Re: [qubes-users] Looking to change value of dom0_mem=max, tried finding xen-cmdline but no luck

2019-11-22 Thread Sphere
@awokd: What on earth, so I was almost there already
I was looking around grub and grub2 folders in hopes of finding some sort 
of startup script related to it. Now I feel so dumb hahahahahaha
Many Thanks!

@Claudia: Thanks for the heads' up. I have set the max memory through 
xen.cfg for my situation.
To be honest, I couldn't comprehend completely the memory allocation in 
Xen/Qubes article but if I understand it right, what it heavily implies is 
that dom0 dynamically allocates memory from itself to AppVMs when it sees 
that there is a need for it. I did observe this behavior to some extent but 
unfortunately, it doesn't seem to react when an AppVM is in a very 
near-frozen state due to lack of RAM to use. I have observed this for 
almost over 5 times already and it sucked.

Also, I could observe some minor lag hiccups whenever the browser is 
starting to completely exhaust the ram available to the AppVM, and that is 
something I would like to try to avoid.

On Friday, November 22, 2019 at 3:27:07 AM UTC+8, awokd wrote:
>
> Sphere: 
>
> > However, a ram stick just died on me this week and I badly need all the 
> RAM 
> > that I could get. Even right now, my dom0 is actively using just about 
> 940 
> > MB worth of RAM... which is why I think it would be best if I could 
> > permanently allocate 2048M to dom0 instead of 4096M for my case. 
>
> /boot/efi/EFI/qubes/xen.cfg 
>
> -- 
> - don't top post 
> Mailing list etiquette: 
> - trim quoted reply to only relevant portions 
> - when possible, copy and paste text instead of screenshots 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f91ddd88-e8cf-425a-aa45-90b43e75f738%40googlegroups.com.


Re: [qubes-users] Looking to change value of dom0_mem=max, tried finding xen-cmdline but no luck

2019-11-20 Thread Sphere
Well, I do have a problem with AppVMs completely hanging out on me on 
situations where firefox demands a large amount of ram and these are such 
cases:
1. Running a resource-intensive web application i.e. node.js web editors 
like Wix and Weebly
2. Downloading large files from mega.nz (I think the magic here involves 
loading the file into the RAM after it has been completely downloaded by 
the browser which is why when the browser prompts saving the file, the 
process is almost instantaneous... unless you don't have enough RAM to 
accommodate the demand.
3. Plenty of media-playing tabs open in Firefox or Chrome

There may be other cases that I have forgotten but on all cases where an 
AppVM froze on me, the total RAM eaten by dom0 hardly ever shrunk for it to 
be allocated to the AppVM, which should be expected given the existence of 
https://www.qubes-os.org/doc/qmemman/

I was able to get myself a workaround for the problem before, and that is 
making more swap, ideally within the 8GB-10GB range.

However, a ram stick just died on me this week and I badly need all the RAM 
that I could get. Even right now, my dom0 is actively using just about 940 
MB worth of RAM... which is why I think it would be best if I could 
permanently allocate 2048M to dom0 instead of 4096M for my case.

...Not unless there are big security-related reasons as to why 4096M has 
been the default on dom0.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2856dbf-120b-4044-b3bd-59a7857477dd%40googlegroups.com.


[qubes-users] Re: Running minikube

2019-11-18 Thread Sphere
Minikube is related to kubernetes, which isn't exactly virtualization but 
rather, containerization. Those two things are different.

And you *don't* do VM in a VM, only very special circumstances allow for 
such a thing

Qubes isn't exactly the best option for what you're looking for. If you're 
looking for an ideal OS for minikube then go for Alpine Linux and as for 
miniocp, maybe go Proxmox VE or VMWare ESXi?

On Thursday, November 14, 2019 at 10:05:01 AM UTC+8, shawn wilson wrote:
>
> What's the best/documented/misc ideas way to run things like minikube or 
> miniocp? Just a VM in a VM (they use libvirt to control a VM) or is there a 
> less clunky mechanism?
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d587bfec-9cf5-4817-9d92-ae0e166b067c%40googlegroups.com.


[qubes-users] Looking to change value of dom0_mem=max, tried finding xen-cmdline but no luck

2019-11-18 Thread Sphere
https://discussions.citrix.com/topic/354913-error-increasing-dom0-memory-in-61/

So I am looking to reduce the max set on dom0_mem because a considerable 
amount of ram is being wasted (roughly 1500 MB) and I want to use it on my 
RAM heavy appvms instead

I've been searching all over the place for xen configuration stuff but I 
haven't gotten much luck finding anything that has the parameters that 
define the values in "xen_commandline" that is shown whenever one types xl 
info

I've tried doing things like "xl mem-set Domain-0 2048M" but it reverts 
back as soon as I start a new app vm...

Anybody know the proper way to do this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7e48ee61-af07-4cf9-94ee-4d889499ac3c%40googlegroups.com.


Re: [qubes-users] TemplateVM updates almost instantly fail when target is VPN qube but dom0 updates run just fine

2019-07-10 Thread Sphere
I see, I hope that really solves your problem cause so far on my side I was 
able to try a separate qube for updating Templates and dom0
So far so good there were no problems given the fact that I ensured that the 
qube responsible for being updates proxy to the Templates were resolving DNS 
queries just fine and updates proxy service actively running properly in that 
qube.

If you still got the problem after switching to debian-10 maybe do some network 
diagnosis in your update vm? I can lend a helping hand with that if you need it

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed09218f-0794-4dc0-a28d-6907854de4b7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Quick question please, need help!

2019-07-03 Thread Sphere
I'm not particularly knowledgeable about the verification process being done by 
dnf on the signature of packages so the question still lies on me:
Is downloading packages from plaintext http susceptible to MITM?

Even if that is not the case, I believe we can't be for sure that there's no 
exploitable vulnerability on dnf involving packages poisoned either from the 
source itself or in transit through plaintext http.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/689626e9-dad6-4efa-a615-57add8280147%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0.1 Installation To Emergency

2019-07-02 Thread Sphere
I suggest giving Rufus a shot as well instead of Etcher. 

Also, you may want to try running Linux mint, openSUSE, or Nitrux OS first to 
see how tame your system is for Linux.
"Gaming" hardware are quite notorious for almost always having trouble running 
Linux

Lastly, I highly suggest for you to update the BIOS firmware of your Razer 
Blade GTX to the latest version for better chances of Linux compatibility.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/91912cf5-a5c9-4d13-9419-70955fdf43ec%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: sys-net does not start applications

2019-07-02 Thread Sphere
If it doesn't start any applications try to change the template of sys-net
Alternatively, you can try to add more memory/ram using sys-net preferences and 
see if it helps

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9077d957-cd9b-47b5-96ca-8847a86e9a94%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dns-over-TLS in sys-vpn. Is it possible? How?

2019-07-02 Thread Sphere
You're welcome and good luck!
In any case, I was reminded that any sort of communication between 
non-interconnected qubes are not allowed. So even if both of your AppVM qubes 
and sys-dns qube are connected to sys-firewall then they won't be able to 
communicate with each other by default. Additional iptables rules must be added 
to allow it according to what's written here:
https://www.qubes-os.org/doc/firewall/#enabling-networking-between-two-qubes

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8795f202-8452-493d-810d-bbaa973282ff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Quick question please, need help!

2019-07-02 Thread Sphere
@Jon deps: Proper hardening involves:
1. Proper use of firewall rules using qvm-firewall

2. Reducing the attack surface by only installing what is needed. Refer to 
usage of debian-minimal and fedora-minimal template in Qubes documentation.

3. Drop INPUT and OUTPUT in sys-net(only do this if you have proper DNS 
resolving mechanisms in place that are not reliant on sys-net, Qubes is reliant 
on sys-net for proper DNS resolutions by default. If you're interested then you 
can start by knowing how to use DNSCrypt proxy made by jedisct1 or using Stubby 
to make a sys-dns qube to do DNS over TLS resolutions.

4. Implementing the use of a VPN in qubes or highly relying on sys-whonix to 
torify your connections.

5. Picking only update sources that you could trust. IDK about debian but in 
fedora, by default, all updates are grabbed from mirrors and alot of those only 
support http which is bloody insecure thanks to being just plaintext and 
susceptible to MITM attacks. This can be changed by modifying 
/etc/yum.repos.d/fedora.repo and fedora-updates.repo
If you're interested in doing this then you can search up a thread I made about 
this here in qubes-users. Just put "Sphere" in search and you will definitely 
find it among the threads I have made.

6. Frequently updating your qubes after making sure you picked a source of 
updates that you can really trust.


"Since the majority of networks assign the actual IP address to you, you
likely won't have much control over that address, and logically the IP
address belongs to the network, not you. Chances are that with a
different MAC address you will not likely be getting the same IP address
each time either, depending of course on how they actually allocate
their addresses. "

@steve.coleman: I would like to add that IP address allocation from the ISP to 
you entirely depends on whether they provisioned you a Modem or a Modem + 
Router combo.

For the case of a Modem, you will be allocated a random IP address from a pool 
of IP addresses the ISP provides on the subnet that you, as a client, was 
allocated to. Some ISPs do not provide it by random and in the case of 
statically assigning you an IP address, they use your modem's MAC address and 
bind it to a specific IP address which effectively becomes your public IP 
address. This is exactly why VPN is very essential for privacy because any 
internet activity that does not go through a VPN could effectively be traced 
back to you by your ISP.

Do note that there has been wide confusion that's still happening about Modems 
and Routers thanks to some devices actually being labelled Modems but in 
reality they are Modem + Router combos that has a DHCP server which provides 
you your private IP addresses (Private IP addresses are IP addresses you use to 
access devices within your local network).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/65c5caa6-2482-48e8-b3a8-362b6864293d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: No vpn-handler-openvpn in service tab

2019-07-02 Thread Sphere
On Tuesday, July 2, 2019 at 5:37:58 AM UTC, Philip Pians wrote:
> On Tuesday, July 2, 2019 at 4:36:22 AM UTC, Chris Laprise wrote:
> > On 7/1/19 11:18 PM, Philip Pians wrote:
> > > On Tuesday, July 2, 2019 at 3:13:56 AM UTC, Philip Pians wrote:
> > >> Using instructions to create VPN appvm (with provides network), no 
> > >> service called vpn-handler-openvpn, or any other with VPN in name under 
> > >> service tab, nor do any of the other VMs. Tried adding “network 
> > >> connections” from applications tab, and can select to import a VPN 
> > >> configuration then can’t proceed to do anything once file is selected 
> > >> because everything is greyed out.
> > >> I’ve looked and looked for help setting up VPN but info seems to be 
> > >> identical and not address this problem. Please help, if I can’t get past 
> > >> first step...
> > > 
> > > Edit: Here is instructions I followed:
> > > https://github.com/tasket/Qubes-vpn-support
> > > https://www.qubes-os.org/doc/vpn/
> > 
> > You should only follow one of these, not both. I assume you meant the 
> > first one...
> > 
> > The way to add a new service here is to just type it on the line and 
> > click the plus sign.
> > 
> > -- 
> > 
> > Chris Laprise
> > https://github.com/tasket
> > https://twitter.com/ttaskett
> > PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
> 
> Yes, quite a few threads link to the first one and seems more useful than the 
> out of date second one. I’m a little embarrassed, thought I need to select 
> from the drop-down menu… 
> Now at second step, there’s no such file or directory called vpn in 
> /rw/config… can I just make this directory? Or is it supposed to exist with 
> files in it?

Usually for those cases you can just make a directory there and the service 
will start running
Note that you have to make this directory in the template VM that your VPN qube 
is using so that you won't have to do this every single time you start your VPN 
qube.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fae0df5f-2c3c-43ee-8cbe-bc7bb096ba9c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dns-over-TLS in sys-vpn. Is it possible? How?

2019-07-01 Thread Sphere
With my experience of using DNSCrypt I actually think that Qubes' has some 
unique way of handling DNS queries given how the nameservers automatically put 
into /etc/resolv.conf are on a different subnet.

I actually think there must be some sort of bind or unbound being ran in there 
that resolves all the DNS queries for you by using sys-net or your netvm as a 
proxy.

In order to make a sys-dns qube or to turn any other qube into a sys-dns qube 
you must ensure that it is listening on port 53 UDP for any DNS queries.

This command alone given by Chris should be enough.
iptables -I INPUT -p udp --dport 53 -j ACCEPT

Afterwards you should change your /etc/resolv.conf to the IP address of your 
sys-dns qube. The IP address can be found out using Qubes Manager and try to 
ping that ip address first to verify if it is reachable by your AppVM in the 
first place.

If your sys-dns qube is not your sys-net or netvm then you should ensure that 
TCP port 853 outbound is allowed through if your firewall rules do not 
explicitly allow all outbound (all outbound is allowed by default for each qube)

(In dom0 terminal)
qvm-firewall [sys-firewall or/and sys-dns] add action=accept proto=tcp 
dstports=853 --before 0

If this doesn't solve it then it may be best to provide us with some logs of 
your stubby

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24d42a1d-b5cc-4d92-9aed-a5f209b1195a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes - Critique (long)

2019-06-28 Thread Sphere
About corruption and reliability of data being stored, regardless of whether or 
not it is sensitive data or day to day files, is not entirely the 
responsibility of the Qubes OS itself. There are many factors to consider, the 
software being used, the filesystem being used, the components of the distro 
being used, and etc.

This is based on my personal experience on using qubes on a daily basis for 
almost over a year already.

