Re: [qubes-users] Re: disp-vm whonix torbrowser open tabs file?

2020-05-06 Thread list . wget


On Monday, May 4, 2020 at 11:32:43 AM UTC, unman wrote:
>
> On Sun, May 03, 2020 at 11:35:21PM -0700, list...@gmail.com  
> wrote: 
> > Actually, I guess it would be fine if there would be a procedure with 
> which 
> > I can close down the disposable browser without the disp-vm 
> automatically 
> > closing. 
> > Then there will, probably, be a session.json file made which I then can 
> > copy to another VM. 
> > 
> > 
> > 
> > 
> > On Monday, May 4, 2020 at 2:30:31 AM UTC, list...@gmail.com wrote: 
> > > 
> > > Hello qubes users, 
> > > 
> > > I have a whonix disposable tor browser whonix vm running with a load 
> of 
> > > tabs open, maybe 30 but I can't check the precise amount because the 
> tabs 
> > > don't scroll anymore. 
> > > The browser hangs. 
> > > As soon as I close the browser my tabs will be gone and I don't like 
> to 
> > > lose them. 
> > > I think there must be a session.json file but that seems to be created 
> > > only when the browser closes, and this will close the VM 
> automatically, so 
> > > even if a restore file with tabs in it is created, it will be gone 
> upon 
> > > closure of the browser. 
> > > I can access the file system from within dom0 and could copy any file 
> that 
> > > I need. 
> > > 
> > > Is there any place where whonix tor browser stores its *currently 
> open* 
> > > *tabs*? 
> > > 
> > > Thanks ahead. 
> > > 
>
> The convention here is not to top-post. 
> Please scroll to the bottom of the message before you start typing. Or 
> reply inline. 
> It only takes you seconds, makes it much easier to follow threads, and 
> cumulatively saves your fellow users hours. 
> Thanks. 
>
> In FF, I think that the data is in sessionstore-backups. Have a look 
> there. 
> You may do better asking on the Whonix lists, as I believe they 
> customize the TBB somewhat. 
>
> unman 
>

I have looked in 
~/.tb/tor-browser/Browser/TorBrowser/data/Browser/profile.default/ 
but there is no session-store, there is however a places.sqlite[-shm|-wal] 
could that be something? Then there is sessionCheckpoints.json...
$ qvm-run -p disp2622 'find /home/user/ -iname session-store*' 
also doesn't return anything so there probably won't be any.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/332958a6-ec50-47bf-898e-e35f42e1253b%40googlegroups.com.


Re: [qubes-users] Re: disp-vm whonix torbrowser open tabs file?

2020-05-06 Thread list . wget


On Monday, May 4, 2020 at 11:15:04 AM UTC, Mike Keehan wrote:
>
> On 5/4/20 7:35 AM, list...@gmail.com  wrote: 
> > Actually, I guess it would be fine if there would be a procedure with 
> which 
> > I can close down the disposable browser without the disp-vm 
> automatically 
> > closing. 
> > Then there will, probably, be a session.json file made which I then can 
> > copy to another VM. 
> > 
> > 
> > 
> > 
> > On Monday, May 4, 2020 at 2:30:31 AM UTC, list...@gmail.com wrote: 
> >> 
> >> Hello qubes users, 
> >> 
> >> I have a whonix disposable tor browser whonix vm running with a load of 
> >> tabs open, maybe 30 but I can't check the precise amount because the 
> tabs 
> >> don't scroll anymore. 
> >> The browser hangs. 
> >> As soon as I close the browser my tabs will be gone and I don't like to 
> >> lose them. 
> >> I think there must be a session.json file but that seems to be created 
> >> only when the browser closes, and this will close the VM automatically, 
> so 
> >> even if a restore file with tabs in it is created, it will be gone upon 
> >> closure of the browser. 
> >> I can access the file system from within dom0 and could copy any file 
> that 
> >> I need. 
> >> 
> >> Is there any place where whonix tor browser stores its *currently open* 
> >> *tabs*? 
> >> 
> >> Thanks ahead. 
> >> 
> > 
>
> Start a terminal in a dispVM, then use the command line to start the 
> browser.  You can stop and start the browser whenever you want. 
>
> The dispVM will stay running until you close the terminal. 
>
> Mike. 
>

Maybe a silly question, how do I start a terminal in the VM from within 
dom0?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/45f1b0e8-03f8-4f51-9023-2157479287c6%40googlegroups.com.


