[qubes-users] Re: Are there any security benefits of setting up standalonevm instead of appvm?

2020-01-08 Thread fiftyfourthparallel
Not an expert (or even technically inclined), but here's my suggestion:

I get how you feel because I've wondered about the exact same thing as you. 
Why not create multiple templates, with each containing programs you're 
comfortable grouping together? If your system supports it, you can put an 
app in each template.

I don't know whether this will increase your system's security, but I don't 
see why it would hurt as long as your system can handle it. More 
importantly, this configuration will make you feel more secure while not 
harming your security.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c4f6696d-cef6-4b32-86e6-9b3bae53bfaa%40googlegroups.com.


[qubes-users] Convert template-based VM to standalone?

2020-01-08 Thread arthur . summers
Say I have a template-based VM, and I want to "fork" it to be standalone so 
that it's no longer based on the template. I know I could just create a new 
standalone VM from a template and copy files over from my home directory . 
. . but is there a way to just convert the existing guest from 
template-based to standalone? Is there something I could run from the 
command line?

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/592504a9-a013-4e7b-9700-47919551738c%40googlegroups.com.


Re: [qubes-users] Re: No Suspend/Resume on Dell Latitude 7400 (i5-8365U) with 4.0.2rc3

2020-01-08 Thread Guerlan


On Wednesday, January 8, 2020 at 8:28:12 AM UTC-3, Claudia wrote:
>
> January 8, 2020 12:10 AM, "Guerlan" > 
> wrote:
>
> > On Tuesday, January 7, 2020 at 8:41:31 PM UTC-3, Claudia wrote:
> > 
> >> January 7, 2020 6:08 PM, "Guerlan"  wrote:> On 
> Monday, January 6, 2020 at
> >> 12:43:40 AM UTC-3, Claudia wrote:
> >>> 
>  January 6, 2020 3:14 AM, dmoe...@gmail.com wrote:> On Sunday, 
> January 5, 2020 at 9:49:42 PM
> >> UTC-5,
>  Guerlan wrote:
> >> can you tell me how you figured this out? I've been trying to fix a 
> suspend bug in mine and
> >> It'd
>  be
> >> helpful to know how you debugged things
> > 
> > Mostly trial and error, trying all the things listed above. Two 
> little tricks to use:
> > 
> > 1. Look at the end of journalctl right before it tries to suspend. 
> This is where I saw that it
>  was
> > going into s2idle, which then brought me to this thread:
> > 
>  
> >> 
> https://groups.google.com/forum/#!msg/qubes-users/TmGDlkluJgM/1BFsQZWNDAAJ;context-place=forum/qubes
> > users This Dell did not have the lack of S3 that the new Thinkpads 
> have, but it did still try
> >> to
> > use s2idle.
>  
>  /sys/power/mem_sleep will list supported modes, with the default in 
> brackets. You can echo to it
> >> to
>  set the default at runtime, or use the boot parameter.
> >>> 
> >>> [lz@dom0 ~]$ cat /sys/power/mem_sleep
> >>> s2idle [deep]
> >>> 
> >>> What does this mean? It means that it detected only s2idle or that my 
> system does not support
> >>> suspend to RAM? I've used Ubuntu and Fedora and lid closing always 
> worked, I just don't know if
> >> it
> >>> was idle or to ram or other thing.
> >> 
> >> This means that s2idle mode and deep mode are the two modes supported 
> by your machine, and that
> >> deep is the mode that will be used for sleep when no specific mode is 
> specified, such as using the
> >> lid switch or the logout menu or systemctl suspend for example. In OP's 
> case, deep is manually set
> >> as default using the kernel parameter mem_sleep_default=deep. Generally 
> the kernel chooses the
> >> deepest mode supported (s2idle -> shallow -> deep) to be the default, 
> but on some machines the
> >> kernel will choose s2idle as the default even if deep is supported.
> >> 
> >> 
> https://www.kernel.org/doc/html/v4.18/admin-guide/pm/sleep-states.html#basic-sysfs-interfaces-for-sy
> >> tem-suspend-and-hibernation
> > 
> > Thanks! I now understand how it works. I've checked and indeed my system 
> defaults to deep. I tried
> > s2idle by doing echo freeze > /sys/power/state and the screen turns off 
> but they keyboard keeps
> > with lights on. Pressing buttons does nothing. Pressing touchpad, 
> nothing. Pressing power rapidly,
> > nothing. Had to reboot by long pressing power. Shouldn't s2idle always 
> work since it's software
> > based?
>
> I don't know much about s2idle, but yes, in theory it should be the most 
> reliable of the sleep states. It could be a graphics driver issue. However, 
> from your log it looks like it's still entering deep sleep. 
>
> > I have no other ideas. If someone know a little more on how to debug, 
> I'd be glad. Remember that I
> > found this error in ACPI 
> https://github.com/QubesOS/qubes-issues/issues/ on dmesg. It indicates
> > that ASPM does not work. Maybe this is crucial?
>
> Debugging suspend is a long and complicated process. I don't want to get 
> any more off-topic in this thread. Please start a new thread for your 
> machine detailing everything you've tried so far, including logs and any 
> other relevant information, so it's all in one place. 
>


Ok thanks, here's the new thread 
https://groups.google.com/forum/#!topic/qubes-users/eMWxHSy9h7c 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e10bb5b-ac36-49ce-a613-457b6b80013a%40googlegroups.com.