So far I've only encountered corruption of data through the use of 
qvm-copy/qvm-move commands to move stuff from vm to vm and this is a rare case 
too since it probably only happens once or twice over a hundred times. With 
this in mind, the LVM thin fs of Qubes I believe, is extremely reliable.

So with that I believe the problem most likely leans more towards the software 
that you are using, with respect to the distro that you are using as well.

I haven't had much trouble using any software so far in my experience of using 
qubes provided they have the right dependencies installed, with respect to my 
usage of fedora minimal template.

Despite that however, I agree with your sentiment about USB devices and the 
detaching notification though I am not entirely dependent on it since I can go 
ahead and confirm myself whether or not the usb device was detached by running 
"sudo lsblk" on the qube where the USB was attached and on the sys-usb qube 
itself. Convenience-wise, it is bad yes and there is definitely room for 
improvement.

Also mind you that flash is a HUGE BLOB of SECURITY RISK. If you're using qubes 
for security reasons then using flash is really counterproductive against it 
not unless you really know what you're doing.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/94143ecf-7500-41e0-8d9b-ab6f154dad02%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TemplateVM updates almost instantly fail when target is VPN qube but dom0 updates run just fine

2019-06-28 Thread Sphere
On Thursday, June 27, 2019 at 11:44:51 AM UTC, unman wrote:
> On Wed, Jun 26, 2019 at 10:12:40PM -0700, Sphere wrote:
> > @unman: thanks for that
> > I also noticed that qubes-updates-proxy.service fails by default on startup 
> > and I'm unsure if that is a minimal template-only problem but I was able to 
> > fix it thanks to it indicating that the problem is a missing folder: 
> > /var/run/qubes-service/qubes-updates-proxy
> > 
> > Pretty much the same problem that I get with clocksync service thankfully 
> > so I was able to confirm that this service was running as intended
> > 
> > systemctl status qubes-updates-proxy:
> > qubes-updates-proxy.service - Qubes updates proxy (tinyproxy)
> >Loaded: loaded (/usr/lib/systemd/system/qubes-updates-proxy.service; 
> > enabled;
> >  vendor preset: enabled)
> >Active: active (running) since Thu 2019-06-27 12:06:14 +08; 2s ago
> >   Process: 1603 ExecStartPre=/usr/lib/qubes/iptables-updates-proxy start 
> > (code=e
> > xited, status=0/SUCCESS)
> >  Main PID: 1608 (tinyproxy)
> > Tasks: 3 (limit: 414)
> >Memory: 4.1M
> >CGroup: /system.slice/qubes-updates-proxy.service
> >??1608 /usr/bin/tinyproxy -d -c 
> > /etc/tinyproxy/tinyproxy-updates.conf
> >??1609 /usr/bin/tinyproxy -d -c 
> > /etc/tinyproxy/tinyproxy-updates.conf
> >??1610 /usr/bin/tinyproxy -d -c 
> > /etc/tinyproxy/tinyproxy-updates.conf
> > 
> > Jun 27 12:06:14 redacted systemd[1]: Starting Qubes updates proxy 
> > (tinyproxy)...
> > Jun 27 12:06:14 redacted systemd[1]: Started Qubes updates proxy 
> > (tinyproxy).
> > Jun 27 12:06:14 redacted tinyproxy-wrapper[1608]: Found tinyproxy at 
> > /usr/bin/tinyproxy
> > 
> > Despite this however, the problem still persists and still behaves the same 
> > even after trying dnf update for 5 times
> > 
> > I think is right about the fact that there is a bug about this
> > 
> > @Chris I think you may be right about the fact that this is a bug and I 
> > guess it's time to escalate it into an issue in github. I'm willing to lend 
> > a helping hand in making the issue as needed.
> > 
> > My setup is all fully dependent on variations of fedora-30-minimal template 
> > that I have tailored depending on use-case of the AppVM that would be using 
> > it.
> > 
> 
> Like Chris, I use a separate qube for updates.
> Unlike you and Chris I don't see the behaviour you report.
> 
> Let's try to dig in before raising a bug report.
> 
> I've tested this with 30-minimal template 201905071541 and 201906241949,
> from stable and testing.
> I've tested against dom0 stable and dom0 testing: both fully updated.
> Test boxes are an old x230 and a custom rig with X-series CPU and 32G RAM.
> 
> In all cases, the proxy is started as appropriate, and the update
> process (from fedora 29 and 30-minimal) waits until proxy is up and then
> proceeds.
> 
> What hardware are you, Sphere and Chris, running?
> 
> Sphere - if you create a dedicated update qube using the 30-minimal with
> qubes-core-agent-networking installed,
> enable the qubes-updates-proxy service, route it through
> sys-firewall, and edit the policy file appropriately, do you see the
> same behaviour? (Almost instant fail)
> What if you start the new update proxy before attempting a 'dnf update'?
> 
> unman

Big update: I was able to solve the problem
What I essentially did:
1. Ensure to run the Update Qube first
2. Confirm and ensure that the qubes-updates-proxy is already running after the 
qube is started. qubes-updates-proxy was listed and set as checked in the 
services tab of Qubes Settings GUI before starting the update qube.
checking was done through the `systemctl status qubes-updates-proxy` command.

3. Ensure that qubes.UpdatesProxy policy file is configured correctly before 
starting the templateVM
4. Ensure that DNS queries are resolving in the update qube
5. Start the templateVM and try to do a dnf update

One big thing to note here is that I encountered the problem after step 4 and 
was able to solve it by ensuring that my update qube is able to properly 
resolve DNS queries but I have to say that what's unique in my situation is 
that I use DNSCrypt for resolving DNS queries.

So basically, the problem was solved after I ran DNSCrypt on the update qube.
Admittedly that was kinda dumb on my part to not realize that the f30 template 
definitely needs to have DNS resolutions to do updating along with that fact 
that I have already blocked all plaintext DNS from going out.

However, I can't quite remember whether or not I had DNSCrypt running on the 
update qube last time I teste

[qubes-users] Re: Quick question please, need help!

2019-06-27 Thread Sphere
The general idea is correct
If dom0 gets pwned then everything else can be pwned and stolen, including your 
data
pwning dom0 properly and successfully however, is not trivial because dom0 has 
no direct access to network hardware to communicate in the first place and 
malicious actors would need malware to communicate directly to the C2 server 
for commands.

What's great about qubes is the fact that with proper hardening, it becomes 
very resilient thanks to the fact that it follows a 0-trust model.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9ce9472f-8c36-44c8-b513-424c591f2b63%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: no DNS resolving being passed to sys-firewall or other appVMs after updates?

2019-06-27 Thread Sphere
On Wednesday, June 26, 2019 at 4:34:11 PM UTC, cubit wrote:
> I am not sure if this is related to recent updates but after updating today 
> and doing a reboot, my sys-firewall and other appVMs are not getting DNS 
> resolving working.
> 
> 
> 
> - sys-net (fedora30) starts up with out an issue, can resolve and connect to 
> the internet
> 
> - sys-firewall starts up and gets an IP address,  it can ping sys-net and 
> hosts on the internet by IP but can not by name.  
> 
> - appVMs are the same as sys-firewall
> 
> 
> 
> on sys-firewall and appVMs I have two entries in /etc/resolv.conf 10.139.1.1 
> and .2   I am not sure what these IPs are as they do not show up in qubes 
> manager and I can not ping them.  
> 
> 
> 
> IPs all start at 10.139.0.5 which is sys-net
> 
> 
> 
> The only way I can get to the internet is to use Tor or VPN which don't rely 
> on the system DNS.   
> 
> 
> 
> Is anyone else experiencing this,  does anyone know what 1.1 and 1.2 hosts 
> are or how I can get DNS up and running again?
> 
> 
> 
> cubit

Well I don't have much of a solution to solving your DNS problem other than 
checking if your DNS queries are resolving in your sys-net vm through the use 
of nslookup command.

An alternative would be using DNSCrypt
https://github.com/jedisct1/dnscrypt-proxy/releases

Using this properly needs to have you change the contents of your 
/etc/resolv.conf to the following:
nameserver 127.0.0.1
options edns0 single-request-reopen

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dda05552-344a-4baa-a2f0-8da76693f6bc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TemplateVM updates almost instantly fail when target is VPN qube but dom0 updates run just fine

2019-06-26 Thread Sphere
@unman: thanks for that
I also noticed that qubes-updates-proxy.service fails by default on startup and 
I'm unsure if that is a minimal template-only problem but I was able to fix it 
thanks to it indicating that the problem is a missing folder: 
/var/run/qubes-service/qubes-updates-proxy

Pretty much the same problem that I get with clocksync service thankfully so I 
was able to confirm that this service was running as intended

systemctl status qubes-updates-proxy:
qubes-updates-proxy.service - Qubes updates proxy (tinyproxy)
   Loaded: loaded (/usr/lib/systemd/system/qubes-updates-proxy.service; enabled;
 vendor preset: enabled)
   Active: active (running) since Thu 2019-06-27 12:06:14 +08; 2s ago
  Process: 1603 ExecStartPre=/usr/lib/qubes/iptables-updates-proxy start (code=e
xited, status=0/SUCCESS)
 Main PID: 1608 (tinyproxy)
Tasks: 3 (limit: 414)
   Memory: 4.1M
   CGroup: /system.slice/qubes-updates-proxy.service
   ├─1608 /usr/bin/tinyproxy -d -c /etc/tinyproxy/tinyproxy-updates.conf
   ├─1609 /usr/bin/tinyproxy -d -c /etc/tinyproxy/tinyproxy-updates.conf
   └─1610 /usr/bin/tinyproxy -d -c /etc/tinyproxy/tinyproxy-updates.conf

Jun 27 12:06:14 redacted systemd[1]: Starting Qubes updates proxy (tinyproxy)...
Jun 27 12:06:14 redacted systemd[1]: Started Qubes updates proxy (tinyproxy).
Jun 27 12:06:14 redacted tinyproxy-wrapper[1608]: Found tinyproxy at 
/usr/bin/tinyproxy

Despite this however, the problem still persists and still behaves the same 
even after trying dnf update for 5 times

I think is right about the fact that there is a bug about this

@Chris I think you may be right about the fact that this is a bug and I guess 
it's time to escalate it into an issue in github. I'm willing to lend a helping 
hand in making the issue as needed.

My setup is all fully dependent on variations of fedora-30-minimal template 
that I have tailored depending on use-case of the AppVM that would be using it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/56db9edd-8442-4a7c-a46b-30b9ca97c1cf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes: Encrypted LVM

2019-06-26 Thread Sphere
By all means hold your horses on asking if Qubes is vulnerable to every single 
one of those lol
I used to be paranoid about Computer Security but if you ain't even gonna 
bother to delve deep down from how computers work up to the way computer 
applications/programs work then you should just focus on what you can actually 
do as a user to strengthen your privacy.

If your biggest concern is trusting your hardware then the best thing you can 
do is to buy Hardware that respects your privacy and install hardened linux/bsd 
into it and never use Windows 10 ever again.

https://www.bleepingcomputer.com/news/hardware/there-are-only-25-devices-that-respect-your-privacy/

Or if you want an easy life just do away with this:
https://puri.sm/products/librem-15/

Only thing left to do with that is to harden it and install your privacy goodies

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e80c2e06-1904-483b-8247-b74c3df40413%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TemplateVM updates almost instantly fail when target is VPN qube but dom0 updates run just fine

2019-06-26 Thread Sphere
@unman The dom0 updates setting is set correctly and working as intended 
through the VPN qube, I haven't tried browsing from the VPN qube itself but I 
can definitely browse from an AppVM connected to it and I can confirm that all 
the browsing being done there is tunneled through the VPN.

I'm using a fedora minimal and I don't see any sort of package requirement for 
a qube to install to provide TemplateVM updates as I read through the Fedora 
Minimal documentation. Only thing that has a requirement from the looks of it 
is a qube for dom0 updates.

Thanks for the suggestion about updateProxy service. I suppose I should set it 
to provide qubes-yum-proxy, is that right?

@Chris Thank you for telling me that as I too am using fedora-30, specifically 
fedora-30-minimal Templates

I am trying to do a setup where a qube is dedicated for the purpose of 
updating, something similar to yours I believe.

I'll try to work on this tomorrow and report results back to this topic.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7623ccd5-9a7d-4bed-b331-b54a6008aa5c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] TemplateVM updates almost instantly fail when target is VPN qube but dom0 updates run just fine

2019-06-24 Thread Sphere
/etc/qubes-rpc/policy/qubes-UpdatesProxy
$type:TemplateVM $default allow,target=VPN

As soon as I execute a sudo dnf update to my template VM, it takes a little 
less than a second for it to go
"Failed to synchronize cache for repo 'updates'"
"Error: Failed to synchronize cache for repo 'updates'"

dom0 updates isn't suffering from this which is why I don't really get what the 
problem is. At first I thought it's the custom resolv.conf being used for 
dnscrypt-proxy but that doesn't seem to be the case after trying to use the dns 
server of the vpn itself

Web browsing and everything else is working as intended through the VPN qube 
and only TemplatVM updates are failing. I don't think there is a problem with 
what I set on /etc/qubes-rpc/policy/qubes-UpdatesProxy

But I don't really face this problem when the target is set to the net VM. That 
however is no good since I'm looking to utilize the VPN for Template updating.