Re: [EXT] Re: [qubes-users] Re: disp-vm whonix torbrowser open tabs file?

2020-05-06 Thread list . wget


On Monday, May 4, 2020 at 7:57:14 PM UTC, Ulrich Windl wrote:
>
> >>> Catacombs > schrieb am 04.05.2020 um 
> 14:18 in Nachricht 
> <24740_1588594718_5EB0081D_24740_209_1_e4ab08ee-0ed4-4089-9427-86850a35c9ea@goog
>  
>
> egroups.com>: 
>
> > ”l have a whonix disposable tor browser whonix vm running with a load of 
> > tabs open, maybe 30 but I can't check the precise amount because the 
> tabs 
> > don't scroll anymore. “ 
> > 
> > 
> > Consider creating a clone of Whonix Template QUBE,  make all your Tabs 
> > Favorites.  Used to be an option in Firefox to open all favorites.  Or 
> there 
>
> > is an option of what to start when starting Firefox.   
> > Save this template clone for the specific use of having this group of 
> Tabs a 
>
> > a available all at once. 
> > 
> > ”The browser hangs.” Perhaps increase the memory allocation for the QUBE 
> > that has all the Tabs 
> > 
> > “As soon as I close the browser my tabs will be gone and I don't like to 
> > lose them. 
> > I think there must be a session.json file but that seems to be created 
> only 
>
> > when the browser closes, and this will close the VM automatically, so 
> even 
> if 
> > a restore file with tabs in it is created, it will be gone upon closure 
> of 
> > the browser. 
> > I can access the file system from within dom0 and could copy any file 
> that I 
>
> > need. 
> > 
> > Is there any place where whonix tor browser stores its currently open 
> tabs? 
>
>
> I think (at least for Firefox) there must be a place where open tabs are 
> stored, because when the machine crashes, Firefox can recover the last 
> session 
> automatically. The other idea I had is the history: Shouldn't all tabs be 
> present in the history, too? OK, if the browser is hanging, it might not 
> help. 
> Did you try to open a terminal for the same DVM (via cubes manager on the 
> VM)? 
> If so, you could try to find out what's going on with the browser (like: 
> "free", "top", etc.). My guess is lack of memory. 
>
> > 
> > Thanks ahead. 
> > 
> > -- 
> > You received this message because you are subscribed to the Google 
> Groups 
> > "qubes-users" group. 
> > To unsubscribe from this group and stop receiving emails from it, send 
> an 
> > email to qubes...@googlegroups.com . 
> > To view this discussion on the web visit 
> > 
>
> https://groups.google.com/d/msgid/qubes-users/e4ab08ee-0ed4-4089-9427-86850a3 
>
> > 5c9ea%40googlegroups.com. 
>

$ qvm-run -p disp2622 'free' 
gives me  at least twice as much memory available as there is in use, so 
that must not be the problem.

$ qvm-run -p disp2622 'top' 
gives: 
TERM environment variable not set.

How do I 'open' a terminal in the disp VM?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8a7109ca-f01c-47cd-82bc-1d775f3ea77a%40googlegroups.com.


Re: [qubes-users] Re: disp-vm whonix torbrowser open tabs file?

2020-05-06 Thread list . wget


On Monday, May 4, 2020 at 12:18:35 PM UTC, Catacombs wrote:
>
>
> ”l have a whonix disposable tor browser whonix vm running with a load of 
> tabs open, maybe 30 but I can't check the precise amount because the tabs 
> don't scroll anymore. “ 
>
>
> Consider creating a clone of Whonix Template QUBE,  make all your Tabs 
> Favorites.  Used to be an option in Firefox to open all favorites.  Or 
> there is an option of what to start when starting Firefox.   
> Save this template clone for the specific use of having this group of Tabs 
> a a available all at once. 
>
> ”The browser hangs.” Perhaps increase the memory allocation for the QUBE 
> that has all the Tabs 
>
> “As soon as I close the browser my tabs will be gone and I don't like to 
> lose them. 
> I think there must be a session.json file but that seems to be created 
> only when the browser closes, and this will close the VM automatically, so 
> even if a restore file with tabs in it is created, it will be gone upon 
> closure of the browser. 
> I can access the file system from within dom0 and could copy any file that 
> I need. 
>
> Is there any place where whonix tor browser stores its currently open 
> tabs? 
>
> Thanks ahead.


