION]' via qubes-users
It appears the USB stick that was used to flash the ISO was not sufficient. 
Switched to a 16GB USB stick as the previous was only 8GB. The 16GB USB stick 
worked. After installing the QUBES OS it was pretty straightforward thereafter. 
The reason was because had already experienced PARROT OS. Now...

The problem with QUBES OS is not the security architecture. The problem is the 
ease of convenience when it comes to to eh various VM instances. As a new user 
to QUBES OS, it seems more complicated than usual. One of the main issues was 
the ethernet tethering passthrough. That was so difficult to set up due to the 
lack of or vague instructions. QUBES OS should have a more user friendly 
interface or framework. While it does seem simple as it can get, The ability to 
maneuver in the infrastructure can be confusing. Sometimes just using 
VIRTUALBOX can seem much more easier because of its visual 
compartmentalization. Along with the extension pack to share data between, 
QUBES OS does not have this setting options. In QUBES OS, you have to do it 
each time? Anyways, hope to some QUBES OS improvement in terms of interface and 
ease of use?

You should give PARROT OS a try to get familiar with some features that QUBES 
OS can truly benefit from. Had to revert to PARROT OS again to use the 
tethering that was difficult to setup in QUBES OS.

FOOTER
Communicative Correspondence per procurationem /s/ in esse S.J. Agent

Express Actual Notice: ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE 
ACT (PUBLIC LAW 106–229—JUNE 30, 2000) & UNIFORM ELECTRONIC TRANSACTIONS ACT 
(1999) & UNIFORM COMMERCIAL CODE 3-401 SIGNATURE. This message is deemed 
private or confidential. Unless for criticism or news-report or research or 
scholarship or teaching or comment or opinion, this message may also be deemed 
copyright. Due to existence of sophisticated data collection programs globally, 
assume or presume by default that all digital data associated with this account 
is subject to intercepts, storage, surveillance or monitoring by intelligence 
systems and agencies, anytime or anywhere regardless of privacy or security or 
encryption (EO10995). Sender(s) or agent(s) accepts no liability for any 
message(s) or its attachment(s). All typing errors are not intended or 
intentional. Keep sent attachment size less than inbox size of 1 GB. Without 
Prejudice. All Rights Reserved. Special Deposit.

If server failure, use alternative emergency secondary secure email(s): 
agent1...@bitmsg.ch (1GB) or agent1...@elude.in (50MB)

Test your Net Security @ https://www.grc.com/x/ne.dll?rh1dkyd2
Test your browser SSL/TLS @ https://www.ssllabs.com/ssltest/viewMyClient.html

You are receiving this due to possible time zone conflicts & to reduce and save 
forever paper, ink, phone minutes, fax, travel fuel and national-international 
mail postage expenses, excluding incurred data costs.

Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ghasZ0Cq9JbxzdYndf9FN_S7WzP970i7gNbiG1cZ07yNauf_6xdIouvZWFTqx_5-CKytZmY4wRNhD_hg2qgK3qMIe0wUwfccSCCuplToF9k%3D%40protonmail.ch.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Unable to get network adapter working

2019-06-27 Thread Chris
> You fooled me with the cogent problem description and troubleshooting
> approach.

(~_^) I am a professional Googler and I might have found a solution.

Rmb the dmesg logs above where qubes show
[ 4.742826] igb :00:06.0: Using MSI interrupts. 1 rx queue(s), 1 tx queue(s)

while Ubuntu show
[13.700337] igb :01:00.0: Using MSI interrupts. 2 rx queue(s), 2 tx queue(s)

Apparently since 2013, the Intel note for igb drivers contains a 
troubleshooting section. The latest note:

> Some systems have trouble supporting MSI and/or MSI-X interrupts. If your
> system needs to disable this style of interrupt, the driver can be built and
> installed with the command:
> make CFLAGS_EXTRA=-DDISABLE_PCI_MSI install

> Normally the driver will generate an interrupt every two seconds. If you're no
> longer getting interrupts in cat /proc/interrupts for the ethX igb device,
> then this workaround may be necessary.

Couldn't figure out how to build the drivers (no network to install kernel 
headers) so more Googling pointed to a kernel option to disable msi.