Is TemplateVM updating dependent on whether or not net VM is capable of 
connecting to the internet and domain name resolutions?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/919df0ac-c1a5-4da7-912b-fcd55249873f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Looking to explicitly not use mirrors to download fedora updates

2019-06-16 Thread Sphere
Welp I guess it really won't work since there's really nothing but README.md 
left within the folders for deprecated Fedora release versions. Thanks for your 
reply unman!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f45209e4-b4b1-49ad-a03f-9c55dd5f1cbc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Looking to explicitly not use mirrors to download fedora updates

2019-06-14 Thread Sphere
I apologize for not clearing that out. Uhh, it's that just my machine in 
particular or maybe at least on the internet that my machine is using, it 
prefers to use the ftp.riken.jp mirror and it doesn't seem to dynamically 
change.

So far so good, everything has been working nicely on my cloned templates but 
for some reason it doesn't work on dom0 updates and it ends up with "Failed to 
synchronize cache for repo 'fedora', 'updates'

Here is what's in my repo file:
[fedora]
name=Fedora 25 - x86_64
failovermethod=priority
baseurl=https://download-ib01.fedoraproject.org/pub/fedora/linux/releases/25/Everything/x86_64/os/
enabled=1
enablegroups=0
metadata_expire=7d
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-25-primary

[updates] entry is almost exactly the same just minorly different string on 
baseurl but still on the same domain of download-ib01.fedoraproject.org

Does sudo qubes-dom0-update do something special in particular? I really have 
no idea why it fails as Qubes repo synchronizes just fine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b0e6466-44b2-4ac0-bf13-6bdcbeaf8c6f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Looking to explicitly not use mirrors to download fedora updates

2019-06-13 Thread Sphere
Tried things on an AppVM
turned fedora.repo and fedora-updates.repo on /etc/yum.repos.d/ into just the 
following content:

[fedora]
name=Fedora
baseurl=https://download-ib01.fedoraproject.org/pub/fedora-secondary

It did execute update well somehow just that IDK why it's still probing Fedora 
Modular when there's only just that on both fedora.repo and fedora-updates.repo
Is there another directory/file that I'm missing here?

Looking to do this for dom0 too hopefully to get updates directly from Red Hat 
officially hosted infrastructure

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a214128-c292-4f2d-9b3d-e8a48159b004%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Looking to explicitly not use mirrors to download fedora updates

2019-06-13 Thread Sphere
Hi, I checked DNS queries being made as I was updating templateVMs today and I 
noticed that there is an extreme bias preference of using ftp.riken.jp which 
didn't sit well with me since that would mean that it was downloading updates 
in plaintext and thus, unprotected against MITM attacks.

While I know that dnf has a verification system in place, I do not want to 
completely depend on it.

With that, I've done some research about it which led me to this:
https://askbot.fedoraproject.org/en/question/7960/how-to-choose-a-specific-mirror-source/

I noticed that on both fedora.repo and fedora-updates.repo, the baseurl is 
commented out and metalink is definitely the one being used. So I'm thinking 
that maybe it's enough to just comment out metalink and settle with the baseurl.

Would this be enough for what I need to get done or am I missing something?

Also, if you guys have suggestions for a mirror to trust then I would be 
willing to take you up on those

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44d7f216-638d-4a64-9ecd-e44823ce9d77%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Outline - your own OpenVPN server without logs

2019-06-05 Thread Sphere
Well for starters, Outline doesn't really use VPN but is just using proxy 
technology, specifically Shadowsocks.

So using it with Qubes VPN is kinda well, just partial security? It only 
affects TCP connections but not everything else so it's not really a "VPN".

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b13a6ca-13cc-4591-88d4-db2ced3e5a83%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DNF will only download packages for the transaction

2019-06-05 Thread Sphere
My bad for not indicating that. The problem is that it only downloads it and 
stops exactly after that and doesn't even start installing the updates.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/11c6b637-95e0-454f-8a6b-bf687c9cc601%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] DNF will only download packages for the transaction

2019-06-04 Thread Sphere
This has annoyed me for the second time and IDK what to do about it anymore. 
Got a workaround for this before with sudo dnf reinstall suggested by someone 
on a thread I created back then but yeah it's back after I just did a
sudo qubes-dom0-update --clean

Seems the workaround doesn't work for kernel-qubes-vm and I haven't tried for 
kernel but I assume it may be the same case.

Could anyone help me with this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/330a5f1a-4e0a-4b94-96fa-0c1d780d4438%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Error: Unable to find a match for fedora-30/fedora-30-minimal (yet again for new templates)

2019-06-04 Thread Sphere
I'll mark this as complete later in hopes of maybe getting a solution to the 
"DNF will only download packages for the transaction".

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/58e7a70d-4595-42a1-b0ca-06d51f71338b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Error: Unable to find a match for fedora-30/fedora-30-minimal (yet again for new templates)

2019-06-04 Thread Sphere
Interesting, this is the first time I am told about that
It downloaded newly released versions of kernel-qubes-vm and kernel but sadly 
it's yet another annoying "DNF will only download packages for the transaction."

I got this problem too before and was worked-around with a sudo dnf reinstall 
[package] but unfortunately it doesn't seem to work for kernel and 
kernel-qubes-vm

Thankfully that solved the problem of not being able to find a match for 
fedora-30. Cheers!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d0460964-ea92-450b-8dcb-a343002e1e7d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: R4 system requirements; AMD compatibility?

2019-06-04 Thread Sphere
I haven't personally tried this but I am highly confident that Qubes will 
definitely work on an ASRock X370 Taichi

https://www.asrock.com/mb/AMD/X370%20Taichi/

It's the motherboard out there that has aced being able to do GPU Passthrough 
on a Windows Guest VM on a Linux Host so all in all it's very reliable for 
Qubes' many VM requirements and has done very well to reliably run various 
linux distros just by me reading through alot of pages/articles about doing GPU 
passthrough in linux

All in all, it's really worth the try and even if it doesn't work on qubes then 
maybe it will work on considerable alternatives like Subgraph OS.
https://subgraph.com/

There's X470 and X570 out already but I'm not sure how it fares with Qubes OS 
given that there's alot of new stuff going on in there right now that may not 
be compatible or working well with Linux.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5a4c9c93-d801-4bde-aac6-25fc3cb2aad0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New advanced linux trojan/rootkit just discovered, servers still active

2019-06-04 Thread Sphere
This one shouldn't be a problem so long as dom0 is not compromised.
Also nice that we can just block 103.206.123[.]13 and 103.206.122[.]245

Also, this thing doesn't even survive a reformat so yeah nothing much to worry 
about (not unless they also aim to persist in your routers and other network 
devices).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/de0cda3a-3316-4f44-80a0-6c9931ae02b4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Bootloop

2019-06-04 Thread Sphere
That's not a bootloop, it's simply that you are stuck at the phase where you 
have to unlock the drive's encryption

If you can't get past that then maybe there's a problem with your keyboard? 
Reinstall qubes and put an easy/short encryption pass first then maybe the 
problem resides with your keyboard.

I've never encountered this problem before the feedback I can give is pretty 
limited but I stick with the usual default keyboard layout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/07787a84-eebe-4920-87de-98e9f71c18bb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Openbsd as a netvm

2019-06-04 Thread Sphere
On Tuesday, June 4, 2019 at 12:44:46 AM UTC+8, ronpunz wrote:
> On 6/3/19 12:10 PM, unman wrote:
> > On Mon, Jun 03, 2019 at 09:28:01AM +, ronpunz wrote:
> >> On 6/3/19 12:54 AM, unman wrote:
> >>> On Sun, Jun 02, 2019 at 06:24:33PM +, ronpunz wrote:
>  On 6/2/19 3:11 PM, unman wrote:
> > On Sun, Jun 02, 2019 at 02:04:57PM +, ronpunz wrote:
> >> On 6/2/19 1:46 PM, unman wrote:
> >>> On Sun, Jun 02, 2019 at 01:41:48PM +, ronpunz wrote:
>  On 6/2/19 1:06 AM, unman wrote:
> >> Not sure which direction to go next and to be honest, feel a bit 
> >> out of my
> >> depth. When I started this task I thought there was a simple 
> >> correlation
> >> between  openFW to sys-net and fw  to sys-firewall. In reality it 
> >> seems a
> >> fair bit more complicated than that. For example, fw seems to have 
> >> a dual
> >> firewall and network interface role?
> >>
> > I dont understand what this means.
> > There is simple correlation as you describe, it's just that fw 
> > needs to
> > do a little more work to provide the internal interface to the HVM.
> >
> > What error do you get when you bring up em0?
> > What's the output from ifconfig?
> >
>  I note the ifconfig screen shots were missed off my reply.
> 
>  They should be here
> 
> >>> I'm sorry - can you cut and paste the contents rather than imaging?
> >> Copy/paste as requested
> >>
> > ??
> > I cant see the images - paste the contents in the mail.
> >
>  Sorry. I'm a bit confused. I pasted them in the mail and they're 
>  viewable on
>  the qubes user forum at
>  https://groups.google.com/forum/#!topic/qubes-users/MpXLhz5COvM
> 
>  Please let me know if there's more i can do
> 
> >>> I cant view them.
> >>> Please post the contents, not pictures.
> >>>
> >> Gotcha. However, that's easier said than done. After trying and failed 
> >> using
> >> various OCR software. To cut a long story short, I've ended up typing the
> >> whole thing out as follows:
> >>
> >> joo# ifconfig
> >> lo0: flags=8049 mtu 32768
> >>      index 5 priortity 0 llprio 3
> >>      groups: lo
> >>      ininet6 :: 1 prefixlen 128
> >>      inet6 fe80 ::1%lo0 prefixlen 64 scopeid 0x5
> >>      inet 127.0.0.1 netmask 0xff00
> >> xnf0: flags=8843 mtu 1500
> >>      lladdr 00:16:3e:5e:6c:00
> >>      index 1 priortity 0 llprio 3
> >>      media: ethernet manual
> >>      status: active
> >>      inet: 10.137.0.10 netmask 0xff00 broadcast 10.255.255.255
> >> re0: flags =8802 mtu 1500
> >>      lladdr 1c:1b:0d:a4:1e:e4
> >>      index 2 priortity 0 llprio 3
> >>      media: ethernet autoselect (none)
> >>      status: no carrier
> >> em0: flags=8843 mtu 1500
> >>      lladr 68:05:ca:55:75:6f
> >>      index 3 priortity 0 llprio 3
> >>      groups: egress
> >>      media: ethernet autoselect 1000baseT
> >> (full-duplex,master.rxpause,txpause)
> >>      status: active
> >> enc0: flags=0<>
> >>      index 4 priortity 0 llprio 3
> >>      groups: enc
> >>      status: active
> >> pflog0: flags=141 mtu 33136
> >>      index 6 priortity 0 llprio 3
> >>      groups: pflog
> >>
> >> I'm now able to successfully ping 8.8.8.8 but not google.com. Indicating a
> >> dns issue?
> >>
> >> The dns setting in pf is iptables -t nat -I PR-QBS -p udp --dport 53 -j 
> >> DNAT
> >> --to 9.9.9.9
> > I'm sorry for the pain in doing this - you could always have booted the
> > openBSD qube with a USB attached, and transferred the files that way.
> > Like a sneakernet but smaller scale - a fingernet?
> >
> > You dont say *from where* you are able to ping. Yes, this looks like a
> > DNS issue.
> >
> > If you want to get this working from the BSD qube, then check
> > /etc/resolv.conf
> > This isn't necessary - in fact you may prefer NOT to allow outgoing
> > traffic originating from the openBSD firewall.
> >
> > You say that rule you have is "in pf" - do you mean "in fw"?? It's just
> > not a pf thing.
> > So if it *is* in fw, and you are able to ping from fw, then this is looking 
> > good.
> > Simplest way to proceed is to set /etc/resolv.conf in fw to use 9.9.9.9
> >
> > Give just a little more detail on what's working and from where.
> >
> Update
> 
> I've noticed that the contents of fwVM's /etc/resolv.conf does not 
> survive a reboot. The file contents revert to default values: 
> "nameserver 10.137.0.1 nameserver 10.137.3.254"
> 
> I hope this helps debuging

That's normal, apparently that happens every single time an AppVM starts up 
even if you personally changed the value in the TemplateVM itself. Trust me, 
that's part of my frustrations back then lol.

Could you try having another AppVM running and connected to your Openbsd netvm 
and see if you can 

[qubes-users] Error: Unable to find a match for fedora-30/fedora-30-minimal (yet again for new templates)

2019-06-04 Thread Sphere
Hi, I have no idea why I'm experiencing the same old problem with the new 
fedora-30 templates. I was able to successfully install fedora-29-minimal when 
I had the first instance of this problem so I thought that the problem may be 
residing on the repositories but with this happening then maybe there's more to 
it than just that.

I've already tried doing sudo dnf clean all to no avail but sadly 
it doesn't solve the problem.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/96c5d9e8-426a-4fbc-b872-b93f808e9bd9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Announcement: Fedora 30 TemplateVM available

2019-06-02 Thread Sphere
Thank you very much for the timely wonderful update qubes team!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3c5366a3-26f7-4595-a284-714ef672ec5e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Openbsd as a netvm

2019-06-02 Thread Sphere
I think what unman means is for you to provide the logs in text and not just 
provide images to help diagnose this problem

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51f90c16-e24f-4154-a9c7-11a7e4820e28%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fixing support for H.264/MSE & H.264 playback on firefox in Fedora-29

2019-05-06 Thread Sphere
On Monday, May 6, 2019 at 11:38:19 PM UTC+8, Sergio Matta wrote:
> > Does anyone know which specific packages need to be installed
> 
> Try this info: 
> 
> https://forums.fedoraforum.org/showthread.php?317721-fedora-28-and-firefox-video(h264-youtube-gstreamer1)

Thank you very much for that reference! Thankfully I have tested all steps that 
I've done before on an AppVM so the unneeded stuff that I downloaded didn't 
remain.