I don't use these tabs frequently but would like to keep them in a folder 
in the bookmarks.
I can not do anything with the browser, the tabs lighten up when I hover 
over them, also the menu, but clicking the mouse doesn't do anything, so 
selecting tabs and make them favorites won't work. 
I also increased the Max Memory from 4 to 5 GB but that didn't work either. 
I was surprised I could do that dynamically by the way.
Anyway, thanks for your advise.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7543c20a-272d-4a09-9406-fb1b2058f6b7%40googlegroups.com.


Re: [qubes-users] Re: disp-vm whonix torbrowser open tabs file?

2020-05-06 Thread list . wget


On Monday, May 4, 2020 at 11:32:43 AM UTC, unman wrote:
>
> On Sun, May 03, 2020 at 11:35:21PM -0700, list...@gmail.com  
> wrote: 
> > Actually, I guess it would be fine if there would be a procedure with 
> which 
> > I can close down the disposable browser without the disp-vm 
> automatically 
> > closing. 
> > Then there will, probably, be a session.json file made which I then can 
> > copy to another VM. 
> > 
> > 
> > 
> > 
> > On Monday, May 4, 2020 at 2:30:31 AM UTC, list...@gmail.com wrote: 
> > > 
> > > Hello qubes users, 
> > > 
> > > I have a whonix disposable tor browser whonix vm running with a load 
> of 
> > > tabs open, maybe 30 but I can't check the precise amount because the 
> tabs 
> > > don't scroll anymore. 
> > > The browser hangs. 
> > > As soon as I close the browser my tabs will be gone and I don't like 
> to 
> > > lose them. 
> > > I think there must be a session.json file but that seems to be created 
> > > only when the browser closes, and this will close the VM 
> automatically, so 
> > > even if a restore file with tabs in it is created, it will be gone 
> upon 
> > > closure of the browser. 
> > > I can access the file system from within dom0 and could copy any file 
> that 
> > > I need. 
> > > 
> > > Is there any place where whonix tor browser stores its *currently 
> open* 
> > > *tabs*? 
> > > 
> > > Thanks ahead. 
> > > 
>
> The convention here is not to top-post. 
> Please scroll to the bottom of the message before you start typing. Or 
> reply inline. 
> It only takes you seconds, makes it much easier to follow threads, and 
> cumulatively saves your fellow users hours. 
> Thanks. 
>
> In FF, I think that the data is in sessionstore-backups. Have a look 
> there. 
> You may do better asking on the Whonix lists, as I believe they 
> customize the TBB somewhat. 
>
> unman 
>

Yes you are right, sorry, it's been a long time since I posted here, but, 
in my defense, by default the cursor is put at the top, not the bottom of 
the screen. :) 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39c037af-2a7e-4656-880d-df092f26f0aa%40googlegroups.com.


[qubes-users] Re: disp-vm whonix torbrowser open tabs file?

2020-05-04 Thread list . wget
Actually, I guess it would be fine if there would be a procedure with which 
I can close down the disposable browser without the disp-vm automatically 
closing.
Then there will, probably, be a session.json file made which I then can 
copy to another VM.




On Monday, May 4, 2020 at 2:30:31 AM UTC, list...@gmail.com wrote:
>
> Hello qubes users, 
>
> I have a whonix disposable tor browser whonix vm running with a load of 
> tabs open, maybe 30 but I can't check the precise amount because the tabs 
> don't scroll anymore. 
> The browser hangs.
> As soon as I close the browser my tabs will be gone and I don't like to 
> lose them. 
> I think there must be a session.json file but that seems to be created 
> only when the browser closes, and this will close the VM automatically, so 
> even if a restore file with tabs in it is created, it will be gone upon 
> closure of the browser.
> I can access the file system from within dom0 and could copy any file that 
> I need.
>
> Is there any place where whonix tor browser stores its *currently open* 
> *tabs*? 
>
> Thanks ahead.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed8fafac-e4f5-435d-ad45-54450c7b0b73%40googlegroups.com.


[qubes-users] Re: Shoshana Zuboff and Renata Ávila: “COVID-1984 – Surveillance Capitalism”

2020-05-03 Thread list . wget
Trust me on this if you have no time to research it for yourself. 