[qubes-users] Debugging a sleep/suspend problem on Razer Blade Stealth 2016 - Qubes

2020-01-08 Thread Guerlan
First of all, here's the HCL for my Razer Blade Stealth 2016 4K touchscreen 
16gb RAM 512gb SSD: 
https://groups.google.com/forum/#!searchin/qubes-users/razer$20blade%7Csort:date/qubes-users/PalZ-1inxnA/D3mQ4OI3CAAJ

When I close the lid and open again, keyboard wont ligth up, screen wont 
turn on (it's LED so I can see a brigth black when it turns on), and 
hitting keyboard or touchpad does nothing. I have to reboot. I don't know, 
however, if keyboard not ligthing when I open the lid is because sys-usb, 
which contains the keyboard, is not waken. Every other aspect of the laptop 
seems to be working perfectly.

I followed Ubuntu's guide on kernel suspend bugs: 
https://wiki.ubuntu.com/DebuggingKernelSuspend

Then, following what they suggest

`sudo sh -c "sync && echo 1 > /sys/power/pm_trace && pm-suspend"`

and find the lines that says hash matches in dmesg rigth after reboot (what 
does that mean?)

Well, I found two:

```
[3.583591] ima: Allocated hash algorithm: sha1
[3.593050] input: AT Raw Set 2 keyboard as 
/devices/platform/i8042/serio0/input/input4
[3.638808]   Magic number: 0:929:176
[3.638867] acpi device:39: hash matches
[3.638893] acpi device:0c: hash matches
[3.639073] rtc_cmos 00:01: setting system clock to 2016-01-01 12:09:51 
UTC (1451650191)
```

I couldn't find anything related to those acpi devices. I thougth first 
that there was a driver for them, so I should just rmmod those drivers 
before sleep and insmod when wakeup, but couldn't find anything. There's 
this issue https://ubuntuforums.org/archive/index.php/t-2393029.html which 
have those exact hash matches, but no answer. 

Then I asked for help on a forum and they found this problematic line on my 
dmesg:

`[2.543596] acpi PNP0A08:00: _OSC failed (AE_ERROR); disabling ASPM`

seems like ASPM is disabled on my Qubes. I don't know why. Should this be 
considered a bug? Is there anything I can do to get it working? *This looks 
promising.*

It's worth noting that on Ubuntu 18, 19, Fedora 30, Linux Mint, etc, *all 
these systems work like a charm with the sleep process*. I can close the 
lid and open and it works. So the problem seems to be **related to Qubes**. 
I even tried qubes most recent dom0 kernel, based on 5.x linux kernel, but 
the problem persists.

I also tried `pcie_aspm=force` on `/boot/efi/EFI/qubes/xen.cfg` (is this 
where I put kernel parameters?) like this:

`kernel=vmlinuz-4.14.74-1.pvops.qubes.x86_64 
root=/dev/mapper/qubes_dom0-root 
rd.luks.uuid=luks-39fc83eb-9829-43b7-86e8-08068bd81087 
rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap i915.alpha_support=1 
pcie_aspm=force rhgb quiet plymouth.ignore-serial-consoles`

but it didn't help.

I pratically *need* to run Qubes on this notebook because any Linux 
distribution with any kernel will have a problem that corrupts my SSD many 
times a day. No one could solve it, and on Qubes it never happens. I tried 
Qubes just to see if it'd solve and it does! I'm loving it, not going back 
even on other notebooks. However, closing the lid/putting the system to 
sleep is essential for a notebook.

```
[lz@dom0 ~]$ cat /sys/power/mem_sleep 
s2idle [deep]
```

as you see, the suspend default is deep mode.

I tried s2idle by doing `echo freeze > /sys/power/state` and the screen 
turns off but they keyboard keeps with lights on. Pressing buttons does 
nothing. Pressing touchpad, nothing. Pressing power rapidly, nothing. Had 
to reboot by long pressing power. I thougth s2idle should always work since 
it's software based. 