The latter replies on the thread has the solid solution of doing
sudo dnf install compat-ffmpeg28

Which amazingly completed playback support on youtube
Also appreciate the fact that the thread mentioned dependencies needed to play 
twitter videos.

Cheers!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2d4c7a9-1a20-446f-a828-ed90e76906fa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fixing support for H.264/MSE & H.264 playback on firefox in Fedora-29

2019-05-05 Thread Sphere
On Monday, May 6, 2019 at 12:24:12 PM UTC+8, Sphere wrote:
> I've been trying to figure this out for days but to no avail, I couldn't 
> really make it work. I do my checking by visiting https://youtube.com/html5
> 
> Did all sorts of searching and stuff. Some suggested installing vlc but 
> apparently it doesn't seem to exist on the repositories of qubes fedora
> 
> The seemingly best possible solution I found was from 
> https://rpmfusion.org/Configuration
> 
> Where I did a
> sudo dnf groupupdate multimedia
> 
> Much to my dismay, it still didn't solve this problem. D:
> 
> So I'm here in hopes that someone out there may have been able to make this 
> work on an appVM based on fedora-29 qubes template. Sincerely hoping there is 
> someone OTL
> 
> You could probably say that the easiest way to solve my problems would be to 
> install/use google-chrome or any chromium-based web browsers instead but that 
> doesn't sit well with me because I don't really like the idea of going with 
> the flow and becoming entirely dependent on google/google-chrome/chromium.
> 
> Which is why I'm dead set on finding a solution to this.

Oh silly me, I did not even do research on Qubes documentation nor even a 
search on this place.

Found some hope at 
https://www.qubes-os.org/doc/software-update-vm/#tocAnchor-1-1-11

And performed the following commands:
sudo dnf config-manager --set-enabled rpmfusion-free rpmfusion-nonfree
sudo dnf upgrade --refresh

However, I still can't figure out the exact codec/s dependency to completely 
support it.
I did tried installing the following little-by-little but in the end, my 
firefox still can't play H.264 stuff
gstreamer1
gstreamer1-plugins-good
gstreamer1-plugins-ugly
gstreamer1-plugins-ugly-free
gstreamer1-plugins-bad-nonfree
gstreamer1-plugins-bad-free

As a last resort, I resulted to installing vlc and my firefox can now magically 
play it.

Bad thing is that installing vlc installs a HUGE bunch of stuffs and I don't 
even use vlc for playing media.
Does anyone know which specific packages need to be installed?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50f8b9a2-e55c-4dc7-a0dc-7b4d37255eeb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fixing support for H.264/MSE & H.264 playback on firefox in Fedora-29

2019-05-05 Thread Sphere
I've been trying to figure this out for days but to no avail, I couldn't really 
make it work. I do my checking by visiting https://youtube.com/html5

Did all sorts of searching and stuff. Some suggested installing vlc but 
apparently it doesn't seem to exist on the repositories of qubes fedora

The seemingly best possible solution I found was from 
https://rpmfusion.org/Configuration

Where I did a
sudo dnf groupupdate multimedia

Much to my dismay, it still didn't solve this problem. D:

So I'm here in hopes that someone out there may have been able to make this 
work on an appVM based on fedora-29 qubes template. Sincerely hoping there is 
someone OTL

You could probably say that the easiest way to solve my problems would be to 
install/use google-chrome or any chromium-based web browsers instead but that 
doesn't sit well with me because I don't really like the idea of going with the 
flow and becoming entirely dependent on google/google-chrome/chromium.

Which is why I'm dead set on finding a solution to this.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5e91db2d-a44a-4f7d-b45b-bcefc81369ce%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Looking to edit rules.ml of my mirage-firewall VM but since I cannot run shell, IDK what to do

2019-04-21 Thread Sphere
On Thursday, April 11, 2019 at 8:02:33 PM UTC+8, Thomas Leonard wrote:
> On Thursday, April 11, 2019 at 4:16:17 AM UTC+1, Sphere wrote:
> > @unman Thanks for the clarification. I suppose I misunderstood it wrong 
> > since I thought you have to set it directly using some sort of text editor 
> > and be done with it. So I'll have to recompile it I see, welp guess I have 
> > no choice but go through with that haha
> > 
> > On Thursday, April 11, 2019 at 3:16:32 AM UTC+8, 799 wrote:
> > > Hello,
> > > 
> > > 
> > > 
> > > Thomas Leonard  schrieb am Mi., 10. Apr. 2019, 20:42:
> > > (...)
> > > 
> > > To change the rules, you edit rules.ml, rebuild and redeploy (this should 
> > > only take a couple of seconds after the first build).
> > > 
> > > 
> > > (...)
> > > 
> > > 
> > > 
> > > Can you or someone from the mirage fw for Qubes team give some examples 
> > > how to write rules for mirage?
> > > 
> > > 
> > > Examples:
> > > 
> > > 
> > > 1)  can access  via ssh
> > > 2)  can reach  using  via TCP
> > > 3) Block access from  to  
> > >
> > > I think some example rules will make it easier to understand how to write 
> > > rules.
> 
> I've added some examples at 
> https://github.com/mirage/qubes-mirage-firewall/pull/54 (see the changes to 
> rules.ml).
>  
> Actually, matching on individual machines was a bit ugly, so I also made some 
> changes to let you name all the machines you want to refer at the start of 
> the rules file. You'll need those changes too for the new examples to work.
> 
> > > Regarding rebuilding and redployment:
> > > Maybe we can write a small script that will do the following:
> > > 
> > > 
> > > - launch mirage build VM
> > > - apply changes to rules.ml
> > > - rebuild
> > > - copy new kernel files back to dom0
> > > - shutdown mirage build VM
> > > - restart mirage firewall proxyVM
> 
> See: 
> https://github.com/mirage/qubes-mirage-firewall/#easy-deployment-for-developers
> 
> e.g. I build and deploy the firewall from my dev VM with:
> 
> [dev]$ make && test-mirage qubes_firewall.xen mirage-firewall
> 
> It does what you describe, and also tails the log file so you can see it from 
> the build VM. The process is triggered from the build VM rather than from 
> dom0 because working in dom0 is risky. There is a policy so that only the 
> builder VM can push the kernel, and only the mirage-firewall kernel can be 
> updated.
> 
> Note that the instructions for test-mirage show how to set up a "mirage-test" 
> unikernel. You'll need to use "mirage-firewall" as the name instead.
> 
> > I second this idea. I'm having a hard time myself trying to absorb the very 
> > raw instructions of making rules in the rules.ml
> > 
> > While the added convenience expands the surface of attack by a bit, I think 
> > this can be very useful in environments where you have to frequently 
> > interact with firewall rules.
> > 
> > Also got questions about makings rules in rules.ml
> > 
> > let from_client = function
> >   | { dst = (`External _ | `NetVM) } -> `NAT
> >   | { dst = `Client_gateway; proto = `UDP { dport = 53 } } -> `NAT_to 
> > (`NetVM, 53)
> >   | { dst = (`Client_gateway | `Firewall_uplink) } -> `Drop "packet 
> > addressed to firewall itself"
> >   | { dst = `Client _ } -> `Drop "prevent communication between client VMs"
> > 
> > Does `NAT_to (`NetVM, 53) mean that NAT will be applied to the outgoing 
> > packet then NetVM itself will process the DNS Query within its own VM 
> > context? If this is right, then configuring a wrong DNS server within NetVM 
> > would essentially mean DNS resolutions will fail right?
> 
> Yes. Client AppVMs are by default configured to use the firewall as their DNS 
> (check your /etc/resolv.conf). The firewall then just forwards these requests 
> to sys-net.
> 
> > Or is this because the rule { dst = `Client_gateway; proto = `UDP { dport = 
> > 53 } } -> `NAT_to (`NetVM, 53) is intended for internal DNS resolutions? 
> > (From my own understanding, that seems to be the case but I'd like to be 
> > corrected if this rule really is for internet DNS resolutions)
> > 
> > Moving forward, if I have no lapses in understanding the guidelines in 
> > making rules, then this must be the ruleset for allowing only outgoing 
> > traffic towards port 25, 110,

Re: [qubes-users] qubes-mirage-firewall 0.5

2019-04-21 Thread Sphere
I have been briefly reminded that technology is not some magic bullet where you 
just fire and forget.
Thank you for this

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/977cc4bb-868b-43ff-b044-fe8ffb3a7238%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Looking to edit rules.ml of my mirage-firewall VM but since I cannot run shell, IDK what to do

2019-04-10 Thread Sphere
@unman Thanks for the clarification. I suppose I misunderstood it wrong since I 
thought you have to set it directly using some sort of text editor and be done 
with it. So I'll have to recompile it I see, welp guess I have no choice but go 
through with that haha

On Thursday, April 11, 2019 at 3:16:32 AM UTC+8, 799 wrote:
> Hello,
> 
> 
> 
> Thomas Leonard  schrieb am Mi., 10. Apr. 2019, 20:42:
> (...)
> 
> To change the rules, you edit rules.ml, rebuild and redeploy (this should 
> only take a couple of seconds after the first build).
> 
> 
> (...)
> 
> 
> 
> Can you or someone from the mirage fw for Qubes team give some examples how 
> to write rules for mirage?
> 
> 
> Examples:
> 
> 
> 1)  can access  via ssh
> 2)  can reach  using  via TCP
> 3) Block access from  to  
> 
> 
> I think some example rules will make it easier to understand how to write 
> rules.
> 
> 
> Regarding rebuilding and redployment:
> Maybe we can write a small script that will do the following:
> 
> 
> - launch mirage build VM
> - apply changes to rules.ml
> - rebuild
> - copy new kernel files back to dom0
> - shutdown mirage build VM
> - restart mirage firewall proxyVM
> 
> 
> The easiest procedure would be to keep the rules.ml in dom0, edit it there 
> and then qvm-copy or qvm-run --pass-io cat ... it to the mirage build VM.
> 
> 
> -O/799

I second this idea. I'm having a hard time myself trying to absorb the very raw 
instructions of making rules in the rules.ml

While the added convenience expands the surface of attack by a bit, I think 
this can be very useful in environments where you have to frequently interact 
with firewall rules.

Also got questions about makings rules in rules.ml

let from_client = function
  | { dst = (`External _ | `NetVM) } -> `NAT
  | { dst = `Client_gateway; proto = `UDP { dport = 53 } } -> `NAT_to (`NetVM, 
53)
  | { dst = (`Client_gateway | `Firewall_uplink) } -> `Drop "packet addressed 
to firewall itself"
  | { dst = `Client _ } -> `Drop "prevent communication between client VMs"

Does `NAT_to (`NetVM, 53) mean that NAT will be applied to the outgoing packet 
then NetVM itself will process the DNS Query within its own VM context? If this 
is right, then configuring a wrong DNS server within NetVM would essentially 
mean DNS resolutions will fail right?

Or is this because the rule { dst = `Client_gateway; proto = `UDP { dport = 53 
} } -> `NAT_to (`NetVM, 53) is intended for internal DNS resolutions? (From my 
own understanding, that seems to be the case but I'd like to be corrected if 
this rule really is for internet DNS resolutions)

Moving forward, if I have no lapses in understanding the guidelines in making 
rules, then this must be the ruleset for allowing only outgoing traffic towards 
port 25, 110, and 143:

let from_client = function
  | { dst = (`External _ | `NetVM); proto = `TCP { dport = 25, 110, 143 } } -> 
`NAT
  | { dst = (`Client_gateway | `Firewall_uplink) } -> `Drop "packet addressed 
to firewall itself"
  | { dst = `Client _ } -> `Drop "prevent communication between client VMs"

I also want to know why there is an underscore in front of `External and `Client

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8a16ee49-6cd8-4506-864b-4c6e9683e152%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Looking to edit rules.ml of my mirage-firewall VM but since I cannot run shell, IDK what to do

2019-04-09 Thread Sphere
So I have now also boarded the mirage-firewall VM hype to replace sys-firewall 
in order to take advantage of the very nice small memory consumption of just 32 
MB

After searching around I literally failed to find anything that could help me 
know how I'm gonna edit rules.ml in the mirage-firewall VM

The VM as it is right now is running on fedora-29 and trying to launch 
gnome-terminal/xterm in the VM using qvm-run returns with the error code that I 
usually get when it doesn't recognize the command/command does not exist in the 
VM at all

May I ask for any leads in getting through this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cdb1fe4b-33a4-48ef-8900-1940a41fe5af%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is it just my machine or sys-net vm by default, has an INPUT accept iptables rule for port 8082?

2019-04-09 Thread Sphere
So I tried removing the rule today and attempted to do a templateVM Update
Oddly enough it updates just fine and my setting on qubes-rpc for TemplateVM 
updates is set as my sys-net vm

Not unless this is because I have already done an update without removing the 
iptables rule first which caused a complete sync of repository metadata
Thus, when I removed the rule and did an update again, there were no problems 
because metadata has already been sync'd. Or do you think this hypothesis is 
wrong?