*If* you have *no* hyperinsulinemia--in other words, you're no type 1 or 2 
diabetic, *and* you're not pre-diabetic (that is fasting blood glucose 
5.5-6.9 mmol/l) *and* you're not pre-pre-diabetic (that is Kraft Insulin 
Assay Test: blood insulin above 700 pmol/l)--*and* you are sufficient in 
vitamin D3 (bloodlevel > 100 nmol/l) *then* you are at practically *zero 
risk* for contracting more than *mild* COVID-19 symptoms.

Just saying.



On Friday, April 17, 2020 at 7:18:09 PM UTC, Gianluca Miscione wrote:
>
> Perhaps of interest?
>
>
>
>
>
>
>
>
>
>
>
>
> *Gianluca MiscioneUniversity College Dublin 
>  WEBINAR:Saturday, 18 April 2020 @ 
> 20:00ORGANIZER: Democracy in Europe Movement 2025 
> LINK TO REGISTRATION 
>  THE EVENTSaturday 
> Night Special, April 18, 20:00 CETShoshana Zuboff and Renata Ávila: 
> “COVID-1984 – Surveillance Capitalism”Every evening switch on the 
> television from the future! We call it TV because we like retro-futurism. 
> But it's much more than TV. In times of global pandemics, DiEM25 is 
> launching a special online and completely free program to understand the 
> current crisis and offer tools and hope to get out of it stronger and more 
> united in building the World After Coronavirus.Everyone can join; you don't 
> have to be a DiEM25 member. Please register for the event in order to get a 
> link sent to your email. The registration form also allows you to ask a 
> question to the panelists, suggest next topics and next guests.THE 
> LOCATIONThis discussion will be livestreamed on the DiEM25 Youtube channel 
> . Please ask your 
> questions ahead of the event via the registration form. We will send a link 
> to the livestream to all Registered 
>  participants 
> approximately half an hour before the start. LINK TO REGISTRATION 
> : 
> https://internal.diem25.org/en/events/629 
>  [image: Facebook] 
> [image: Twitter] 
> [image: YouTube] 
> [image: Instagram] 
> [image: LinkedIn] 
> [image: Website] 
> Copenhagen Business 
> SchoolBIS DIGITAL TRANSFORMATIONS PLATFORMDalgas Have 152000 
> Frederiksberg  Share  
>   Tweet  
>   Share  
>   Forward  
> 
>  *
> ᐧ
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e45ae4e2-8d93-402f-b140-560018030b11%40googlegroups.com.


[qubes-users] disp-vm whonix torbrowser open tabs file?

2020-05-03 Thread list . wget
Hello qubes users, 

I have a whonix disposable tor browser whonix vm running with a load of 
tabs open, maybe 30 but I can't check the precise amount because the tabs 
don't scroll anymore. 
The browser hangs.
As soon as I close the browser my tabs will be gone and I don't like to 
lose them. 
I think there must be a session.json file but that seems to be created only 
when the browser closes, and this will close the VM automatically, so even 
if a restore file with tabs in it is created, it will be gone upon closure 
of the browser.
I can access the file system from within dom0 and could copy any file that 
I need.

Is there any place where whonix tor browser stores its *currently open* 
*tabs*? 

Thanks ahead.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a64110bb-917a-4ce6-82d4-9bde5d2170d5%40googlegroups.com.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-13 Thread list . wget
On Friday, 12 July 2019 12:15:07 UTC, steve.coleman  wrote:
> On 7/11/19 9:36 PM, list...@gmail.com wrote:
> > On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> >> On 7/10/19 2:02 AM,  wrote:
> >>> On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
>  On 7/9/19 7:25 AM,  wrote:
> > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org 
> > using
> >
> > $ sudo dnf install 
> > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> >
> > and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > running template I'm asked for a password when I try to sudo my way 
> > into apt-get update.
> >
> > Does anyone know the password for 'user'?
> >
> > Thanks.
> >
> 
>  If you can not sudo, you can always try running your command from Dom0
>  as user root:
> 
>  $ qvm-run -a --user root  "apt-get update"
> >>>
> >>> Thanks.
> >>> I not only want to update, I also want to run all other kinds of commands 
> >>> as sudo. Do you think I can run any command like this inside the qube 
> >>> from within dom0?
> >>
> >> You can also run any other command as root, like "passwd user" to set
> >> the password to a know value, or "gedit /etc/sudoers" and modify who can
> >> sudo, add yourself to the wheel group, etc... I can't say why your
> >> particular appvm prevents you from sudoing without testing the vm
> >> myself, but whatever the problem is, you now have a way to get a root
> >> shell to fix it.
> >>
> >> hope this helps
> > 
> > It did, thanks for your help.
> > The funny thing is,
> > 
> > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo 
> > user"
> > 
> > didn't work, even after
> > 
> > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> > 
> > although 'user' was added to the sudo group as could be seen from
> > 
> > user@stretch-minimal:~$  cat /etc/group | grep sudo
> > sudo:x:27:user
> > 
> > so I had to edit the sudoers file directly, then restarted the sudo service:
> > 
> > [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> > 
> > and that worked, so I wrote a little script to more or less automate and 
> > explain the process: https://pastebin.com/UcJa0DvC
> >
> For what it is worth, you might just find it easier to start a root 
> terminal (e.g. gnome-terminal, xterm, etc) so that you can run all those 
> commands as root interactively at a command line. Chances are your 
> "stretch-minimal" may not have many choices of terminals, but then you 
> can always just add one to make your life a little easier. I don't know 
> stretch, but I would guess that the 'xterm' application is likely 
> already installed.
> 
> $ qvm-run -a --user root stretch-minimal xterm
> 
> 'gnome-terminal' is execelent if that is already installed.