Here's my journalctl of the moment when I go to suspend by closing the lid 
(that is, suspending in deep mode):

```
Jan 07 20:56:24 dom0 systemd-logind[1925]: Lid closed.
Jan 07 20:56:24 dom0 systemd-logind[1925]: Suspending...
Jan 07 20:56:24 dom0 systemd[1]: Starting Qubes suspend hooks...
Jan 07 20:56:25 dom0 qmemman.daemon.algo[1921]: balance_when_enough_memory(
xen_free_memory=8172072647, total_mem_pref=2493652659.2, 
total_available_memory=13171544083.8)
Jan 07 20:56:25 dom0 qmemman.systemstate[1921]: stat: dom '5' 
act=3198156800 pref=963591782.4 last_target=3198156800
Jan 07 20:56:25 dom0 qmemman.systemstate[1921]: stat: dom '0' 
act=4294967296 pref=1530060876.8 last_target=4294967296
Jan 07 20:56:25 dom0 qmemman.systemstate[1921]: stat: xenfree=8224501447 
memset_reqs=[('5', 3198156800), ('0', 4294967296)]
Jan 07 20:56:25 dom0 qmemman.systemstate[1921]: mem-set domain 5 to 
3198156800
Jan 07 20:56:25 dom0 qmemman.systemstate[1921]: mem-set domain 0 to 
4294967296
Jan 07 20:56:25 dom0 qrexec[3884]: qubes.GetDate: social -> @default: 
allowed to dom0
Jan 07 20:56:25 dom0 qmemman.daemon.algo[1921]: 
balance_when_enough_memory(xen_free_memory=8172072647, 
total_mem_pref=2450575027.2, total_available_memory=13214621715.8)
Jan 07 20:56:25 dom0 qmemman.systemstate[1921]: stat: dom '5' 
act=3198156800 pref=920514150.4 last_target=3198156800
Jan 07 20:56:25 dom0 qmemman.systemstate[1921]: stat: dom '0' 
act=4294967296 

[qubes-users] Re: Does qubes block usb on thunderbolt port?

2020-01-08 Thread brendan . hoar
On Wednesday, January 8, 2020 at 4:29:57 PM UTC-5, Ryan Tate wrote:

> (The one thing that I do wonder is if is neccesary for sys-usb to bail 
> out on boot when an assigned device is not present, maybe there could be 
> a system for transient but assigned devices to be allowed to come online 
> post boot? No idea how feasible this is.) 
>

PCIe attach has to happen at startup, and Xen will fail to start it up if 
the named device isn't there.

My suggestion: create a *second* sys-usb style VM (e.g. called "sys-usb-c") 
with the "extra" usb pcie device attached and *remember* to have the USB 
port populated at boot if you want to use devices from that second device 
VM.

The regular sys-usb will always start up for the other ports (regardless of 
whether you have a device plugged in or not).

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4eb2e9cd-af16-46ef-9b77-d3a6a888f9b8%40googlegroups.com.


[qubes-users] Re: Does qubes block usb on thunderbolt port?

2020-01-08 Thread 'Ryan Tate' via qubes-users
Ryan Tate  writes:
> On my ThinkPad X1 Carbon gen5, I can use my thunderbolt 3 ports fine for
> display and for power. However, Qubes does not seem to recognize a usb-c
> flash stick or a usb-c yubikey plugged into these ports

I think I got this figured out. ThinkPads apparently do not show the
USB-C controller on these Thunderbolt ports to the OS unless and until
something is physically plugged in. I was clued into this by this
thread; don't be fooled by the subject line it is about more than hubs -
see bit where the user also was not able to connect the drive directly -
https://groups.google.com/forum/#!searchin/qubes-users/usb-c$20thunderbolt%7Csort:date/qubes-users/VIqnIcubq9Y/-gmRME7qBgAJ

Per the thread above, Qubes does not (seem to) handle controllers that
pop up after boot.

When I booted with a usb-c flash drive already in the Thunderbolt port,
I was able to finally see the USB-C controller via lspci in dom0. I was
able to shut down sys-usb and attach the controller to sys-usb (Devices
tab in Qubes Settings for sys-usb) and USB-C items then became visible
when I started sys-usb again.

But, on a reboot, if no USB was plugged in to the port, sys-usb would
fail to start up at all because the controller (aka the "device" I had
attached) was no longer there. (Also, even when a usb-c item was plugged
in at boot and mounted, disconnecting the item and connecting something
else (like a displayport cable for external monitor, which worked) left
me unable to re-connect the usb-c item, but this may be because I did
not set "no-strict-reset" -- I never bothered to fiddle with that when I
realized the prior mentioned boot issue).

This is all kind of a bummer because it means that effectively I can't
use usb-c to attach anything like a storage device, yubikey, etc on this
machine with Qubes. On the other hand I realize the Thunderbolt system
generally and perhaps specifically the way Lenovo/ThinkPad machines
handle exposing USB buses on Thunderbolt raise some unique challenges.

(The one thing that I do wonder is if is neccesary for sys-usb to bail
out on boot when an assigned device is not present, maybe there could be
a system for transient but assigned devices to be allowed to come online
post boot? No idea how feasible this is.)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87muaxprg6.fsf%40disp2634.


Re: [qubes-users] sys-net not starting and no vms booting

2020-01-08 Thread 'awokd' via qubes-users
dubstepcombust...@gmail.com:
> Qubes OS version: R4:0 
> 
> Hey everyone, bear with me as I am somewhat of a noob to Qubes, and haven't 
> been on in awhile due to this issue which I have held on the backburner. So 
> one day, everything on Qubes was running fine and smoothly, until I 