I used to command 'qvm-prefs sys-net kernelopts "pci=nomsi"' in dom0 and 
rebooted sys-net. Lo and behold, the interface has gotten an IP address!!! Ping 
is good and so far no network drop.

Kinda lost track of how many changes I have made so I will do a fresh install 
and confirm again that disabling msi does the trick.

> I'd find new
> hardware if it was me.

I would have did that if Qubes had some certified hardware. But I also wanted 
something small just for secure work and leave my larger desktop PC for more 
resource intensive apps and Windows stuff. This thing is literally the size of 
my hand.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ac02804f-b0df-42c3-8514-b98428d566a0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] network graph [feature request]

2019-06-27 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 27/06/2019 8.15 PM, Andrew David Wong wrote:
> On 27/06/2019 6.44 PM, haaber wrote:
>> Hi, by running qvm-ls a directed graph of which qubes depends on 
>> which other as netVM can be obtained. I thought that this would
>> be nice to have the network graph visualized in the qubes widget
>> (or in network-manager, which is more natural, but maybe harder
>> to fiddle in the code).
> 
>> The graph is flat, loop-free, and easy to organise: on top go
>> VM's without netvm, from there we branch childs. In general, 5
>> layers will suffice. The only question is whether that would need
>> extra python libraries to be brought into dom0 (like networkx,
>> pyplot which probably is not wanted) ... anyways, I though I
>> throw the idea in the ring. Have a good one, Bernhard
> 
> 
> Something like this has already been implemented. I remember seeing
> it in Qubes OS. I can't seem to find it now, though, so either:
> 
> 1. It was in 3.2 but not carried over to 4.0, or 2. It's accessed
> from Qubes Global Settings, which is currently broken.
> 

The Qubes Global Settings fix is in testing, by the way:

https://github.com/QubesOS/qubes-issues/issues/4988

> There's also this open issue:
> 
> https://github.com/QubesOS/qubes-issues/issues/2575
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl0VauYACgkQ203TvDlQ
MDB0BRAAqVHjluh7Rmet6PwIa+Ku+yYcUrckYpMdH9houYem+67/fAZvv6jok8oa
rbgZICJCWcX4DEkboYCRZUhcjFxB89uOMNi7NoI6UoNZSRsWLiG+lC0oDxOjXMrM
f+f7gg/J63xO2WHYZ8EJUzo3w1xkHz8bYrgtIdEqbuR1M4iTroGWavuxU59HxfC2
+W71f2xk2LuKJKBfCY8dOLM7XPffDwWaLQBeFQ+uGKMDs5Qgb+8rXDDuprCDkEje
yiRawynK6+rH0jDpmmi8iPcFc0uoL7dHno0M0yZCweAG5sFaE9UzYnkKDUdJK1EK
/6qAQW/5mqBFMp1+cF3nIyMi5Mhqh3t0lpYYjzeM0Lwd/Pue+8A8S+eAU2L9h9wO
E477ghXDUsQpiRVarPluGiiG78hpH1/d+1W83NSYw71VSQXkhBrUnkHk3lynDRta
BuGm9I8B4UJD/PZjYN4ficuoTMCyPndcqiRY2XDwzwl97SBOlFkY31q0MD8y1v8c
3PNGyPR0tHS9VcapTzY2VSNXt4oTz2L3WlJt11YGlIKJOMC9GNlN/jJXseNtYUbd
ywZtrlwi5DAbL8V/eOvrfp3xznxNc73GOUoHRiMltvaIjVsBg41IFZJCOC8LdfZK
mOA7BYtQRXuJf9Su3xHNnLznE58cAw06wHzcMu98pQzGjNpfU7E=
=Vopo
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0056a51e-158e-7a1c-c8b5-1230cd8135f9%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Marek Marczykowski-Górecki to speak at Xen Developer and Design Summit 2019

2019-06-27 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

Marek will be speaking at this year's Xen Developer and Design Summit.
[1] The summit will take place July 9-11 in Chicago, Illinois. Marek's
presentation is titled, "A Journey to Mirage OS as Xen PVH." Here is the
description from the Xen summit schedule [2]:

> Marek will present difficulties faced during converting Mirage OS Xen
> build from old PV-only Mini-OS fork, to recent Unikraft with addition
> of PVH support. This talk will focus mostly on the latter part -
> adding PVH support to Unikraft, its current state and future work.
> There will be also a little of context how is that useful for Qubes
> OS.