Yes, there is an XTerm available in stretch-minimal.
Good suggestion to run that as root from dom0, thanks, but I'm already in de 
sudo group now. ;-)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a7e2e004-a112-4043-98c2-d3fec70f891e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-11 Thread list . wget
On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> On 7/10/19 2:02 AM,  wrote:
> > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> >> On 7/9/19 7:25 AM,  wrote:
> >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> >>>
> >>> $ sudo dnf install 
> >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> >>>
> >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> >>> running template I'm asked for a password when I try to sudo my way into 
> >>> apt-get update.
> >>>
> >>> Does anyone know the password for 'user'?
> >>>
> >>> Thanks.
> >>>
> >>
> >> If you can not sudo, you can always try running your command from Dom0
> >> as user root:
> >>
> >> $ qvm-run -a --user root  "apt-get update"
> > 
> > Thanks.
> > I not only want to update, I also want to run all other kinds of commands 
> > as sudo. Do you think I can run any command like this inside the qube from 
> > within dom0?
> 
> You can also run any other command as root, like "passwd user" to set 
> the password to a know value, or "gedit /etc/sudoers" and modify who can 
> sudo, add yourself to the wheel group, etc... I can't say why your 
> particular appvm prevents you from sudoing without testing the vm 
> myself, but whatever the problem is, you now have a way to get a root 
> shell to fix it.
> 
> hope this helps

It did, thanks for your help.
The funny thing is,

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user"

didn't work, even after

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

although 'user' was added to the sudo group as could be seen from

user@stretch-minimal:~$  cat /etc/group | grep sudo
sudo:x:27:user

so I had to edit the sudoers file directly, then restarted the sudo service:

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

and that worked, so I wrote a little script to more or less automate and 
explain the process: https://pastebin.com/UcJa0DvC

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0768f19-3a7c-46ac-8d1f-79f337195f84%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-11 Thread list . wget
On Friday, 12 July 2019 01:27:43 UTC, list...@gmail.com  wrote:
> On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> > On 7/10/19 2:02 AM,  wrote:
> > > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> > >> On 7/9/19 7:25 AM,  wrote:
> > >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org 
> > >>> using
> > >>>
> > >>> $ sudo dnf install 
> > >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> > >>>
> > >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > >>> running template I'm asked for a password when I try to sudo my way 
> > >>> into apt-get update.
> > >>>
> > >>> Does anyone know the password for 'user'?
> > >>>
> > >>> Thanks.
> > >>>
> > >>
> > >> If you can not sudo, you can always try running your command from Dom0
> > >> as user root:
> > >>
> > >> $ qvm-run -a --user root  "apt-get update"
> > > 
> > > Thanks.
> > > I not only want to update, I also want to run all other kinds of commands 
> > > as sudo. Do you think I can run any command like this inside the qube 
> > > from within dom0?
> > 
> > You can also run any other command as root, like "passwd user" to set 
> > the password to a know value, or "gedit /etc/sudoers" and modify who can 
> > sudo, add yourself to the wheel group, etc... I can't say why your 
> > particular appvm prevents you from sudoing without testing the vm 
> > myself, but whatever the problem is, you now have a way to get a root 
> > shell to fix it.
> > 
> > hope this helps
> 
> It did, thanks for your help.
> The funny thing is, 
> 
> [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo 
> user"
> 
> didn't work, even after 
> 
> [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> 
> although 'user' was added to the sudo group as could be seen from 
> 
> user@stretch-minimal:~$  cat /etc/group | grep sudo
> sudo:x:27:user
> 
> so I had to edit the sudoers file directly, then restarted the sudo service:
> 
> [user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
> [user@dom0 ~]$ 
> qvm-run -p --user stretch-minimal "service sudo restart"
> 
> and that worked, so I wrote a little script to more or less automate and 
> explain the process: https://pastebin.com/UcJa0DvC