> (stupidly) decided to hard-shutdown my computer with all my vms still up 
> and running, and when I booted back on again, I was met with Qubes not 
> working at all. As far as booting is concerned, everything appeared to be 
> fine, but sys-net would not start, and somehow, the debian-9 template 
> private vm file was gone.
Might be missing something, but if you can still get in to the Qubes
desktop, can't you use Qubes Backup to backup your AppVMs? Exclude the
broken template(s) from backup. Then reinstall Qubes, restore your
AppVMs, and link them back up to the newly installed templates if needed.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d6068e7d-6153-b80c-e121-741e68d3b3d5%40danwin1210.me.


[qubes-users] Re: Does qubes block usb on thunderbolt port?

2020-01-08 Thread brendan . hoar
On Wednesday, January 8, 2020 at 6:19:54 AM UTC-5, Ryan Tate wrote:
>
> Does qubes block USB data on Thunderbolt ports? 
>

So a few things:

1. Qubes has pcie hotplug disabled in the dom0 kernel, which TB uses for 
PCIe-based thunderbolt devices. This is disabled for security reasons.
2. The TB alternate mode that supports USBs might not instantiate the PCIe 
USB controller it connects through *until a USB device is connected to that 
port*.
3. Therefore...depending on BIOS support...you *might* be able to have a 
USB device seen by qubes if the USB device is plugged in at power-on. Even 
if that works, it might be on a USB PCIe controller that is not already 
attached to your sys-usb (if you have one).
4. If it does work, you might want to create a sys-usb-c which you run only 
after connecting a device to the port at boot time, and assign the (usually 
hidden) PCIe USB controller that that VM only.

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0cbd5089-ce29-4c13-9d9f-d40ff678e95a%40googlegroups.com.


Re: [qubes-users] Are there any security benefits of setting up standalonevm instead of appvm?

2020-01-08 Thread Steve Coleman

On 2020-01-08 12:30, Vasiliy wrote:

Are there any security benefits of setting up standalonevm instead of appvm?


1. Thunderbird and other communication tools sometimes can be 
compromised and malicious code can affect all programs installed. I am 
scared that even if I don't use a program in an appvm, it can indirectly 
reduce my security.


If this happens in an HVM you are already toast. If it gets pulled into 
a template while passing the signature test it lies dormant until you 
run that app in the AppVM, and the system volume is non-persistent 
there, so the binary blob that the hack downloads onto your system will 
not stay resident on the system volume. It will likely have to repeat 
the download each time the AppVM is launched, or recognize that its a 
Qubes system and find an alternate way to maintain persistence. That is 
a much higher bar to hurdle than simply installing that binary blob.


2. If an attacker will successfully replace packages while updating the 
template, they will have full access to all my appvms. I know that Tor 
somewhat protects from it, but it can still happen.


It only gains access if it is run, and if run in an AppVM it only has 
temporary access to that one AppVM. While that does not keep it from 
phoning home to the mother ship and sending all your stuff, it still 
will have a hard time becoming persistent. If the sending your stuff 
bothers you then think carefully about locking down the firewall rules 
for each AppVM so long as you know what each AppVM is supposedly for.


Example: I have an AppVM called Email. Its only job is to protect the 
rest of my system from external threats. The networking is set up with a 
default deny firewall and only the authentication and mail servers are 
permitted access. Anything else raises a red flag and my system informs 
me of the problem. If I click on anything malicious like a hacked PDF 
its opened in a one-time-use DispVM. Anything else is blocked from 
downloading its payload.


Steve

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aabbf6e4-f82f-19df-bcaf-0ed3994e9627%40jhuapl.edu.


Re: [qubes-users] Are there any security benefits of setting up standalonevm instead of appvm?

2020-01-08 Thread dhorf-hfref . 4a288f10
On Wed, Jan 08, 2020 at 06:30:32PM +0100, Vasiliy wrote:
> Are there any security benefits of setting up standalonevm instead of appvm?

dont see any. if anything, it might reduce your security posture.
i consider the volatility of the root volume of a templated appvm
a good thing. 
not really a strong/hard security feature, but it certainly will make
it harder for non qubes-aware evils to persist, or for you to wreck
things by accident.


> 1. Thunderbird and other communication tools sometimes can be
> compromised and malicious code can affect all programs installed. I am
> scared that even if I don't use a program in an appvm, it can
> indirectly reduce my security.

this is the "a computer is more secure without a compiler installed" cult.
i am not the only one to not participate in that.


> 2. If an attacker will successfully replace packages while updating
> the template, they will have full access to all my appvms. I know that
> Tor somewhat protects from it, but it can still happen.

if attacks on update mechanism bother you, adding more VMs that 
need updating just increases the problem.
and tor does not protect you from this. at all.