Please see the Xen summit schedule for further session details. [2]

[1] https://events.linuxfoundation.org/events/xensummit-2019/
[2] 
https://xensummit19.sched.com/event/PFW3/a-journey-to-mirage-os-as-xen-pvh-marek-marczykowski-gorecki-invisible-things-lab

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/06/27/marek-marczykowski-gorecki-xen-summit-2019/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=m9AK
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82947a40-4b2d-593c-9f96-77dac3d20731%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] network graph [feature request]

2019-06-27 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 27/06/2019 6.44 PM, haaber wrote:
> Hi, by running qvm-ls a directed graph of which qubes depends on
> which other as netVM can be obtained. I thought that this would be
> nice to have the network graph visualized in the qubes widget (or
> in network-manager, which is more natural, but maybe harder to
> fiddle in the code).
> 
> The graph is flat, loop-free, and easy to organise: on top go VM's 
> without netvm, from there we branch childs. In general, 5 layers
> will suffice. The only question is whether that would need extra
> python libraries to be brought into dom0 (like networkx, pyplot
> which probably is not wanted) ... anyways, I though I throw the
> idea in the ring. Have a good one, Bernhard
> 

Something like this has already been implemented. I remember seeing it
in Qubes OS. I can't seem to find it now, though, so either:

1. It was in 3.2 but not carried over to 4.0, or
2. It's accessed from Qubes Global Settings, which is currently broken.

There's also this open issue:

https://github.com/QubesOS/qubes-issues/issues/2575

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=XZ7H
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a72cfdee-873b-9a86-3c7f-a52267abae07%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] network graph [feature request]

2019-06-27 Thread haaber

Hi, by running qvm-ls a directed graph of which qubes depends on which
other as netVM can be obtained. I thought that this would be nice to
have the network graph visualized in the qubes widget (or in
network-manager, which is more natural, but maybe harder to fiddle in
the code).

The graph is flat, loop-free, and easy to organise: on top go VM's
without netvm, from there we branch childs. In general, 5 layers will
suffice. The only question is whether that would need extra python
libraries to be brought into dom0 (like networkx, pyplot which probably
is not wanted) ... anyways, I though I throw the idea in the ring. Have
a good one, Bernhard

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/66a092df-544a-4165-53e1-fdec78c89178%40web.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] debian-dvm [solved]

2019-06-27 Thread haaber


That's very strange.
I dont see this behaviour.
I'll take a look in the mornng.



I'm afraid I cant reproduce. :-(
Works for me.


After recent updates on dom0 & buster, problems disappeared. Cheers,
Bernhard

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/205d9d7c-0477-5d4b-e49b-083a739646d3%40web.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: wasabi in qubes

2019-06-27 Thread 'awokd' via qubes-users
ehag...@gmail.com:
> Ok, first thanks for the links. 
> 
> what is a template 
> 
> Its mor fundamental than the vm right 
> 
> how is it done  
> 
Please review the Qubes documentation in https://www.qubes-os.org/doc/.
It covers the basics and then some. You might want to think twice about
storing coins in Wasabi on Qubes+Whonix until you have a solid
understanding of everything involved. It can be easy to lose access to a
wallet if you do not.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dd059d6f-0676-62fe-66fe-a7be0b12d1e6%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Pass Capita with Tor

2019-06-27 Thread ehage39
This takes som explanation. With capita I mean that box that comes up when 
preforming a registration or setting up a new account at a webbpage. In order 
to confirm thar youre not a robot and so on. 

I tried this with my Tor browser and just dont work out. I tried it a number of 
times an eventually realized that the browser is the problem.

Why is that and can be don about it

Thanks for youre time and suport

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b400fab9-0fb8-4aa1-8815-2efe86a4d011%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: wasabi in qubes

2019-06-27 Thread ehage39
I did down load wasabi, extracted and selected destination folder for the 
files. Then I used dolphin to try and find them in order to compleat the 
instalation. but they wasent visibel in the selected folder. 

