Re: [qubes-users] equivalent of grub kernel parameters on qubes?

2019-10-27 Thread Guerlan
I tried to locate that file on dom0 but I couldn't find. Was it supposed to 
be elsewhere? (yes, I installed with UEFI)

On Sunday, October 27, 2019 at 11:59:05 AM UTC-3, unman wrote:
>
> On Fri, Oct 25, 2019 at 05:41:37PM -0700, Guerlan wrote: 
> > There's a quirk for laptop suspend problem that I want to try on Qubes 
> that 
> > is the following on Ubuntu: 
> > 
> > sudo nano /etc/default/grub 
> > GRUB_CMDLINE_LINUX_DEFAULT="button.lid_init_state=open" 
> > 
> > However dom0 does not have such file. How do I pass kernel parameters to 
> Qubes? 
> > 
>
> I have that file but I use standard(legacy) boot. Did you install with 
> UEFI? 
> If you are using UEFI, I believe you can install a EFI shell and boot 
> into it to test change parameters. Or you can edit the file at 
> /boot/efi/EFI/qubes/xen.cfg to add your parameters. 
>
> NB I dont like UEFI and dont use it, but I think that pointer is right. 
> As always, back up any system files before you start changing them. 
>
> unman 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc579d4e-ff18-49e4-ba3e-c55dd6d7fc36%40googlegroups.com.


[qubes-users] 4TB USB external disk - unable to attach to VM

2019-10-27 Thread cubecub
Hi, 
I've recently bought a high volume external USB 3.0 HDD to serve as a backup 
storage. Unfortunately when trying to attach the device using 'Qubes Devices' 
applet the disk is initally attached folllowed by immediate message "removed()".
I tried re-partitioning the volume from a single 4TB (3.7 TB) partition to a 
couple of smaller 1.7TB partitions, type 7 (under fdiks), formatted as NTFS. 
Unfortunately it didn't work. 

The only place it's showing up is directly withing sys-usb VM. I can access 
partitions there. But I want to be able to attach the disk / or one of the 
partitions/ directly to VM I need to copy data to/from. 

Any ideas? Suggestions? Advise how to connect my 4TB USB HDD into Qubes?

Thanks!


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LsETa16--B-1%40tutamail.com.


Re: [qubes-users] Upgrading from R3.2 - R4.0.1 or 4.0.2-rc1?

2019-10-27 Thread 'awokd' via qubes-users
Gaijin:

> I've had issues after restoring my backups though. I can't seem to
> upgrade my TemplateVMs without getting the dreaded “Failed to
> synchronize cache for repo” errors
> https://www.qubes-os.org/faq/#i-keep-getting-failed-to-synchronize-cache-for-repo-errors-when-trying-to-update-my-fedora-templates
> Switching the NetVM for the templates between sys-whonix, sys-firewall
> and sys-net hasn't resolved the error. I guess that is a Fedora issue
> rather than Qubes though.
> 
Forgot about that gotcha. Check
https://github.com/Qubes-Community/Contents/blob/master/docs/system/restore-3.2.md.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/da8a688e-4bcc-1951-5e0e-987b762c1442%40danwin1210.me.


Re: [qubes-users] Forwarding a port to a VM behind a VPN ProxyVM

2019-10-27 Thread unman
On Fri, Oct 25, 2019 at 08:04:55PM -0500, Verifiable List wrote:
> Hello All,
> 
> I use Mullvad as my VPN provider. They allow you to forward a port through
> the VPN. However, I'm having a hard time wrapping my head around how to get
> this to work with Qubes OS. This is what the network chain in question looks
> like:
> 
> AppVM > ProxyVM (VPN Client Here) > sys-firewall > sys-net > Internet
> 
> Because the port is being forwarded through the VPN tunnel, I expected it to
> be accessible from the ProxyVM without altering the configurations on
> sys-net or sys-firewall. However, after enabling the port forward on Mullvad
> and testing as described in their documentation:
> 
> - In a terminal window, run netcat -l -p 
> - In another terminal window, run curl
> https://ipv4.am.i.mullvad.net/port/
> - If everything is working properly, the result will show "reachable:true".
> 
> the result is always "reachable:false". (Note: I'm running this test on the
> ProxyVM itself.)
> 
> Any assistance would be appreciated.
> 
> Thank you.
> 

If you look at the firewall rules I suspect that you will find that the
inbound rule only accepts connected traffic, whereas this would be NEW.
Certainly on the appVM you will need a rule to allow inbound traffic to
the target port.
I don't know the detail of how Mullvad deals with port forwarding, but
you should be able to identify the port that is accessed (this may not
be the same as the target on the appVM). I assume that in the
documentation you will find a reference to what firewall ports you need
to open on the ProxyVM for inbound traffic.
It's *possible* that you'll have to open inbound ports on sys-firewall
AND sys-net in the forward chains,depending on the implementation. Check
the Mullvad docs.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191027151008.GB11475%40thirdeyesecurity.org.


Re: [qubes-users] equivalent of grub kernel parameters on qubes?

2019-10-27 Thread unman
On Fri, Oct 25, 2019 at 05:41:37PM -0700, Guerlan wrote:
> There's a quirk for laptop suspend problem that I want to try on Qubes that 
> is the following on Ubuntu:
> 
> sudo nano /etc/default/grub
> GRUB_CMDLINE_LINUX_DEFAULT="button.lid_init_state=open"
> 
> However dom0 does not have such file. How do I pass kernel parameters to 
> Qubes?
> 

I have that file but I use standard(legacy) boot. Did you install with UEFI?
If you are using UEFI, I believe you can install a EFI shell and boot
into it to test change parameters. Or you can edit the file at
/boot/efi/EFI/qubes/xen.cfg to add your parameters.

NB I dont like UEFI and dont use it, but I think that pointer is right.
As always, back up any system files before you start changing them.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191027145900.GA11475%40thirdeyesecurity.org.


Re: [qubes-users] DNS propagation in Qubes

2019-10-27 Thread David Hobach

On 10/27/19 6:33 AM, gas...@gmail.com wrote:

Is there a clear guide of how to set up a DNS VM in Qubes OS?

I tried setting up dnsmasq in the VPN VM behind sys-firewall, both with
NetworkManager and as a standalone service.  It didn't work.  I also tried
on another VM behind the VPN VM.

All I got working is making DNS requests to the specific VM.  E.g.

$ dig example.com @10.137.0.23

But I wasn't able to hijack the DNS requests with iptables for general
requests without "@".  tcpdump seems to indicate that the DNS queries don't
even get routed through the VPN VM, which doesn't make sense to me, so I
might be missing something.

Any clear step-by-step guide anywhere?


I randomly found
https://blog.tufarolo.eu/how-to-configure-pihole-in-qubesos-proxyvm/

It looks reasonable, but I didn't test it. Use it at your own risk.
Depending on your chain of VMs the Qubes firewall may or may not work 
for DNS - just test it if it matters to you.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4f7f6490-7d5c-3a08-ab56-1bf8060edc87%40hackingthe.net.


smime.p7s
Description: S/MIME Cryptographic Signature