it may actualy make you more visible and easier to attack in this way.
this depends on your threat model, mostly on whether you believe that
you are targeted a) as an individual, b) as a job function, c) as a
qubes user or d) in general. 


> 3. Proprietary software may monitor activities of other programs even
> if I don't use it. Similar to what snap does (runs in the background
> and updates software without any interraction with the user) some
> proprietary programs may do the same even if I don't use them.

"dont run software in places where you dont want it to run" should
cover this. note the term "run", not "install". 
it seems to be just another weird variant of (1).
if your systems execute stuff without your consent, you already have
a decent size problem.
and considering f.ex. less than 256 byte sized generic evils that download
arbitrary sized payloads from network and execute it, i dont see that
an attacker that can execute stuff on your system needs your help in
installing the stuff for him. 


> I would be happy to hear your opinions on this topic. Maybe you want
> to point out where I am incorrect or have some advantages and
> disadvatages that should be considred, except of usability. Thank you
> in advance.

if your really are a believer in the (1)+(3) things, and are willing to
risk the additional exposure that comes from (2) with lots of roots,
going with lots-of-templates (that have one appvm each) still seems to
be much better than lots-of-standalones. 



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200108182759.GI8973%40priv-mua.


Re: [qubes-users] Are there any security benefits of setting up standalonevm instead of appvm?

2020-01-08 Thread Chris Laprise

On 1/8/20 12:30 PM, Vasiliy wrote:

Are there any security benefits of setting up standalonevm instead of appvm?

For instance, having 5 standalonevms based on minimal template with one 
program installed in each instead of having 5 appvms for one program in 
each based on a default template with all programs installed (for 
example, fedora-30)


I am mainly worried about 3 thing:

1. Thunderbird and other communication tools sometimes can be 
compromised and malicious code can affect all programs installed. I am 
scared that even if I don't use a program in an appvm, it can indirectly 
reduce my security.


2. If an attacker will successfully replace packages while updating the 
template, they will have full access to all my appvms. I know that Tor 
somewhat protects from it, but it can still happen.


3. Proprietary software may monitor activities of other programs even if 
I don't use it. Similar to what snap does (runs in the background and 
updates software without any interraction with the user) some 
proprietary programs may do the same even if I don't use them.


I would be happy to hear your opinions on this topic. Maybe you want to 
point out where I am incorrect or have some advantages and disadvatages 
that should be considred, except of usability. Thank you in advance.


IMO the only benefits of using standalone is configuration flexibility 
when one or more packages directly conflicts with Qubes' template 
system. It can also simplify the process of temporarily trying a complex 
new app or configuration. There are no security benefits.


I don't think the package updates threat is what you think, since you 
still have to update your standalone VMs to keep them secure anyway. 
Plus you now have many more updates to run. Updates should all be 
cryptographically signed, so in any realistic scenario they should be 
the least of your worries.


OTOH, using your apps on standalone vms could result in a successful 
attack against them leading to the guest OS being compromised. This is a 
more realistic threat, and using template-based vms help protect against 
it – the OS is clean again when you restart the vm.


Snap or flatpak may actually be a part of your ideal solution. I think 
there are Qubes instructions for using them with template-based Appvms. 
If not, you could use template-based Appvms and command them to install 
the desired packages each time the vm starts.


Another thing that might help you is my Qubes-VM-hardening project. It 
allows you to perform automatic checks and run scripts, and disable 
/rw-based malware on vm startup:


https://github.com/tasket/Qubes-VM-hardening

--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0349dc3e-f977-e570-3274-79701d18e0bf%40posteo.net.


[qubes-users] Are there any security benefits of setting up standalonevm instead of appvm?

2020-01-08 Thread Vasiliy
Are there any security benefits of setting up standalonevm instead of appvm?



For instance, having 5 standalonevms based on minimal template with one program 
installed in each instead of having 5 appvms for one program in each based on a 
default template with all programs installed (for example, fedora-30)



I am mainly worried about 3 thing:



1. Thunderbird and other communication tools sometimes can be compromised and 
malicious code can affect all programs installed. I am scared that even if I 
don't use a program in an appvm, it can indirectly reduce my security.



2. If an attacker will successfully replace packages while updating the 
template, they will have full access to all my appvms. I know that Tor somewhat 