On Monday, April 8, 2019 at 8:16:21 PM UTC+8, unman wrote:
> On Mon, Apr 08, 2019 at 01:35:45PM +1000, haaber wrote:
> > > So I was doing some security checks on a whim in my Qubes machine until I 
> > > stumbled upon discovery that my the INPUT chain of iptables in my net VM 
> > > has a rule of accepting all tcp connections to port 8082 coming from 
> > > anywhere
> > 
> > I checked and confirm the same line in my sys-net:
> > 
> > -A INPUT -i vif+ -p tcp -m tcp --dport 8082 -j ACCEPT
> > 
> > I cannot offer insightful help at the moment. To permanently change the
> > iptables, you might find clues in the qubes-firewall documentation.
> > Otherwise, searching a bit I got here
> > https://github.com/QubesOS/qubes-issues/issues/3201 the impression that
> > this port is used for  non-torified Qubes updates proxy.  Do update
> > mechanisms still work (the torified && non-torified one) if you remove
> > the line manually?
> 
> It is indeed part of updates-proxy, which I assume you have enabled in
> sys-net.
> Sphere reports the rule allowing "coming from anywhere" - if this is o
> then they must override the default - as haaber reports the default rule
> allows traffic originating from the vif+ interfaces.
> I guess this is a hangover from 3.2, as templates now use qubes-rpc,
> but it does allow you to use proxy settings in your qubes and perform
> package updates/installs.

About that, sorry I forgot to specify which interface it was. By "anywhere" I 
had intended to mean any source ip address would be permitted to connect to 
port 8082 but as for the interface, it's definitely vif+

Welp, I suppose I'll do more testing in the following days before concluding 
that it's safe to just permanently remove it from the iptables rules since it 
doesn't break my updating of TemplateVMs

I'll just leave this iptables command here for reference:
sudo iptables --insert INPUT 1 -i vif+ -p tcp -m tcp --dport 8082 -j ACCEPT

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/545aceee-38b9-48a8-b392-475fbcbe864d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qubes-mirage-firewall 0.5

2019-04-08 Thread Sphere
So I have briefly read README.md about this and does this thing really have to 
run as a PV VM and cannot be a PVH VM?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4aad0c4d-0b60-47e6-b885-34c48d50af38%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is it just my machine or sys-net vm by default, has an INPUT accept iptables rule for port 8082?

2019-04-07 Thread Sphere
@haaber thank you for your response and information provided to my inquiry
Unfortunately I have already performed a full update of VMs before I discovered 
this but I will check up on this through an update/install whenever I'm free 
from my work in order to provide an update about this

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0568d1cc-0cdf-4b1f-837d-f2eee371bf65%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Is it just my machine or sys-net vm by default, has an INPUT accept iptables rule for port 8082?

2019-04-07 Thread Sphere
So I was doing some security checks on a whim in my Qubes machine until I 
stumbled upon discovery that my the INPUT chain of iptables in my net VM has a 
rule of accepting all tcp connections to port 8082 coming from anywhere

I checked my other VMs and discovered that they didn't have this rule and that 
despite deleting the rule, whenever I disconnect the laptop from the wifi and 
reconnecting it would make this rule get added back

So I thought about doing something to make permanent/persistent changes to 
these iptables rules unless otherwise that there is good reason as to why port 
8082 has to be open for the net VM

I would also like to ask where should I do changes to make iptables rules 
persistent, in the net VM or the template VM?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/322a1f18-730e-45c2-92fb-5b044406cd85%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Deleting debian-9 template and getting a new one returns an error: "Error: Unable to find a match"

2019-03-10 Thread Sphere
@cooloutac: I'm using Qubes 4.0 right now

@American Qubist 001: I'm sorry but I beg your pardon, could you please be more 
specific? An example at least of what you mean by using different syntax
Could you also specify which repos you used?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39742c31-b185-49d0-9ec5-a6fa7295212d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: QSB #048: Multiple Xen vulnerabilities

2019-03-05 Thread Sphere
Thank you very much for this advisory and the hard work

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2fb41c10-d296-4488-99b6-88976e015ff8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Deleting debian-9 template and getting a new one returns an error: "Error: Unable to find a match"

2019-03-05 Thread Sphere
I also did what Chris suggested as well as the dnf clean all and the result is 
all the same.
No problem with my dns for sure because I'm using dnscrypt on a pool of 19 dns 
servers and I've never had problems resolving everything so far

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5595b0bc-6758-43da-93f0-97f1d24877de%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Deleting debian-9 template and getting a new one returns an error: "Error: Unable to find a match"

2019-03-04 Thread Sphere
Thanks for this unman
I tried the commands you suggested and it still ended up with the very same 
"Error: Unable to find a match"
I'll track that issue you raised to know when it gets fixed (Y)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2c5ae297-2706-41f1-8051-edd467d8847c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Could Qubes Installation Configuration Be More User Friendly?

2019-03-03 Thread Sphere
Oh and I must say, Nvidia is a sucker for Open source
Really a huge pain to have their GPU and want to use the KDE desktop RE

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/059e6650-4a7d-4e78-9203-708de6387dbc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Could Qubes Installation Configuration Be More User Friendly?

2019-03-03 Thread Sphere
On Monday, March 4, 2019 at 10:14:18 AM UTC+8, Aaron wrote:
> On Sun, Mar 3, 2019 at 3:41 PM Chris Laprise  wrote:
> 
> On 3/3/19 2:56 AM, Aaron wrote:
> 
> > Unfortunately I don't have that option in BIOS. There is no way I can 
> 
> > disable Nvidia chip.
> 
> > 
> 
> > An average user won't deal with that much complication during 
> 
> > installation and this is probably a huge barrier to convert many users 
> 
> > from other OS to Qubes.
> 
> > 
> 
> > I hope to see Qubes finding an easy solution for this issue.
> 
> 
> 
> -
> 
> Please post replies to the bottom, not the top.
> 
> -
> 
> 
> 
> Unfortunately, if Nvidia is secretive and only cooperates fully with 
> 
> Microsoft, then there is no way to reliably make such complex hardware 
> 
> 'just work'... too much is unknown and left to guessing.
> 
> 
> 
> https://en.wikipedia.org/wiki/Nvidia#Open-source_software_support
> 
> 
> 
> Its situations like this where people discover that hardware is not some 
> 
> ideal blank slate, requiring programmers to only put in the right amount 
> 
> of effort to get satisfactory results. Detailed information about 
> 
> accessing hardware features is necessary.
> 
> 
> 
> And if your laptop maker forces you to use Nvidia then your only option 
> 
> (for that machine) is to try to troubleshoot the specific compatibility 
> 
> issues you're experiencing.
> 
> 
> 
> Consumers who value open source do have better GPU choices such as AMD 
> 
> and Intel. They might even contact Nvidia (who are very wealthy BTW) to 
> 
> ask them to support Linux instead of pretending the onus is on Linux or 
> 
> Qubes developers.
> 
> 
> 
> OTOH, people who don't want to think much about their computers (and 
> 
> their role as a consumer) or who don't value open source and the goodies 
> 
> it offers (like Qubes security) can remain comfortable with Nvidia 
> 
> hardware ...if they go back to Windows.
> 
> 
> 
> -- 
> 
> 
> 
> Chris Laprise, tas...@posteo.net
> 
> https://github.com/tasket
> 
> https://twitter.com/ttaskett
> 
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
> 
> 
> 
> 
> 
> 
> I understand. It's definitely frustrating.
> 
> 
> I'm definitely new to Qubes, but I'm just wondering... I'm able to install 
> Ubuntu on the 
> same machine. I had to install Nvidia driver after Ubuntu installation was 
> done and it 
> wasn't a big deal. It took a few mins to handle. At least, I was able to 
> switch to shell (with Ctrl-Alt-F2) 
> and install Nvidia drivers at the last stage of the installation, at user 
> login stage.
> 
> 
> How does Ubuntu handle a similar issue, at least until hitting the login 
> stage, without any configuration?
> 
> 
> Aaron

I believe this is because of a vast difference of manpower and popularity 
between Ubuntu and Qubes. Also taking into consideration the use-case of Qubes 
when it comes to popularity.

You see, Operating systems don't really work "magically" on hardware
These operating systems need to have drivers designed and coded in order to 
establish stable communication between your Hardware and Operating system.

Taking this in mind, yes, for the most part, the general approach is to have a 
driver for each and every popular hardware that are put into machines and are 
being utilized by users.

There may be generic drivers but these drivers don't really work universally

So in order to code these drivers, you need a vast amount of manpower
Since Ubuntu is arguably the most popular linux distribution to the general 
populace and I believe popularity really has alot of influence to the amount of 
people contributing to the Ubuntu project - contributors who could definitely 
help in coding these drivers

While I'm not exactly sure if there is a way to make installation seamlessly 
work on 'any' hardware and only have issues float by Login interface and have 
access to shell, I sincerely believe that the very reason why installation 
tends to fail alot is the lack of drivers.

There are a bunch of things you can try to make installation happen like 
setting nomodeset, acpi=off, and etc.

Alas, if your notebook has an intel CPU then I seriously believe it has Intel 
HD graphics not unless it's those old ones that don't really have it
It would be great if you have Intel HD graphics cause you can definitely push 
through installation with nomodeset to avoid utilizing your nvidia GPU

It's not ideal to use that GPU for Qubes anyway, specially when you're looking 
to make some gaming VM where you would passthrough your Nvidia GPU

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/369191f3-38ec-4a47-85cc-c9ae942eaacc%40googlegroups.com.
For more options, visit 

Re: [qubes-users] Could Qubes Installation Configuration Be More User Friendly?

2019-03-03 Thread Sphere
I believe this is because of a vast difference of manpower and popularity 
between Ubuntu and Qubes. Also taking into consideration the use-case of Qubes 
when it comes to popularity.

You see, Operating systems don't really work "magically" on hardware
These operating systems need to have drivers designed and coded in order to 
establish stable communication between your Hardware and Operating system.

Taking this in mind, yes, for the most part, the general approach is to have a 
driver for each and every popular hardware that are put into machines and are 
being utilized by users.

There may be generic drivers but these drivers don't really work universally

So in order to code these drivers, you need a vast amount of manpower
Since Ubuntu is arguably the most popular linux distribution to the general 
populace and I believe popularity really has alot of influence to the amount of 
people contributing to the Ubuntu project - contributors who could definitely 
help in coding these drivers

While I'm not exactly sure if there is a way to make installation seamlessly 
work on 'any' hardware and only have issues float by Login interface and have 
access to shell, I sincerely believe that the very reason why installation 
tends to fail alot is the lack of drivers.

There are a bunch of things you can try to make installation happen like 
setting nomodeset, acpi=off, and etc.

Alas, if your notebook has an intel CPU then I seriously believe it has Intel 
HD graphics not unless it's those old ones that don't really have it
It would be great if you have Intel HD graphics cause you can definitely push 
through installation with nomodeset to avoid utilizing your nvidia GPU

It's not ideal to use that GPU for Qubes anyway, specially when you're looking 
to make some gaming VM where you would passthrough your Nvidia GPU

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fabb631a-af20-4f3a-9a34-c47d0770eee7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Deleting debian-9 template and getting a new one returns an error: "Error: Unable to find a match"

2019-03-03 Thread Sphere
On Friday, March 1, 2019 at 8:38:07 PM UTC+8, unman wrote:
> On Thu, Feb 28, 2019 at 10:09:38PM -0500, Chris Laprise wrote:
> > On 2/28/19 8:30 PM, Sphere wrote:
> > > I was sure I double checked the line of code I used in dom0 terminal to 
> > > get a new template which was
> > > "sudo qubes-dom0-update qubes-template-debian-9"
> > > 
> > > Not sure why running this returns with the "Error: Unable to find a 
> > > match" while just changing 9 to 8 actually works
> > > 
> > > The same case happens when I try qubes-template-fedora-29, where my 
> > > fedora-29 template still exists
> > > 
> > > If this is because of some sort of name conflict issue, how could I 
> > > download the template/s and have them be named something else?
> > > 
> > 
> > The older release with the apt vulnerability may have been removed from the
> > repository, and the patched version may still be in testing?
> > 
> > Easiest way to resolve that is to add '--enablerepo=qubes*testing'.
> > 
> 
> I dont believe this is so.
> A fixed version (201901281256) is in qubes-templates-itl, and I
> *believe* that I grabbed it from there before.
> What you need to run is:
> sudo qubes-dom0-update --enablerepo=qubes-templates-itl  
> qubes-template-debian-9
> 
> @Sphere - do you have a debian-8 installed? If so it may be that yum
> remembers which repo it installed from, and so is able to grab the
> update. If this isnt the case (and the repo wasnt updated during the
> day) then I'm lost for an explanation.
> 
> Generally, if you want to do this manually, you can always grab from
> https://yum.qubes-os.org/r4.0/templates-itl/rpm.
> Download the package.
> Manully check the signature using "rpm -K" (You will need to get signing
> key and Qubes master)
> Transfer to dom0
> install using "rpm -i "
> 
> Much better to use the native tools, but that option is always
> available.
> 
> unman

@unman - Nope I don't have debian-8 installed and that I snagged a fresh copy 
of debian-9 last year.
What's noteworthy is that I can definitely trigger installation of debian-8 and 
other templates that I have never installed.
I can trigger qubes-dom0-update just fine tho and have the repositories update.
I'll try snagging the templates from the itl repo and see if that still 
triggers the problem, many thanks for lending me a hand
hope it solves this problem

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/91ba8f3c-d8f1-403f-abb0-041e4ac684a1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Deleting debian-9 template and getting a new one returns an error: "Error: Unable to find a match"

2019-02-28 Thread Sphere
I was sure I double checked the line of code I used in dom0 terminal to get a 
new template which was
"sudo qubes-dom0-update qubes-template-debian-9"

Not sure why running this returns with the "Error: Unable to find a match" 
while just changing 9 to 8 actually works

The same case happens when I try qubes-template-fedora-29, where my fedora-29 
template still exists

If this is because of some sort of name conflict issue, how could I download 
the template/s and have them be named something else?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7a356102-8f22-4e0b-8688-88e396805418%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Weird dnf update command behavior on fedora-29 template

2019-02-28 Thread Sphere
On Friday, March 1, 2019 at 3:54:12 AM UTC+8, awokd wrote:
> Sphere:
> > On Thursday, February 28, 2019 at 11:57:22 AM UTC+8, awokd wrote:
> >> Sphere:
> >>
> >>> Making it seem like my sys-net has been set as the updateVM for my 
> >>> fedora-29 template
> >>>
> >>> I haven't tried updating my other templates yet but performing a 
> >>> "qubes-dom0-update" works properly as intended and is using updateVM 
> >>> properly
> >>>
> >> Double check targets in /etc/qubes-rpc/policy/qubes.UpdatesProxy.
> > 
> > Thank you very much for that
> > I checked the file and I found:
> > 
> > # Default rule for all TemplateVMs - direct the connection to sys-net
> > $type:TemplateVM $default allow, target=sys-net
> > 
> > (facepalm)
> > Does this mean that the updateVM that I assigned was meaningless after all 
> > this time? OTL
> > 
> Not completely. The updateVM setting applies for dom0 updates but to 
> also have your templates update via your new template you want to also 
> change the target= line in there.