How come

souldent dolphin be used like that 

the fil finder in the non whonix wm works fine   

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/891a9491-09ea-40e9-a2bd-f6559a82ccd9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: wasabi in qubes

2019-06-27 Thread ehage39
I just have no ider hoe stuff acturly works so im some what cautious.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/264af340-5ae7-49e7-ad62-3c69a45552c3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: wasabi in qubes

2019-06-27 Thread ehage39
why would wasabi some how compromise alla whonix gatways 

The are all seperated right like individual computers 

if a program can do that then whole qubes consept would be useles

 

sorry dident realy get the qustions I was asked.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ca1d0fd0-2519-49e6-afad-4aea01438b57%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: wasabi in qubes

2019-06-27 Thread ehage39
Ok, first thanks for the links. 

what is a template 

Its mor fundamental than the vm right 

how is it done  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ad2e37d4-365f-4c22-8f49-afdb7294cd9d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes - Critique (long)

2019-06-27 Thread Marc Griffiths
Thanks for your input Brendan, David, Chris.

Having switched to KDE, the laptop is now completely stable, and in my
opinion far more usable than XFCE.

I'm also running Trisquel on a Thinkpad X200 flashed with Libreboot, which
feels more secure although requires more care over choosing what to
install. I would be keen to see a laptop that supports Libreboot and is
powerful enough to run Qubes.

What are your thoughts on LXD? Lightweight enough to run on an X200/T400,
although of course not offering the same compartmentalization as XEN,
sharing the same kernel etc

[and yes something can 'feel' more secure, insight deeper into the stack
results in more trust]


Marc Griffiths
marc.d.griffi...@gmail.com



On Mon, 20 May 2019 at 20:58,  wrote:

> On Friday, May 10, 2019 at 2:09:09 PM UTC-4, Chris Laprise wrote:
> > On 5/10/19 12:16 PM, Marc Griffiths wrote:
> > > Next step for me is ordering a T400, which doesn't have Intel
> Management
> > > Engine, supports Libreboot, and has proven itself as an uncrashable
> > > workhorse. I used to run Windows and SUSE on this laptop back in
> > > 2008-2011, it never crashed, despite running a complex J2EE dev
> > > environment. I will miss having 16GB RAM, but the i7 I can happily
> part
> > > with.
> >
> > I doubt that Qubes will install or run on a T400. Qubes was initially
> > developed on Sandy Bridge-era hardware, and the requisite virtualization
> > features in chipsets was still maturing up to that point.
> >
> > I feel obliged to mention that if you want to avoid management engines
> > and a raft of other processor vulns, you should look to the AMD 15h
> > generation of chips (circa 2013). In the form of a Lenovo G505s A10,
> > installing Qubes first requires re-flashing the firmware with
> > Coreboot... an exercise that I'm about to try. :)
>
> As much as is really quantifiable...what percent of the real-world risk of
> the Intel ME to end-user is related to the fact that the
> manufacturer-whitelisted networking chipsets are directly usable by the
> firmware, primarily in support of the AMT feature set (and anything
> remotely hijacking via AMT, potentially without local compromise)?
>
> Which is to say: isn't one important mitigation of remote pwnage the
> disabling and/or removing (as appropriate) of the manufacturer-supplied
> network connections? Without a custom firmware, one can always use a
> USB-based wifi/ethernet connection..and with custom firmware (when
> possible) you can bypass the hardware whitelist and supply your own
> third-party wifi/bt card that the local AMT portion of the firmware has not
> been designed to talk to.
>
> Brendan
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/d84a4fe5-1dcf-4c77-b86a-663672532fcd%40googlegroups.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPsYiwpVzO%3DN1Siver%2BYrKhsULLTTbVZmw59vm9utBxO%2BcLp-A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] debian-dvm