protects from it, but it can still happen.



3. Proprietary software may monitor activities of other programs even if I 
don't use it. Similar to what snap does (runs in the background and updates 
software without any interraction with the user) some proprietary programs may 
do the same even if I don't use them.



I would be happy to hear your opinions on this topic. Maybe you want to point 
out where I am incorrect or have some advantages and disadvatages that should 
be considred, except of usability. Thank you in advance.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/16f86353a37.ee74a56c247405.5496737173292994771%40privacy.com.co.


Re: [qubes-users] Qubes, boot from SD card?

2020-01-08 Thread Chris Laprise

On 1/8/20 10:39 AM, gorked wrote:

I see some mention of booting from SD on some board somewhere.

My question being, If I purchased an intel based Chromebook with 4 GB 
RAM, and a 16 GB SSD.  Could I boot QUBES or other Linux on it.




There are some Chromebooks listed in the HCL, but there is no guarantee 
Qubes will work on just any Chromebook.


Also, 4GB should be OK for running a single Appvm. To give apps more 
room to operate comfortably I would limit all the sys-* VMs to 300MB 
RAM, and limit dom0 to 1GB RAM (this is what I do on my 8GB systems and 
it lets me run 4-5 Appvms comfortably).


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c6fd5bf3-b46b-8333-35db-2d3597744902%40posteo.net.


Re: [qubes-users] Qubes, boot from SD card?

2020-01-08 Thread dhorf-hfref . 4a288f10
On Wed, Jan 08, 2020 at 07:39:12AM -0800, gorked wrote:
> My question being, If I purchased an intel based Chromebook with 4 GB RAM, 
> and a 16 GB SSD.  Could I boot QUBES or other Linux on it.  

4GB ram is not enough to use qubes.
8GB ram _might_ work if you were a really experienced qubes ninja
or just want to try it out for a weekend.

using qubes on a chromebook with 16GB ram works ok, 
including boot from internal mmc or micro-sd.

the storage performance is horrible though.
"my default_qrexec_timeout is 300" level horrible.
(this means the default-default of 1min timeout for vm startup was
 hit so frequently that i changed it to 5min...)

and i would still recommend doing mild ram-usage ninjaing with 16GB,
like using mirage for firewall and ssh-agent, and clamping down
maxmem of a lot of vms.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200108164633.GH8973%40priv-mua.


[qubes-users] Invitation to a Qubes install party in Cologne, Germany

2020-01-08 Thread Lara Schwarz

Dear readers of the qubes-users list,

on January 22nd we are hosting a Qubes install party for German speaking people 
in Cologne, Germany.
For more information please read the text below.

-

Hallo Leser der Qubes-Mailingliste,

im Januar treffen wir uns am*22.01.2020*  im Zollstockgürtel 59 (Haus 2, 1. 
OG), 50969 Köln

Beginn: 18:00 Uhr
Ende: 22:00 Uhr

Thema: Einführung in Qubes OS, inkl. „Install-Party“


Wir, der Kölner Kreis, möchten euch ein noch relativ unbekanntes aber
auch relativ sicheres Betriebssystem am 22. Januar 2020 vorstellen: Qubes OS.
Diejenigen, die schon etwas länger dabei sind erinnern sich vielleicht noch
daran, dass wir das schon mal am 15. Juli 2017 gemacht haben.
Dieses mal wird es vom Platzangebot etwas kleiner, aber genauso schön!

Qubes OS ist ein kostenfrei verfügbares, auf Linux basierendes
Betriebssystem, welches IT-Sicherheit in den Fokus stellt und dazu
insbesondere Techniken der Virtualisierung verwendet. Qubes OS dient als
Arbeitsplatzumgebung, kann also für die alltägliche IT-Arbeit von
Wissenschaftlern, Forschern, Anwendern, Entscheidern, usw, also (mit etwas
Hilfe) von nahezu Jedem verwendet werden.

Wir haben in unserem Team Qubes seit 3,5 Jahren im täglichen Einsatz.
Mehr und mehr Menschen installieren und verwenden Qubes - das System ist
seit 2012 in stabiler Version verfügbar.
Entwickelt wurde Qubes ursprünglich vom Team rund um die polnische
IT-Sicherheitsforscherin Joanna Rutkowska (The Invisible Things Labs).

Qubes hat uns als betriebliche Anwender bereits 2016 überzeugt und
jetzt möchten wir euch zu unserem "Qubes-OS-User-Treffen"
einladen, um euch eine erste Einführung in das System und dessen
Grundlagen zu geben. Der zweite Teil bietet die Möglichkeit in einer
geführten Install-Party selbst mit Qubes zu arbeiten.

Durch die Veranstaltung wird euch Martin Wundram als täglicher Nutzer
mit fast 4 Jahren Erfahrung und Einarbeitung in das OS begleiten.

Zunächst stellt er die wesentlichen Grundlagen und Konzepte
von Qubes vor und vergleicht das System kurz mit verschiedenen
Alternativen. Er erklärt, für wen sich Qubes besonders lohnen kann
und was das System ausmacht. Er stellt dafür Qubes live vor.
Den zweiten Teil bildet eine Install-Party. Jeder Teilnehmer
kann bei Interesse auf einem selbst mitgebrachten Gerät und mit unserer
Hilfe Qubes installieren, eine Grundkonfiguration vornehmen und erste
Erfahrungen machen. Wir werden auch einige Geräte zum Ausprobieren
mitbringen. Damit lohnt es sich auch für diejenigen, die kein eigenes
Gerät haben.

Die Teilnahme an der Veranstaltung ist kostenfrei. Eine vorherige Anmeldung
ist wegen begrenzter Teilnehmerzahl aber erforderlich. Diese könnt ihr
über eine einfache e-mailanschw...@digitrace.de   einreichen.

Veranstaltungsort: DigiTrace, Zollstockgürtel 59 (Haus 2, 1. OG), 50969 Köln