Sorry, that last line should read:
[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d4ea0cbe-7af8-489b-9170-e1cc23ff4158%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-11 Thread list . wget
On Wednesday, 10 July 2019 17:13:42 UTC, steve.coleman  wrote:
> On 7/10/19 2:02 AM,  wrote:
> > On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> >> On 7/9/19 7:25 AM,  wrote:
> >>> Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> >>>
> >>> $ sudo dnf install 
> >>> qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> >>>
> >>> and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> >>> running template I'm asked for a password when I try to sudo my way into 
> >>> apt-get update.
> >>>
> >>> Does anyone know the password for 'user'?
> >>>
> >>> Thanks.
> >>>
> >>
> >> If you can not sudo, you can always try running your command from Dom0
> >> as user root:
> >>
> >> $ qvm-run -a --user root  "apt-get update"
> > 
> > Thanks.
> > I not only want to update, I also want to run all other kinds of commands 
> > as sudo. Do you think I can run any command like this inside the qube from 
> > within dom0?
> 
> You can also run any other command as root, like "passwd user" to set 
> the password to a know value, or "gedit /etc/sudoers" and modify who can 
> sudo, add yourself to the wheel group, etc... I can't say why your 
> particular appvm prevents you from sudoing without testing the vm 
> myself, but whatever the problem is, you now have a way to get a root 
> shell to fix it.
> 
> hope this helps

It did, thanks for your help.
The funny thing is, 

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "usermod -a -G sudo user"

didn't work, even after 

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"

although 'user' was added to the sudo group as could be seen from 

user@stretch-minimal:~$  cat /etc/group | grep sudo
sudo:x:27:user

so I had to edit the sudoers file directly, then restarted the sudo service:

[user@dom0 ~]$ qvm-run -p --user root stretch-minimal "service sudo restart"
[user@dom0 ~]$ 
qvm-run -p --user stretch-minimal "service sudo restart"

and that worked, so I wrote a little script to more or less automate and 
explain the process: https://pastebin.com/UcJa0DvC

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f144ec75-8a24-40a3-8c3a-d8c4a4e0c4a1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-10 Thread list . wget
On Tuesday, 9 July 2019 13:35:39 UTC, unman  wrote:
> On Tue, Jul 09, 2019 at 08:30:37AM -0400, Steve Coleman wrote:
> > On 7/9/19 7:25 AM,  wrote:
> > > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> > > 
> > > $ sudo dnf install 
> > > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> > > 
> > > and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > > running template I'm asked for a password when I try to sudo my way into 
> > > apt-get update.
> > > 
> > > Does anyone know the password for 'user'?
> > > 
> > > Thanks.
> > > 
> > 
> > If you can not sudo, you can always try running your command from Dom0 as
> > user root:
> > 
> > $ qvm-run -a --user root  "apt-get update"
> > 
> 
> This doesnt look right: I havent used a trusty for a while, and dont
> support it as its no longer LTS.
> If it's the minimal template, have you installed the
> qubes-core-agent-passwordless-root package? I could build it for you if
> you have problems building yourself.
> 
> unman

Thanks for replying, and me thinking that 14.04 was 'stretch'. :)

Whatever command I try to do as sudo, it responds the same:

user@stretch-minimal:~$ sudo nano
We trust blahblah
[sudo] password for user:

Entering the 'empty password' then gives:
"Sorry, try again."

Against better knowledge I also tried in dom0

[user@dom0 Desktop]$ sudo dnf install qubes-core-agent-passwordless-root
but that gave a "no package qubes-core-agent-passwordless-root available.

If the software package I was planning to run in the VM didn't specifically ask 
for 14.04 I'd have chosen a newer Ubuntu version of course.

It seems coleman's suggestion works as after entering his command inside my 
stretch-minimal VM ps aux indicates a running qrexec-agent and 'apt-get update'.