2019-06-27 Thread unman
On Tue, Jun 25, 2019 at 05:10:16PM +0100, unman wrote:
> On Tue, Jun 25, 2019 at 12:34:50PM +1000, haaber wrote:
> > > On Mon, Jun 24, 2019 at 09:51:27AM +1000, haaber wrote:
> > > > Hello, I have a funny (and slightly annoying) behaviour when running a
> > > > debian-dvm (based on buster): trying to start it via
> > > > debian-dvm->terminal will make the dvm start and immediately shutdown.
> > > > If I ask for other apps, like "files", "thunderbird" or whatsoever, I
> > > > does start normally. Does someone how this / Have a cure?  cheers, 
> > > > Bernhard
> > > > 
> > > 
> > > This is known issue: the desktop file in buster references debian-xterm.
> > > The cure is to change the exec line in the menu from "xterm" to
> > > "debian-xterm".
> > > A fix is in the pipeline.
> > > 
> > 
> > Hi unman, now, after recent buster updates, debian-dvm will just fail
> > all the time, even when first starting debian-dvm with "files" and then
> > in dom0: qvm-run dispxxx xterm : it will crash the disp-system ("failed
> > withcode:1 "), while  "qvm-run dispxxx debian-xterm" yields "command
> > failed code 127". Finally "qvm-run nome-terminal" gives a silent death,
> > and the qubes-widget kills it as well.  Finally, regular debian-VM's
> > don't show this behaviour ...  Bernhard
> > 
> 
> That's very strange.
> I dont see this behaviour.
> I'll take a look in the mornng.
> 

I'm afraid I cant reproduce. :-(
Works for me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190627114903.iu7h5jxpol56wn4b%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TemplateVM updates almost instantly fail when target is VPN qube but dom0 updates run just fine

2019-06-27 Thread unman
On Wed, Jun 26, 2019 at 10:12:40PM -0700, Sphere wrote:
> @unman: thanks for that
> I also noticed that qubes-updates-proxy.service fails by default on startup 
> and I'm unsure if that is a minimal template-only problem but I was able to 
> fix it thanks to it indicating that the problem is a missing folder: 
> /var/run/qubes-service/qubes-updates-proxy
> 
> Pretty much the same problem that I get with clocksync service thankfully so 
> I was able to confirm that this service was running as intended
> 
> systemctl status qubes-updates-proxy:
> qubes-updates-proxy.service - Qubes updates proxy (tinyproxy)
>Loaded: loaded (/usr/lib/systemd/system/qubes-updates-proxy.service; 
> enabled;
>  vendor preset: enabled)
>Active: active (running) since Thu 2019-06-27 12:06:14 +08; 2s ago
>   Process: 1603 ExecStartPre=/usr/lib/qubes/iptables-updates-proxy start 
> (code=e
> xited, status=0/SUCCESS)
>  Main PID: 1608 (tinyproxy)
> Tasks: 3 (limit: 414)
>Memory: 4.1M
>CGroup: /system.slice/qubes-updates-proxy.service
>??1608 /usr/bin/tinyproxy -d -c 
> /etc/tinyproxy/tinyproxy-updates.conf
>??1609 /usr/bin/tinyproxy -d -c 
> /etc/tinyproxy/tinyproxy-updates.conf
>??1610 /usr/bin/tinyproxy -d -c 
> /etc/tinyproxy/tinyproxy-updates.conf
> 
> Jun 27 12:06:14 redacted systemd[1]: Starting Qubes updates proxy 
> (tinyproxy)...
> Jun 27 12:06:14 redacted systemd[1]: Started Qubes updates proxy (tinyproxy).
> Jun 27 12:06:14 redacted tinyproxy-wrapper[1608]: Found tinyproxy at 
> /usr/bin/tinyproxy
> 
> Despite this however, the problem still persists and still behaves the same 
> even after trying dnf update for 5 times
> 
> I think is right about the fact that there is a bug about this
> 
> @Chris I think you may be right about the fact that this is a bug and I guess 
> it's time to escalate it into an issue in github. I'm willing to lend a 
> helping hand in making the issue as needed.
> 
> My setup is all fully dependent on variations of fedora-30-minimal template 
> that I have tailored depending on use-case of the AppVM that would be using 
> it.
> 

Like Chris, I use a separate qube for updates.
Unlike you and Chris I don't see the behaviour you report.

Let's try to dig in before raising a bug report.