Ah that's a relief to hear
While I did understand what those pieces of code meant I at least wanted 
confirmation from someone else
Guess I'll go try to redownload my templates just to be sure

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/696cb816-415f-42c9-bf71-625e25f27d2a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Weird dnf update command behavior on fedora-29 template

2019-02-28 Thread Sphere
On Thursday, February 28, 2019 at 11:57:22 AM UTC+8, awokd wrote:
> Sphere:
> 
> > Making it seem like my sys-net has been set as the updateVM for my 
> > fedora-29 template
> > 
> > I haven't tried updating my other templates yet but performing a 
> > "qubes-dom0-update" works properly as intended and is using updateVM 
> > properly
> > 
> Double check targets in /etc/qubes-rpc/policy/qubes.UpdatesProxy.

Thank you very much for that
I checked the file and I found:

# Default rule for all TemplateVMs - direct the connection to sys-net
$type:TemplateVM $default allow, target=sys-net

(facepalm)
Does this mean that the updateVM that I assigned was meaningless after all this 
time? OTL

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/528d7e58-9612-4ca9-966e-c361f8717905%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Weird dnf update command behavior on fedora-29 template

2019-02-27 Thread Sphere
On Wednesday, February 27, 2019 at 8:30:53 PM UTC+8, unman wrote:
> On Tue, Feb 26, 2019 at 06:54:15PM -0800, Sphere wrote:
> > It started happening just today
> > Executing sudo dnf update command on my fedora-29 template forcefully makes 
> > my sys-net start
> > 
> > But thing is, I'm no longer using sys-net template as my net vm and this 
> > caused me to triple check my settings and my update VM is showed correctly 
> > as I had intended = a VM designed to securely process DNS queries that is 
> > attached to sys-firewall
> > 
> > Despite this, the behavior continues, even if I kill and/or halt my 
> > fedora-29 template and I have no clue as to why this happens it's like 
> > something is forcing it to use sys-net in an attempt to get through my 
> > secure processing of DNS queries
> > 
> > I also double checked that the template has no assigned net vm as intended 
> > according to how Qubes was designed and it's also set properly to 'none'
> > 
> > It's absolutely persistent to the point that I ended up deleting my sys-net 
> > template and now the sudo dnf update command abruptly ends with "Error: 
> > Failed to synchronize cache for repo 'fedora-modular'"
> > 
> > Can anyone help me with the logs to check/commands to use in diagnosing 
> > this problem properly?
> > 
> 
> This is expected. Not a problem.
> When you run dnf update , Qubes will start the update VM that you have
> set.
> As with any qube, if that has a netvm then it will start *that*, etc etc,
> right up to sys-net.
> If it didn't start a network connection, then you would get an update
> error (as indeed you have).

Sorry if I wasn't clear in some way that may have caused this confusion. I 
should've kept it short and simple:

"I'm no longer using sys-net template as my net vm"

my update VM has internet connection in it, I even did a ping to google

Structure is:
update VM -> Firewall VM -> Net VM(not sys-net)

Which means dnf update should work as expected

But instead what happens is

dnf update execution -> starting sys-net

Making it seem like my sys-net has been set as the updateVM for my fedora-29 
template

I haven't tried updating my other templates yet but performing a 
"qubes-dom0-update" works properly as intended and is using updateVM properly

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0630b69d-04ac-449d-b318-22517dc7edd2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Weird dnf update command behavior on fedora-29 template

2019-02-26 Thread Sphere
It started happening just today
Executing sudo dnf update command on my fedora-29 template forcefully makes my 
sys-net start

But thing is, I'm no longer using sys-net template as my net vm and this caused 
me to triple check my settings and my update VM is showed correctly as I had 
intended = a VM designed to securely process DNS queries that is attached to 
sys-firewall

Despite this, the behavior continues, even if I kill and/or halt my fedora-29 
template and I have no clue as to why this happens it's like something is 
forcing it to use sys-net in an attempt to get through my secure processing of 
DNS queries

I also double checked that the template has no assigned net vm as intended 
according to how Qubes was designed and it's also set properly to 'none'

It's absolutely persistent to the point that I ended up deleting my sys-net 
template and now the sudo dnf update command abruptly ends with "Error: Failed 
to synchronize cache for repo 'fedora-modular'"

Can anyone help me with the logs to check/commands to use in diagnosing this 
problem properly?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/12e13d20-2841-4576-8ddb-a2db1a941008%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: sudo qubes-dom0-update downloads packages but abruptly ends with a "The downloaded packages were..."

2019-02-18 Thread Sphere
On Monday, February 11, 2019 at 5:13:40 AM UTC+8, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Sun, Feb 10, 2019 at 07:33:21PM +0100, Dupéron Georges wrote:
> > I have the same issue. I thought there weren't any new updates, but it's
> > been like this for a while.
> > 
> > There are two updates listed, but they never get installed.
> > 
> > Note: I am not using the regular sys-net as my updatevm (I am using a plain
> > fedora 29 VM, that is connected to sys-firewall, which is connected to the
> > sys-ethernet VM to which the PCI device is attached).
> > 
> > Log:
> (...)
> > Reinstalling:
> 
> This looks like it tries to update to the same version it already have
> installed. Looks to be this issue:
> https://github.com/QubesOS/qubes-issues/issues/4792
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> 
> iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlxgk/0ACgkQ24/THMrX
> 1yzHkQgAkeyp0rkaSYX+ysS2sdgKk/TTt8fTJohevDpdwpJIQZ1ibMXRr+J2DEWL
> LuOi7JWFebK53xGD6eQvu8AaCuvSNpWWf9lrdm8taPi267t1Q03bO6tJyqfOzFcU
> H8vMuC0rdq8JH97oCUxl5lhjDNaLX2JJmjIX43td33DANxtdgkwgVg+gPThvxWZl
> 6CFNEtmH5rW+5n4ISyJZ9PC4k6zzjnmnyhaak4GLCeeJ5WYYU8E1xWD4JuB/ZKcT
> mCH/JFgD5Bc5MS8xHYylAhBOF+gNJPOyVnb6qrxaRxmp284l1UjqtzFaiZGAeNd9
> 9uciJE80mKP8uh9nm8SRFtN6WfjBOQ==
> =JLEm
> -END PGP SIGNATURE-

Thank you for this
So it seems there's a bunch of people having this problem too and now it is 
marked as critical

Oddly enough though it doesn't suffer from this problem when trying to install 
a new package. Tried installing Anti-evil maid and it gone through without 
problems on both Downloading and Installing

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ec28316-5d00-411b-968e-ee0adbab3775%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: sudo qubes-dom0-update downloads packages but abruptly ends with a "The downloaded packages were..."

2019-02-07 Thread Sphere
It's like this but without the errors:
https://pastebin.com/YVUFtid6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d40be472-5b1c-40a8-a82a-4cf24382e86a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] sudo qubes-dom0-update downloads packages but abruptly ends with a "The downloaded packages were..."

2019-02-07 Thread Sphere
I have no idea what's up with my dom0
It downloads the packages through sudo qubes-dom0-update but by Transaction 
Summary after showing Total Size and Installed Size it doesn't even ask me 
whether or not to continue the transaction but just says
"DNF will only download packages for the transaction."
Proceeds to download the packages then ends with a "Complete!"
"The downloaded packages were saved in cache until the next successful 
transaction."

Seems some setting about DNF got changed, how do I fix this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27341873-f8f4-49bb-9c15-5dd78fcbddef%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to do the extra configuration needed on a new template

2019-02-07 Thread Sphere
On Tuesday, February 5, 2019 at 8:35:28 AM UTC+8, unman wrote:
> On Sun, Feb 03, 2019 at 10:16:55PM -0800, Sphere wrote:
> > So I got a new Fedora-29 template but the problem is that after assigning 
> > it to sys-net/sys-firewall all it shows is something similar to what you 
> > when you start a generic PC after BIOS POST.
> > 
> > All that's in this link:
> > https://www.qubes-os.org/news/2019/01/07/fedora-29-template-available/
> > 
> > Is how to get the template but I don't think I found anywhere detailing 
> > what to do afterwards.
> > 
> 
> I'm not clear what you mean by this: "what you when you start a generic
> PC after BIOS POST".
> 
> Once you have installed the template (with dnf or qubes-dom0-update),
> then all you have to do is assign it to qubes as required. Those qubes
> will then start using the assigned template.
> You can confirm this by opening a terminal in sys-net and observing
> contents of /etc/fedora-release

My bad about that.
I meant to say was "what you see when you start a generic 
PC after BIOS POST"
Hmm I tried it again today by assigning it to a test vm and surprisingly it 
worked. Not sure if a reboot did it but I haven't really touched it since 
February 4.

In any case thank you for that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/09390c9c-e9a8-43bc-ac07-83890f15fbaf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes with newer hardware and error messages still safe enough?

2018-12-13 Thread Sphere
> It is not an option - it can't be disabled!
By Option I mean, an option whether or not to ride along with PSP despite the 
known horror it brings.
If only I could establish my own CPU production company I would definitely 
support libre hardware/libreboot/coreboot and such but sadly we are in a world 
with high demands to processing and stuff and due to how there is hardly any 
support for libre hardware, the processing needs are hardly filled out and even 
more so with limited budget.

I checked KGPE-D16 KCMA-D8 g505s coreboot and it seems good so long as you have 
enough budget. Say I would make a KVM server or ESXi server out of this for the 
purpose of gaming VMs running AAA games, which CPU and RAM models would you 
suggest?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e3150547-a9c8-4059-b29a-56e1b7fce537%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes with newer hardware and error messages still safe enough?

2018-12-12 Thread Sphere
On Thursday, December 13, 2018 at 9:59:27 AM UTC+8, tai...@gmx.com wrote:
> On 12/12/2018 03:56 PM wrote:
> > New to Qubes with basic Linux knowledge i installed successfully a desktop 
> > system with follwing configuration:
> > 
> > Qubes 4.0, CPU Ryzen 5 2400G, MB ASRock B450 Pro4, GPU Radeon R7 370, 32 GB 
> > RAM
> > 
> > I can update templates and install appvms without issues. Everything works.
> > 
> > My question is now: On Boot screen i get some error messages (see following 
> > screen). Possibly there is a lack of safety i can not estimate. Everything 
> > works but under the surface i did not know if it is as safe as it should 
> > be. Are there some basic tests which should be made? Or is it enough when 
> > the system works?
> > 
> 
> Well you are stuck with a system that has a very obvious frontdoor
> backdoor called AMD PSP platform "security" processor (as in security
> from you) that prevents you from doing as you please with the system
> firmware hence it is not really your computer.
> 
> If you want one that is owner controlled and has free (as in freedom)
> open source firmware I have written many walls of text on this subject
> so just use a non-google search engine to find my previous posts.
> 
> You also are using gmail which is really bad if you care about not being
> put of of work or murdered by a robot - your emails and re-captcha
> solves are fed in to a massive database that helps googles AI research
> including killer robots like project maven and also of course sold to
> advertisers and anyone else who can pay.
> 
> I do not load images from random people if you want help you have to
> send text only.

How about give us keywords to help us search this and have it at the first 
search result?

As for stefanne's inquiry, here are my thoughts:
It's usually normal to see error messages on start of a linux system cause 
consumer motherboards production processes still have no proper arrangement to 
fully support Linux operating systems much to our dismay.
To check the level of your safety, I recommend you produce one of these and see 
the results:
https://www.qubes-os.org/doc/hcl/#generating-and-submitting-new-reports

If it's a yes on HVM, IOMMU, and SLAT then that means your hardware works very 
well on Qubes. To further increase security, I recommend you to turn off SMT 
(Simultaneous Multi-threading) as recently there's been a high surge of 
vulnerabilities involving multi-threading/hyperthreading and will probably 
haunt us for years to come.