Wir freuen uns auf euch

Lara Schwarz

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d993a167-4e18-a77e-27c0-c8a332c1ab4e%40digitrace.de.


[qubes-users] Qubes, boot from SD card?

2020-01-08 Thread gorked
I see some mention of booting from SD on some board somewhere.   

My question being, If I purchased an intel based Chromebook with 4 GB RAM, 
and a 16 GB SSD.  Could I boot QUBES or other Linux on it.  


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9930e47e-d55d-42d6-9d27-1adf14653ada%40googlegroups.com.


[qubes-users] Re: Qubes OS 4.0.2 has been released!

2020-01-08 Thread fiftyfourthparallel
Hi Andrew,

I installed 4.0.2 on my Dell Inspiron 5593 without new issues.

The answer to the following question seems to have been implied in earlier 
responses, but I'd just like an explicit clarification: Can the "critical 
kernel bug" affect my security in any way?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b02ac1a2-ea36-481a-a83c-b85d56eb467c%40googlegroups.com.


[qubes-users] Re: Qubes booting in machine with Windows and Linux

2020-01-08 Thread robertlehamn
Any other recommendations? Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9c861a59-14e5-4751-9917-ab086873411e%40googlegroups.com.


[qubes-users] Re: Qubes OS 4.0.2 has been released!

2020-01-08 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

Shortly after this announcement was originally sent, a bug was
discovered in the dom0 kernel included in Qubes 4.0.2:

https://github.com/QubesOS/qubes-issues/issues/5553

Since this bug would present installation problems for the majority of
users, we have temporarily removed it from the Downloads page and
reinstated the latest release candidate (Qubes 4.0.2-rc3) in its place.


On 2020-01-02 8:21 PM, Andrew David Wong wrote:
> Dear Qubes Community,
> 
> We're pleased to announce the release of Qubes 4.0.2! This is the second
> stable point release of Qubes 4.0. It includes many updates over the
> initial 4.0 release, in particular:
> 
> - All 4.0 dom0 updates to date
> - Fedora 30 TemplateVM
> - Debian 10 TemplateVM
> - Whonix 15 Gateway and Workstation TemplateVMs
> - Linux kernel 4.19 by default
> 
> Qubes 4.0.2 is available on the Downloads page:
> 
> https://www.qubes-os.org/downloads/
> 
> 
> What is a point release?
> 
> 
> A point release does not designate a separate, new version of Qubes OS.
> Rather, it designates its respective major or minor release (in this
> case, 4.0) inclusive of all updates up to a certain point. Installing
> Qubes 4.0 and fully updating it results in the same system as installing
> Qubes 4.0.2.
> 
> 
> What should I do?
> -
> 
> If you installed Qubes 4.0 or 4.0.1 and have fully updated, then your
> system is already equivalent to a Qubes 4.0.2 installation. [1] No
> further action is required.
> 
> Similarly, if you're currently using a Qubes 4.0.2 release candidate
> (4.0.2-rc1, 4.0.2-rc2, or 4.0.2-rc3), and your system is fully updated,
> then your system is equivalent to a 4.0.2 stable installation, and no
> additional action is needed. [1]
> 
> Regardless of your current OS, if you wish to install (or reinstall)
> Qubes 4.0 for any reason, then the 4.0.2 ISO makes this more convenient
> and secure, since it bundles all Qubes 4.0 updates to date.
> 
> *Note:* At 4.5 GiB, the Qubes 4.0.2 ISO will not fit on a single-layer
> DVD (for the technical details underlying this, please see issue
> #5367). [2] Instead, we recommend copying the ISO onto a sufficiently
> large USB drive. [3] However, if you would prefer to use optical media,
> we suggest selecting a dual-layer DVD or Blu-ray disc.
> 
> Thank you to all the release candidate users for testing this release
> and reporting issues! [4]
> 
> 
> [1] https://www.qubes-os.org/doc/updating-qubes-os/
> [2] https://github.com/QubesOS/qubes-issues/issues/5367
> [3] 
> https://www.qubes-os.org/doc/installation-guide/#copying-the-iso-onto-the-installation-medium
> [4] https://www.qubes-os.org/doc/reporting-bugs/
> 
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2020/01/02/qubes-4-0-2/
> 
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=B08q
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/99b43cf1-d911-3253-7f14-efc4814d95c9%40qubes-os.org.


Re: [qubes-users] How to use QEMU with Qubes?

2020-01-08 Thread Claudia
January 7, 2020 7:43 PM, "Guerlan"  wrote:

> I undrstand that HVM uses QEMU to emulate some devices and BIOS. However, 
> what if I want to have
> total control of QEMU?
> 
> What if there's an OS for which there's a QEMU tutorial and I want to do 
> exact what is in the
> tutorial but in Qubes?
> Do I need Qemu on dom0? dom0 has qemu-img-xen and qemu-nbd-xen. What are they 
> for?
> 
> Or does QEMU runs inside xen, not in dom0?

Xen uses QEMU just to emulate virtual hardware devices for HVMs, not for the 
actual virtualization. "Normal" Qemu is actually Qemu/KVM, which is not 
supported on Xen as far as I know. The next best thing is to create an HVM, see 
https://www.qubes-os.org/doc/standalone-and-hvm/#installing-an-os-in-an-hvm

qemu-img-xen is used for formatting image files or block devices for VMs. 
qemu-nbd-xen is for network block devices, though I'm not sure if/how they're 
used in Qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c5507405058f20884de80c525785dde8%40disroot.org.