I've tested this with 30-minimal template 201905071541 and 201906241949,
from stable and testing.
I've tested against dom0 stable and dom0 testing: both fully updated.
Test boxes are an old x230 and a custom rig with X-series CPU and 32G RAM.

In all cases, the proxy is started as appropriate, and the update
process (from fedora 29 and 30-minimal) waits until proxy is up and then
proceeds.

What hardware are you, Sphere and Chris, running?

Sphere - if you create a dedicated update qube using the 30-minimal with
qubes-core-agent-networking installed,
enable the qubes-updates-proxy service, route it through
sys-firewall, and edit the policy file appropriately, do you see the
same behaviour? (Almost instant fail)
What if you start the new update proxy before attempting a 'dnf update'?

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190627114448.mlnylqqpnf727ni4%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Quick question please, need help!

2019-06-27 Thread Sphere
The general idea is correct
If dom0 gets pwned then everything else can be pwned and stolen, including your 
data
pwning dom0 properly and successfully however, is not trivial because dom0 has 
no direct access to network hardware to communicate in the first place and 
malicious actors would need malware to communicate directly to the C2 server 
for commands.

What's great about qubes is the fact that with proper hardening, it becomes 
very resilient thanks to the fact that it follows a 0-trust model.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9ce9472f-8c36-44c8-b513-424c591f2b63%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Unable to get network adapter working

2019-06-27 Thread 'awokd' via qubes-users

Jon deps:

On 6/27/19 1:10 AM, Chris wrote:



I tried the Debian template but it still doesn't work. Same symptoms


https://www.qubes-os.org/doc/pci-devices/#pci-passthrough-issues attach
options.


I need some help here. Couldn't find the configuration file mentioned 
(/var/lib/qubes/servicevms/ is empty) to insert pci_permissive=1. I am 
not very good with Linux.


You fooled me with the cogent problem description and troubleshooting 
approach. There's no config. file. Look below "Additional Attach 
Options" in the link I sent. Use qvm-pci options when you re-attach your 
NIC to sys-net. However:


I'd find new 
hardware if it was me.


With the additional info you provided in your other reply of the NIC 
repeatedly resetting even without sys-net running, I second this. Single 
port NICs are cheap. If you still want to troubleshoot further, check 
journalctl and xl dmesg in a dom0 terminal to hopefully see why it's 
resetting.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86cc5112-1307-e930-73a1-f666ff5fc42a%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: no DNS resolving being passed to sys-firewall or other appVMs after updates?

2019-06-27 Thread Sphere
On Wednesday, June 26, 2019 at 4:34:11 PM UTC, cubit wrote:
> I am not sure if this is related to recent updates but after updating today 
> and doing a reboot, my sys-firewall and other appVMs are not getting DNS 
> resolving working.
> 
> 
> 
> - sys-net (fedora30) starts up with out an issue, can resolve and connect to 
> the internet
> 
> - sys-firewall starts up and gets an IP address,  it can ping sys-net and 
> hosts on the internet by IP but can not by name.  
> 
> - appVMs are the same as sys-firewall
> 
> 
> 
> on sys-firewall and appVMs I have two entries in /etc/resolv.conf 10.139.1.1 
> and .2   I am not sure what these IPs are as they do not show up in qubes 
> manager and I can not ping them.  
> 
> 
> 
> IPs all start at 10.139.0.5 which is sys-net
> 
> 
> 
> The only way I can get to the internet is to use Tor or VPN which don't rely 
> on the system DNS.   
> 
> 
> 
> Is anyone else experiencing this,  does anyone know what 1.1 and 1.2 hosts 
> are or how I can get DNS up and running again?
> 
> 
> 
> cubit

Well I don't have much of a solution to solving your DNS problem other than 
checking if your DNS queries are resolving in your sys-net vm through the use 
of nslookup command.

An alternative would be using DNSCrypt
https://github.com/jedisct1/dnscrypt-proxy/releases

Using this properly needs to have you change the contents of your 
/etc/resolv.conf to the following:
nameserver 127.0.0.1
options edns0 single-request-reopen

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dda05552-344a-4baa-a2f0-8da76693f6bc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.