Additionally, if you have an entry of IOMMU=no
Go search around your BIOS setup for an option like AMD-Vi or IOMMU and set 
that to enabled.
Product another report to check and see if the entry changes to IOMMU=yes
IOMMU is essential because it protects you from alot of complex attacks like 
Direct Memory Access (DMA) attacks.

Lastly, check for updates everyday and never neglect them for maximum security!
After all this, you may want to configure a VPN.

As for the Platform Security Processor, well it's an option for people whether 
or not they would go with it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e6f243b3-d1db-4ed5-9e77-b8f7bf5ae37b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: About X.Org vulnerability and Qubes

2018-11-13 Thread Sphere
I apologize for the late reply everyone. Thank you for your all your thoughts 
about this matter. I had read the responses days ago but I ended up forgetting 
to respond and marking this as complete.

Your responses have added to my knowledge and ease with the Qubes OS. I am 
grateful for all this.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6120ac41-db62-4fb0-a61c-fb7145a35857%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Motherboard recommendations

2018-10-29 Thread Sphere
Please refer to the Hardware Compatibility List if you're in no situation to go 
blind or full YOLO on some hardware.

https://www.qubes-os.org/hcl/

Anything in the list that has all green(yes) on columns from HVM column to 
Kernel column should be good. Disregard "unknown" of TPM Column as it likely 
means the submitter of the HCL report file didn't bother checking the status of 
the TPM nor bothered configuring/trying to make it work.

Note that the TPM only matters with high regard if you want to make Anti-evil 
maid work. For more information check:
https://www.qubes-os.org/doc/anti-evil-maid/

Once you have picked a hardware candidate, be sure to thoroughly read the 
remarks as it is your key to getting things to work should some extra 
pre-configuration was needed for installation to finish properly.

Mind you that on my first time of getting Qubes to work properly, I had to do 
tons of research and understanding to finally get it going nicely. If you're 
really determined for this then it's time to steel that determination some more 
and it also depends on your luck.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e3c5751e-7b04-4f50-ba03-5c12ba899594%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] About X.Org vulnerability and Qubes

2018-10-29 Thread Sphere
https://threatpost.com/x-org-flaw-allows-privilege-escalation-in-linux-systems/138624/

It is said that leveraging the vulnerability is possible from a remote SSH 
session. Say an attacker was able to successfully gain a remote SSH session in 
an untrusted VM, do you think it would be possible to gain full control through 
qubes' implementation of X.org?

I checked around and if I understand it right, qubes utilizes X.org in order to 
integrate the display of PVH VM applications to what the user can/must see.

Because of this, what's in my mind right now is that it's possible to leverage 
this vulnerability to gain full control but since I don't have an idea of the 
codes or how exactly qubes' implementation of X.org works, I would like to 
kindly ask for your thoughts about this matter.

Earlier I was about to remove setuid of Xorg but I thought it has a good chance 
of breaking my desktop environment altogether and that would be alot of trouble 
for me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/848dfc38-040c-422a-958a-c20b68db1b87%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: My farewell to Qubes OS!

2018-10-29 Thread Sphere
I've only been a minor part of the Qubes community and I am truly grateful that 
this kind of Operating System became a reality and am proud to say that I am 
using it as my daily driver. Thank you for all your contributions to the Qubes 
OS and I hope you well on your new journey :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/14ecb571-9e13-4f1c-ac9f-44a8b2a008c0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is Qubes vulnerable to CVE-2018-3620?

2018-08-15 Thread Sphere
On Wednesday, August 15, 2018 at 8:50:28 PM UTC+8, Rusty Bird wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Sphere:
> > https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/
> > 
> > There are other vulnerabilities disclosed along with this today and
> > if possible, I would like to confirm that as well.
> > 
> > On a side note, I have long disabled Hyperthreading on my machine.
> 
> To me as a layman, it looks like Qubes is indeed vulnerable to the
> XSA-273 data leak, and that fixing it involves
> 
> 1. disabling hyperthreading (by adding smt=off to the Xen command line)
> 2. AND upgrading Intel microcode to 20180807
> 3. AND upgrading Xen
> 
> There's a pull request* for the new microcode package. As for Xen, the
> XSA says they're "not supplying separate patches because the changes
> have many complicated prerequisites", and their d95b5bb commit on the
> staging-4.8 branch is 42 patches ahead of RELEASE-4.8.4... :\
> 
> Rusty
> 
> 
> * https://github.com/QubesOS/qubes-intel-microcode/pull/2
> -BEGIN PGP SIGNATURE-
> 
> iQJ8BAEBCgBmBQJbdB8sXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
> ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0
> NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrf+A4P/jJopc94LC67vWz+PmkLOmB5
> DaxS/VmFB70CNzfDmQMJ58YLOJ7z2wu9GEOOnHgP+KmAKsn9/xtp5nufrMfNoOd+
> a7dezBA0b2vHy7aVaAXG3qhRL9PhHqpFhcUrudShATrUWdY2aFnaeRGSZDbwoR40
> jGEgjxFFM2SGEtTHOEuKBBfLU/OJMw72ClmIAIdtvfEPABQ0WYw95OmcVTzi+tvZ
> 2bEwXJz1cXUovGzDPInbBBZm43m3X/r9FAnsFdLQXyjgRNkFc2LuhVz5Tc12NGjH
> 6Xb2qJlIhQVZjotRPqm506G6UrKrx5DB0lANY2/H8tl/tPACyoTY+EHrOJHIz/21
> XipPbVVLqQJtQJOgQXCkHEPz49X1Deni/TFedrQxzEuTiOH5R/KVjqEe17cwyaL4
> f6HHf94OiFHGKVmGtwySwMxxWiH9T0UOu3+Xzo3UNE9IPkLoakcXMTvaLFJS9Hfa
> AFZil3+aKMogWWRS0mJJc0UX+m9jpPdwERdXAriqAY4mp59TJ3qt5OFEobSlG4kD
> aRIfBiQbMRZagfwtsHLTxwEymwMyaovm/q7hv6cZvNYm2S7cztMdFXeUquYlZgJi
> ZzCr+AirENSDSBq+hCosnGdvwAAemiUBpRh3kXHMuOTtR1Lu3ulnatN64SCznzPR
> M8ZJnNdpOLX4RqU/yTr/
> =E4BM
> -END PGP SIGNATURE-

I have hyperthreading disabled on my BIOS, do I still have to add that option 
to Xen command line?
By pull request you mean, it's still being grabbed for use and installation 
using qubes-dom0-update right?
As for Xen updates, welp we have no choice but to wait for that I suppose.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5d320435-9846-4dc7-90b5-edb2740bb0de%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] X470 and IOMMU Groups...

2018-08-15 Thread Sphere
Surely you have checked that your boot sequence really starts at the HDD where 
you installed qubes right? I got a case where my bios completely could not 
recognize the drive where I installed my Qubes as bootable and had to do sum 
stuff in the Boot sector to make it work. The same may apply to you so yeah.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e87ae91-5829-41c6-9a9e-22c8f2be5226%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Qubes vulnerable to CVE-2018-3620?

2018-08-14 Thread Sphere
CVE-2018-3646 in particular is alarming:
"The third flaw, CVE-2018-3646, has a CVSS Base Score of 7.1 and enables bad 
actors to attack virtual machines (VM), via virtualization software and Virtual 
Machine Monitors (VMMs) running on Intel processors. A malicious guest VM could 
infer the values of data in the VMM’s memory."

Could potentially allow Untrusted VMs to attack safe VMs but I don't know for 
sure whether or not Qubes mitigates this.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b8c08313-4662-4c9e-a182-5dc83f48f4d5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Qubes vulnerable to CVE-2018-3620?

2018-08-14 Thread Sphere
On Wednesday, August 15, 2018 at 10:33:09 AM UTC+8, Sphere wrote:
> https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/
> 
> There are other vulnerabilities disclosed along with this today and if 
> possible, I would like to confirm that as well.
> 
> On a side note, I have long disabled Hyperthreading on my machine.

For reference to this vulnerability as well as 2 more:
https://threatpost.com/intel-cpus-afflicted-with-fresh-speculative-execution-flaws/135096/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4dcd121e-1b7e-48ff-bf4a-92888140afd7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Is Qubes vulnerable to CVE-2018-3620?

2018-08-14 Thread Sphere
https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/

There are other vulnerabilities disclosed along with this today and if 
possible, I would like to confirm that as well.

On a side note, I have long disabled Hyperthreading on my machine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/12d30846-c21f-4eac-9d79-38d90adaab0b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Android-x86 on Qubes 4

2018-08-13 Thread Sphere
On Wednesday, August 8, 2018 at 9:37:53 PM UTC+8, rex mat wrote:
> After the manual install, I can boot, but ethernet can only be configured 
> from the terminal. That is still work in progress.
> You need to have an android-x86 build and check out the 7.1.2 version to 
> build a cd. I found the instruction on the web on the android-x86.org web 
> page. I recommend using the ubuntu 16.4 version mentioned as the preferred 
> build machine in a hope you avoid the pain I went through to do a build on 
> qubes. 
> 
> 
> 
> I did the following 2 changes:
> 
> 
> 
> 1. Changed 1 line in "init" inside initrd
> from:
> 
>     for device in ${ROOT:-/dev/[hmnsv][dmrv][0-9a-z]*}; do
> to:
> 
>     for device in ${ROOT:-/dev/[hmnsvx][dmrv][0-9a-z]*}; do
> That allows the XEN hard drive to be used at initialization
> 
> 
> 
> 2. I configured the kernel
> Below is the config (I hope, as I played afterwards to get a proper mouse, 
> with no avail). This config disabled a lot of things that need blobs and the 
> like to get it built:
> 
> #
> # Automatically generated file; DO NOT EDIT.
> # Linux/x86_64 4.9.109 Kernel Configuration
> #
> CONFIG_64BIT=y
> CONFIG_X86_64=y
> CONFIG_X86=y
> CONFIG_INSTRUCTION_DECODER=y
> CONFIG_OUTPUT_FORMAT="elf64-x86-64"
> CONFIG_ARCH_DEFCONFIG="arch/x86/configs/x86_64_defconfig"
> CONFIG_LOCKDEP_SUPPORT=y
> CONFIG_STACKTRACE_SUPPORT=y
> CONFIG_MMU=y
> CONFIG_ARCH_MMAP_RND_BITS_MIN=28
> CONFIG_ARCH_MMAP_RND_BITS_MAX=32
> CONFIG_ARCH_MMAP_RND_COMPAT_BITS_MIN=8
> CONFIG_ARCH_MMAP_RND_COMPAT_BITS_MAX=16
> CONFIG_NEED_DMA_MAP_STATE=y
> CONFIG_NEED_SG_DMA_LENGTH=y
> CONFIG_GENERIC_ISA_DMA=y
> CONFIG_GENERIC_BUG=y
> CONFIG_GENERIC_BUG_RELATIVE_POINTERS=y
> CONFIG_GENERIC_HWEIGHT=y
> CONFIG_ARCH_MAY_HAVE_PC_FDC=y
> CONFIG_RWSEM_XCHGADD_ALGORITHM=y
> CONFIG_GENERIC_CALIBRATE_DELAY=y
> CONFIG_ARCH_HAS_CPU_RELAX=y
> CONFIG_ARCH_HAS_CACHE_LINE_SIZE=y
> CONFIG_HAVE_SETUP_PER_CPU_AREA=y
> CONFIG_NEED_PER_CPU_EMBED_FIRST_CHUNK=y
> CONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK=y
> CONFIG_ARCH_HIBERNATION_POSSIBLE=y
> CONFIG_ARCH_SUSPEND_POSSIBLE=y
> CONFIG_ARCH_WANT_HUGE_PMD_SHARE=y
> CONFIG_ARCH_WANT_GENERAL_HUGETLB=y
> CONFIG_ZONE_DMA32=y
> CONFIG_AUDIT_ARCH=y
> CONFIG_ARCH_SUPPORTS_OPTIMIZED_INLINING=y
> CONFIG_ARCH_SUPPORTS_DEBUG_PAGEALLOC=y
> CONFIG_X86_64_SMP=y
> CONFIG_ARCH_SUPPORTS_UPROBES=y
> CONFIG_FIX_EARLYCON_MEM=y
> CONFIG_DEBUG_RODATA=y
> CONFIG_PGTABLE_LEVELS=4
> CONFIG_DEFCONFIG_LIST="/lib/modules/$UNAME_RELEASE/.config"
> CONFIG_IRQ_WORK=y
> CONFIG_BUILDTIME_EXTABLE_SORT=y
> CONFIG_THREAD_INFO_IN_TASK=y
> 
> #
> # General setup
> #
> CONFIG_INIT_ENV_ARG_LIMIT=32
> CONFIG_CROSS_COMPILE=""
> # CONFIG_COMPILE_TEST is not set
> CONFIG_LOCALVERSION="-android-x86_64"
> CONFIG_LOCALVERSION_AUTO=y
> CONFIG_HAVE_KERNEL_GZIP=y
> CONFIG_HAVE_KERNEL_BZIP2=y
> CONFIG_HAVE_KERNEL_LZMA=y
> CONFIG_HAVE_KERNEL_XZ=y
> CONFIG_HAVE_KERNEL_LZO=y
> CONFIG_HAVE_KERNEL_LZ4=y
> CONFIG_KERNEL_GZIP=y
> # CONFIG_KERNEL_BZIP2 is not set
> # CONFIG_KERNEL_LZMA is not set
> # CONFIG_KERNEL_XZ is not set
> # CONFIG_KERNEL_LZO is not set
> # CONFIG_KERNEL_LZ4 is not set
> CONFIG_DEFAULT_HOSTNAME="android_x86_64"
> CONFIG_SWAP=y
> # CONFIG_SYSVIPC is not set
> # CONFIG_POSIX_MQUEUE is not set
> CONFIG_CROSS_MEMORY_ATTACH=y
> # CONFIG_FHANDLE is not set
> # CONFIG_USELIB is not set
> CONFIG_AUDIT=y
> CONFIG_HAVE_ARCH_AUDITSYSCALL=y
> CONFIG_AUDITSYSCALL=y
> CONFIG_AUDIT_WATCH=y
> CONFIG_AUDIT_TREE=y
> 
> #
> # IRQ subsystem
> #
> CONFIG_GENERIC_IRQ_PROBE=y
> CONFIG_GENERIC_IRQ_SHOW=y
> CONFIG_GENERIC_PENDING_IRQ=y
> CONFIG_GENERIC_IRQ_CHIP=y
> CONFIG_IRQ_DOMAIN=y
> CONFIG_IRQ_DOMAIN_HIERARCHY=y
> CONFIG_GENERIC_MSI_IRQ=y
> CONFIG_GENERIC_MSI_IRQ_DOMAIN=y
> # CONFIG_IRQ_DOMAIN_DEBUG is not set
> CONFIG_IRQ_FORCED_THREADING=y
> CONFIG_SPARSE_IRQ=y
> CONFIG_CLOCKSOURCE_WATCHDOG=y
> CONFIG_ARCH_CLOCKSOURCE_DATA=y
> CONFIG_CLOCKSOURCE_VALIDATE_LAST_CYCLE=y
> CONFIG_GENERIC_TIME_VSYSCALL=y
> CONFIG_GENERIC_CLOCKEVENTS=y
> CONFIG_GENERIC_CLOCKEVENTS_BROADCAST=y
> CONFIG_GENERIC_CLOCKEVENTS_MIN_ADJUST=y
> CONFIG_GENERIC_CMOS_UPDATE=y
> 
> #
> # Timers subsystem
> #
> CONFIG_TICK_ONESHOT=y
> CONFIG_NO_HZ_COMMON=y
> # CONFIG_HZ_PERIODIC is not set
> CONFIG_NO_HZ_IDLE=y
> # CONFIG_NO_HZ_FULL is not set
> CONFIG_NO_HZ=y
> CONFIG_HIGH_RES_TIMERS=y
> 
> #
> # CPU/Task time and stats accounting
> #
> CONFIG_TICK_CPU_ACCOUNTING=y
> # CONFIG_VIRT_CPU_ACCOUNTING_GEN is not set
> # CONFIG_IRQ_TIME_ACCOUNTING is not set
> # CONFIG_SCHED_WALT is not set
> CONFIG_BSD_PROCESS_ACCT=y
> # CONFIG_BSD_PROCESS_ACCT_V3 is not set
> CONFIG_TASKSTATS=y
> CONFIG_TASK_DELAY_ACCT=y
> CONFIG_TASK_XACCT=y
> CONFIG_TASK_IO_ACCOUNTING=y
> 
> #
> # RCU Subsystem
> #
> CONFIG_PREEMPT_RCU=y
> # CONFIG_RCU_EXPERT is not set
> CONFIG_SRCU=y
> # CONFIG_TASKS_RCU is not set
> CONFIG_RCU_STALL_COMMON=y
> # CONFIG_TREE_RCU_TRACE is not set
> # CONFIG_RCU_EXPEDITE_BOOT is not set
> CONFIG_BUILD_BIN2C=y
> CONFIG_IKCONFIG=y
> CONFIG_IKCONFIG_PROC=y
> CONFIG_LOG_BUF_SHIFT=17
> 