Re: [qubes-users] Re: No Suspend/Resume on Dell Latitude 7400 (i5-8365U) with 4.0.2rc3

2020-01-08 Thread Claudia
January 8, 2020 12:10 AM, "Guerlan"  wrote:

> On Tuesday, January 7, 2020 at 8:41:31 PM UTC-3, Claudia wrote:
> 
>> January 7, 2020 6:08 PM, "Guerlan"  wrote:> On Monday, 
>> January 6, 2020 at
>> 12:43:40 AM UTC-3, Claudia wrote:
>>> 
 January 6, 2020 3:14 AM, dmoe...@gmail.com wrote:> On Sunday, January 5, 
 2020 at 9:49:42 PM
>> UTC-5,
 Guerlan wrote:
>> can you tell me how you figured this out? I've been trying to fix a 
>> suspend bug in mine and
>> It'd
 be
>> helpful to know how you debugged things
> 
> Mostly trial and error, trying all the things listed above. Two little 
> tricks to use:
> 
> 1. Look at the end of journalctl right before it tries to suspend. This 
> is where I saw that it
 was
> going into s2idle, which then brought me to this thread:
> 
 
>> https://groups.google.com/forum/#!msg/qubes-users/TmGDlkluJgM/1BFsQZWNDAAJ;context-place=forum/qubes
> users This Dell did not have the lack of S3 that the new Thinkpads have, 
> but it did still try
>> to
> use s2idle.
 
 /sys/power/mem_sleep will list supported modes, with the default in 
 brackets. You can echo to it
>> to
 set the default at runtime, or use the boot parameter.
>>> 
>>> [lz@dom0 ~]$ cat /sys/power/mem_sleep
>>> s2idle [deep]
>>> 
>>> What does this mean? It means that it detected only s2idle or that my 
>>> system does not support
>>> suspend to RAM? I've used Ubuntu and Fedora and lid closing always worked, 
>>> I just don't know if
>> it
>>> was idle or to ram or other thing.
>> 
>> This means that s2idle mode and deep mode are the two modes supported by 
>> your machine, and that
>> deep is the mode that will be used for sleep when no specific mode is 
>> specified, such as using the
>> lid switch or the logout menu or systemctl suspend for example. In OP's 
>> case, deep is manually set
>> as default using the kernel parameter mem_sleep_default=deep. Generally the 
>> kernel chooses the
>> deepest mode supported (s2idle -> shallow -> deep) to be the default, but on 
>> some machines the
>> kernel will choose s2idle as the default even if deep is supported.
>> 
>> https://www.kernel.org/doc/html/v4.18/admin-guide/pm/sleep-states.html#basic-sysfs-interfaces-for-sy
>> tem-suspend-and-hibernation
> 
> Thanks! I now understand how it works. I've checked and indeed my system 
> defaults to deep. I tried
> s2idle by doing echo freeze > /sys/power/state and the screen turns off but 
> they keyboard keeps
> with lights on. Pressing buttons does nothing. Pressing touchpad, nothing. 
> Pressing power rapidly,
> nothing. Had to reboot by long pressing power. Shouldn't s2idle always work 
> since it's software
> based?

I don't know much about s2idle, but yes, in theory it should be the most 
reliable of the sleep states. It could be a graphics driver issue. However, 
from your log it looks like it's still entering deep sleep. 

> I have no other ideas. If someone know a little more on how to debug, I'd be 
> glad. Remember that I
> found this error in ACPI https://github.com/QubesOS/qubes-issues/issues/ 
> on dmesg. It indicates
> that ASPM does not work. Maybe this is crucial?

Debugging suspend is a long and complicated process. I don't want to get any 
more off-topic in this thread. Please start a new thread for your machine 
detailing everything you've tried so far, including logs and any other relevant 
information, so it's all in one place.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3a967cec86c0cf40795e6511e062e471%40disroot.org.


[qubes-users] Does qubes block usb on thunderbolt port?

2020-01-08 Thread 'Ryan Tate' via qubes-users
Does qubes block USB data on Thunderbolt ports?

On my ThinkPad X1 Carbon gen5, I can use my thunderbolt 3 ports fine for
display and for power. However, Qubes does not seem to recognize a usb-c
flash stick or a usb-c yubikey plugged into these ports (the only usb-c
ports). (The flash stick has usb-a as well, on the other side, and it
shows up fine in sys-usb when I plug it in that way.)

I poked around in the BIOS to ensure there is no BIOS issue but even at
the "no security" setting I encounter this issue.

I thought I would just double check to see if Qubes might be involved in
this issue since there are various security considerations around
Thunderbolt in play (and I couldn't quite follow prior discussions of Qubes +
Thunderbolt). I'm on 4.0.1 or
4.0.2.

Thanks for any help.


   Ryan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87lfqjrxpy.fsf%40disp2634.


[qubes-users] Split GPG refresh keys in work-email

2020-01-08 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I am trying to refresh public keys of my contacts that I previously
imported to the backend work-gpg with

[user@work ~]$ qubes-gpg-import-key ~/Downloads/whateverkey.asc.

How do I refresh the keys, sitting in the offline work-gpg now? I tried
to use qubes-gpg-client --refresh-keys but the command is not recognized
.

Will I need to do it manually with every key? ^^

Thanks you!

-BEGIN PGP SIGNATURE-
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=fYkM
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bbffab44-65c8-f333-a9f5-516106f7c98f%40cock.li.


0xC1F4E83AF470A4ED.asc
Description: application/pgp-keys