When that's finished I'll try to run another command from within dom0 that 
would give me root access. 
Such as creating a password for user 'user' and entry into wheel.
Does that sound correct?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6098924a-5a5e-469f-b255-287a27835a3c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-10 Thread list . wget
On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:
> On 7/9/19 7:25 AM,  wrote:
> > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using
> > 
> > $ sudo dnf install 
> > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm
> > 
> > and that works 'fabelhaft' (German for 'fabulously' :), but inside the 
> > running template I'm asked for a password when I try to sudo my way into 
> > apt-get update.
> > 
> > Does anyone know the password for 'user'?
> > 
> > Thanks.
> > 
> 
> If you can not sudo, you can always try running your command from Dom0 
> as user root:
> 
> $ qvm-run -a --user root  "apt-get update"

Thanks.
I not only want to update, I also want to run all other kinds of commands as 
sudo. Do you think I can run any command like this inside the qube from within 
dom0?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0829bd06-9fee-4142-9e1d-b3fb20174ced%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-09 Thread list . wget
Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using

$ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm 

and that works 'fabelhaft' (German for 'fabulously' :), but inside the running 
template I'm asked for a password when I try to sudo my way into apt-get update.

Does anyone know the password for 'user'?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2aadd939-9550-4416-b557-00703f53c878%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Ubuntu templates

2019-07-08 Thread list . wget
On Tuesday, 1 January 2019 02:11:21 UTC, unman  wrote:

> Once you have the package in dom0 you can install it with 'dnf install'
> That will create a template, and you should be able to create qubes as
> you will.
> 
> unman

Awesome! 
It worked but I can't sudo without knowing the built-in user's password.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/842a4b72-d7eb-42de-b541-c7309c438103%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Ubuntu templates

2019-07-08 Thread list . wget
On Tuesday, 1 January 2019 02:11:21 UTC, unman  wrote:
> On Mon, Dec 31, 2018 at 10:35:31AM -0800, seshu wrote:
> > On Wednesday, December 26, 2018 at 3:39:55 AM UTC-7, unman wrote:
> > > For any one who wants to try out Xenial or Bionic, I've put some updated
> > > templates for 4.0 online, including a bionic+desktop version.
> > > They are pretty vanilla, except I have stopped the automatic search for
> > > updates. The templates are signed with my key.
> > > 
> > > If you use Ubuntu in Qubes I provide package repositories at
> > > https://qubes.3isec.org for convenience. Full details on that page.
> > > 
> > > As you may know Qubes doesn't provide official pre-built Templates for
> > > Ubuntu, because of licensing concerns - details at
> > > www.qubes-os.org/doc/templates/ubuntu
> > > 
> > > To use my templates or packages, you will, of course, have to trust me
> > > (and my key). If you're not happy doing this, then build the templates
> > > and packages yourself using Qubes Builder.
> > > It is simple to build templates using Qubes Builder, but some
> > > people find it daunting, or don't have time.
> > > If you want to do it, follow the instructions for building but select
> > > "builder-debian" plugin and the Ubuntu distribution you want.  If you
> > > need help just ask.
> > > 
> > > unman
> > 
> > Hi, I'm new to Qubes and am interested in trying the ubuntu template. But, 
> > I"m confused on how to use the template you created?  I went to 3isec.org 
> > site and the instructions are confusing. I see the key you have there, but 
> > the pgp.mit.edu server doesn't seem to be responding when I request keys. 
> > And then I'm not sure what to do with the rpm file for the template?
> > 
> > Sorry to ask dumb questions, but thanks also for putting this together. 
> > thanks!
> > 
> 
> No need to apologise. Everyone starts from somewhere.
> 
> If you are connecting via Tor then pgp.mit.edu will often be
> unresponsive. You should be able to find the key elsewhere, on other
> keyservers (like keys.gnupg.net), and be able to check fingerprint
> against github, or postings to this list.
> Download the package in a qube. Use a Fedora based qube and you can
> verify the package is signed by me, using 'rpm -K' or 'rpm -qpi'
> 
> Once you are happy, (and have decided to trust me), you need to transfer
> the package in to dom0.
> Have a look at www.qubes-os.org/doc/copy-from-dom0/ for help with this.
> 
> Once you have the package in dom0 you can install it with 'dnf install'
> That will create a template, and you should be able to create qubes as
> you will.
> 
> unman

Awesome! Install worked but can't sudo because I don't know the passwd for user.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/38548959-af1f-4735-8105-09ac7d600ff4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.