[qubes-users] Re: X470 and IOMMU Groups...

2018-08-13 Thread Sphere
On Thursday, August 9, 2018 at 1:30:49 AM UTC+8, 3mp...@gmail.com wrote:
> Hi everyone,
> 
> actually I'm a happy Qubes 3.2 user on Intel platform for more than a year 
> now !
> 
> I'm looking to upgrade my actual Skylake build with an AMD one with the new 
> Ryzen Pinnacle Ridge CPU (R7 2700) and installing Qubes 4.0 on the same 
> occasion. The Asrock X470 Taichi seems a really nice motherboard for it.
> 
> I've found the IOMMU Groups of this motherboard on reddit : 
> https://www.reddit.com/r/VFIO/comments/8i8yqq/iommu_groups_for_asrock_taichi_x470/
> 
> and it seems there's a big group 13 with LAN, USB and SATA controllers. I 
> wonder if the netVM and USB VM will actually be able to passthrough these 
> controllers if they are in the same IOMMU Group ?
> 
> Any Ryzen / Qubes users can confirm this works OK or this is a no go ?
> 
> Thanks for your help !

I've observed that Qubes installation rarely ever succeeds on X370 motherboards 
so I believe the same case applies to X470 motherboards with a higher chance of 
failure since it is newer. The reason for this I believe is because these 
high-end gaming motherboards have alot of functionalities/bugs that 
break/interfere with Qubes installation which is an awful letdown.

So while that mobo having separate IOMMU groups being a plus, it doesn't matter 
much when you're still in the installation phase of Qubes (Which is the real 
hard phase to overcome when it comes to Qubes).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e610861-0b9c-4a49-a65e-25d1592a9388%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: X470 and IOMMU Groups...

2018-08-13 Thread Sphere
On Thursday, August 9, 2018 at 1:30:49 AM UTC+8, 3mp...@gmail.com wrote:
> Hi everyone,
> 
> actually I'm a happy Qubes 3.2 user on Intel platform for more than a year 
> now !
> 
> I'm looking to upgrade my actual Skylake build with an AMD one with the new 
> Ryzen Pinnacle Ridge CPU (R7 2700) and installing Qubes 4.0 on the same 
> occasion. The Asrock X470 Taichi seems a really nice motherboard for it.
> 
> I've found the IOMMU Groups of this motherboard on reddit : 
> https://www.reddit.com/r/VFIO/comments/8i8yqq/iommu_groups_for_asrock_taichi_x470/
> 
> and it seems there's a big group 13 with LAN, USB and SATA controllers. I 
> wonder if the netVM and USB VM will actually be able to passthrough these 
> controllers if they are in the same IOMMU Group ?
> 
> Any Ryzen / Qubes users can confirm this works OK or this is a no go ?
> 
> Thanks for your help !

On a side note, I wanna ask
Do you play games/tried playing games on that Qubes 3.2 installation of yours 
by any chance?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/23f00eb8-8f36-49c4-be7c-fa84c27677de%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS dual boot question

2018-08-13 Thread Sphere
On Tuesday, August 14, 2018 at 4:17:31 AM UTC+8, Patrick Bouldin wrote:
> I have a goal to buy a new laptop, preconfigured with Windows, and then 
> within Windows I will reallocate disk space in order to install Qubes4.0.
> 
> In the past with prior versions of Qubes that has sometimes been problematic, 
> is that fixed with 4.0 or still a problem?
> 
> Any input on how to proceed?
> 
> One data point, while I can recreate windows it's a pain in the butt to get 
> the licensing back on the machine. I can do it, but would like to avoid it.
> 
> Thanks,
> Patrick

Question: What's your purpose for using Qubes? Usually the answer is to have 
very-high level of security. This purpose however, is ultimately defeated once 
you do OS dual boot as your Qubes installation could be easily 
infiltrated/modified in the context of the Windows OS that you have dual-booted.

So I suggest having two HDDs or one HDD and one M.2/SATA PCI SSD in your laptop 
to effectively separate the Windows OS and Qubes OS(By setting a password on 
the HDD/SSD where Qubes is installed and not entering it when booting on the 
Windows OS (To effectively protect the UEFI boot partition and also a tag-team 
protection with LUKS encryption).

If you really want to insist on dual boot however, sad to say but I can't help 
you with that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37b79503-dc99-40e1-ba10-178ce5f2f221%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Incredible HD thrashing on 4.0

2018-08-13 Thread Sphere
On Saturday, August 11, 2018 at 3:02:31 AM UTC+8, Kelly Dean wrote:
> Has anybody else used both Qubes 3.2 and 4.0 on a system with a HD, not SSD? 
> Have you noticed the disk thrashing to be far worse under 4.0? I suspect it 
> might have something to do with the new use of LVM combining snapshots with 
> thin provisioning.
> 
> The problem seems to be triggered by individual qubes doing ordinary bursts 
> of disk access, such as loading a program or accessing swap, which would 
> normally take just a few seconds on Qubes 3.2, but dom0 then massively 
> multiplies that I/O on Qubes 4.0, leading to disk thrashing that drags on for 
> minutes at a time, and in some cases, more than an hour.
> 
> iotop in dom0 says the thrashing procs are e.g. [21.xvda-0] and [21.xvda-1], 
> reading the disk at rates ranging from 10 to 50 MBps (max throughput of the 
> disk is about 100). At this rate, for how prolonged the thrashing is, it 
> could have read and re-read the entire virtual disk multiple times over, so 
> there's something extremely inefficient going on.
> 
> Is there any solution other than installing a SSD? I'd prefer not to have to 
> add hardware to solve a software performance regression.

Same here for me, I hear lots of scratching sounds from the HDD whenever I do 
something in the laptop. Extremely worries me that the HDD might die soon 
because of it D:

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/182578a5-3cad-4dbe-9cdc-94a78cc58930%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New CPU Bug Found

2018-08-13 Thread Sphere
On Tuesday, August 14, 2018 at 7:44:18 AM UTC+8, jonbrown...@gmail.com wrote:
> New CPU backdoor has been found with code available here: 
> https://github.com/xoreaxeaxeax/rosenbridge
> 
> Anyone mind checking if Thinkpad 230 is affected?

Wow... things sure are going rough in the firmware/hardware/low-level 
instruction side of things

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a3aa75a-7ce6-4075-a7e1-a96852c5c161%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Manually remove R4.0 template vms

2018-08-13 Thread Sphere
On Tuesday, July 17, 2018 at 2:37:05 AM UTC+8, Will Dizon wrote:
> qvm-prefs fedora-281 installed_by_rpm false
> 
> This worked perfectly.  Was even able to remove it from the existing qube 
> manager instance without reinstallation.  Thanks so much!

Thank you very much for this!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/14243512-8e76-4fc8-a28e-0ef562adf686%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to change TemplateVM update method from Whonix to just another appvm?

2018-08-13 Thread Sphere
On Wednesday, August 8, 2018 at 1:17:23 AM UTC+8, Patrick Schleizer wrote:
> Sphere:
> > So upon installation of Qubes I have set updating of TemplateVMs through 
> > Whonix but now I'm actually stuck with it and I want to change it to 
> > updating through just another AppVM.
> > 
> > Could anyone guide me to what commands I need to use in order to fix this? 
> > (I actually wish this was an option in Qubes settings UI as well)
> > 
> 
> Qubes R4?
> 
> modify:
> 
> /etc/qubes-rpc/policy/qubes.UpdatesProxy

Thank you

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/67e35a4d-c072-4006-b70f-806dcdcd4800%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can't find a guide to setup a new fedora-28 template

2018-08-13 Thread Sphere
Sorry for the late reply
I installed a fresh template and what happens when I assign it to Service VMs 
is that some terminal opens that's similar to what I see whenever I make a new 
Standalone VM that requires a CD-ROM/ISO to install an OS.

I recently have done upgrading fedora-26 to 27 and it works like a charm. Just 
gonna upgrade it to 28 I suppose though I do still want to know a way to make 
the fedora-28 template I installed work as it's much faster to jump to 28 than 
having to go through 27 which takes almost a whole day.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b50b0c65-0980-423f-99e5-74573b68adb5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Can't find a guide to setup a new fedora-28 template

2018-08-07 Thread Sphere
So I just installed a new fedora-28 template in hopes of using it as the 
template for my sys-net and sys-firewall VMs but apparently seems there's still 
alot of manual configuration to do in the template before it becomes ready for 
that.

Could anyone provide me with a guide to do this?

Thanks in advance

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/be60f7f3-eb1a-42ab-9e3b-03f96556dceb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: NSA’s Encryption Algorithm in Linux Kernel is Creating Unease in the Community

2018-08-06 Thread Sphere
On Saturday, August 4, 2018 at 3:01:09 PM UTC-4, John wrote:
> Just reading this. It appears Speck is a module and can be excluded, so 
> hopefully nothing to worry about.
> 
> https://itsfoss.com/nsas-encryption-algorithm-in-linux-kernel-is-creating-unease-in-the-community/

what a pain in the arse, trying to push as standard of IoT? These guys are 
really just plain mad. Defending the country - done the  wrong way

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7b7a3afe-f779-49fe-ae2b-de8400a98205%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to change TemplateVM update method from Whonix to just another appvm?

2018-08-06 Thread Sphere
So upon installation of Qubes I have set updating of TemplateVMs through Whonix 
but now I'm actually stuck with it and I want to change it to updating through 
just another AppVM.

Could anyone guide me to what commands I need to use in order to fix this? (I 
actually wish this was an option in Qubes settings UI as well)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/312c04a9-7690-4fbe-a2ca-3364917e5db4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.