Re: [qubes-users] feature request: qvm-print command

2020-05-19 Thread dhorf-hfref . 4a288f10
On Tue, May 19, 2020 at 11:14:45AM +0200, haaber wrote:
> Hello there, I was thinking about the usefulness of a qvm-print command
> that takes an input file, sends it to the "printing-VM" (defined in some
> config file), and launches there a document viewer (defined in the
> config file) in order to control parameters like duplexing, grayscale..)
> or just runs plain "lp". After succesful printing it should clean up &
> remove the file in the QubesIncoming folder.

if your printer is not locally connected, you can just set up a dvm for 
printing, then use open-in-dvm.

for a local printer, i would aim for a qubes-trusted-pdf hybrid that
does content neutralization in a dvm, and a printing adapter vm that
only accepts pixel streams and does minimal adaption for printjob
parameters (duplexing,...).



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200519094325.GP1079%40priv-mua.


[qubes-users] feature request: qvm-print command

2020-05-19 Thread haaber

Hello there, I was thinking about the usefulness of a qvm-print command
that takes an input file, sends it to the "printing-VM" (defined in some
config file), and launches there a document viewer (defined in the
config file) in order to control parameters like duplexing, grayscale..)
or just runs plain "lp". After succesful printing it should clean up &
remove the file in the QubesIncoming folder.

Did someone construct such a thing already? Could be a nice feature, to
my point of view.  Bernhard

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7b5d0139-51da-8718-f157-7cd6dc7d988d%40web.de.


Re: [qubes-users] feature request

2020-02-19 Thread Foppe de Haan


On Saturday, January 25, 2020 at 2:53:53 PM UTC+1, Chris Laprise wrote:
>
> On 1/25/20 7:15 AM, haaber wrote: 
> > Hello, I have several virtual screens; I guess many user have. Is it 
> > possible to reserve one of them exclusively for dom0 and templateVM 
> > terminals -sort of a separated "admin screen"-  to avoid other 
> > appVM-windows popping up and being able to capture input from keyboard? 
> >Bernhard 
> > 
>
> KDE lets you confine windows to certain screens or virtual desktops 
> under System Settings / Desktop Management / Window Rules. You can 
> specify how it matches the window, such as pattern matching on the 
> window title. 
>
> For example, if you set Window Title to 'Regular expression' and the 
> text to '^\[personal', then under Size/Position select 'Desktop', 'Apply 
> Initially' and 'Desktop 2' ... that will make windows from any VM 
> beginning with "personal" open only on Desktop 2. You can also use 
> 'Force' instead of 'Apply Initially' and that will prevent you from 
> moving those windows to a different desktop. 
>
> I think the regular expression matching is probably powerful enough to 
> do what you want. For example, a rule for any window title NOT beginning 
> with '[' and NOT having also ']' would be a dom0 window. Another rule 
> could have the names of all your templates. 
>
> -- 
> Chris Laprise, tas...@posteo.net  
> https://github.com/tasket 
> https://twitter.com/ttaskett 
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886 
>
Thanks for pointing that out. Currently trying KDE in Qubes 4.1 beta, and 
it's quite a change from xfce 4.14 even (which was already preferable to 
previous iterations). 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/de32ccc0-ca2c-4c52-8479-153731e060aa%40googlegroups.com.


VS: [qubes-users] feature request

2020-01-25 Thread Michael Andersson
DWM can do this for you.it has inbuilt mechanims to Lock app windows to 
separate tags (Virtual desktops). Also you can define on which monitor this 
tags is and where you want to Lock it.

I'm using dwm on my everyday qubes thinkpads and it works great, all 
application windows goes there where I want them to go ‎and they don't mess my 
currently active "window".


Lähetetty Jolla Sailfish -älypuhelimestani.
  Alkuperäinen viesti  
Lähettäjä: haaber
Lähetetty: lauantaina 25. tammikuuta 2020 13.15
Päättymisaika: qubes-users; Andrew David Wong
Aihe: [qubes-users] feature request

Hello, I have several virtual screens; I guess many user have. Is it
possible to reserve one of them exclusively for dom0 and templateVM
terminals -sort of a separated "admin screen"- to avoid other
appVM-windows popping up and being able to capture input from keyboard?
Bernhard

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1c4a6f80-6f85-f1c1-4995-dc5f0cb0ab2b%40web.de.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200126064945.4661302.71896.16030%40gmail.com.


Re: [qubes-users] feature request

2020-01-25 Thread Claudia
January 25, 2020 1:53 PM, "Chris Laprise"  wrote:

> On 1/25/20 7:15 AM, haaber wrote:
> 
>> Hello, I have several virtual screens; I guess many user have. Is it
>> possible to reserve one of them exclusively for dom0 and templateVM
>> terminals -sort of a separated "admin screen"-  to avoid other
>> appVM-windows popping up and being able to capture input from keyboard?
>> Bernhard
> 
> KDE lets you confine windows to certain screens or virtual desktops
> under System Settings / Desktop Management / Window Rules. You can
> specify how it matches the window, such as pattern matching on the
> window title.
> 
> For example, if you set Window Title to 'Regular expression' and the
> text to '^\[personal', then under Size/Position select 'Desktop', 'Apply
> Initially' and 'Desktop 2' ... that will make windows from any VM
> beginning with "personal" open only on Desktop 2. You can also use
> 'Force' instead of 'Apply Initially' and that will prevent you from
> moving those windows to a different desktop.
> 
> I think the regular expression matching is probably powerful enough to
> do what you want. For example, a rule for any window title NOT beginning
> with '[' and NOT having also ']' would be a dom0 window. Another rule
> could have the names of all your templates.

1) At least on my machine (XFCE), dom0 windows start with "[Dom0]". But I get 
your point.

2) The "[]" part of the window title is not actually part of the WM_NAME 
property. It's the WM_CLIENT_MACHINE property. But as long as you can match on 
that, it makes it even easier to write rules. You can see it with xprop:

[user@dom0 ~]$  xprop -id 0x1614d7d | grep -i 'Dom0'
WM_CLIENT_MACHINE(STRING) = "dom0"
WM_ICON_NAME(STRING) = "Terminal - user@dom0:~"
_NET_WM_ICON_NAME(UTF8_STRING) = "Terminal - user@dom0:~"
WM_NAME(STRING) = "Terminal - user@dom0:~"
_NET_WM_NAME(UTF8_STRING) = "Terminal - user@dom0:~"

Interestingly, I don't actually see a property equal to the full titlebar of 
the window, so I guess that's constructed by the window manager.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ff15a51104bd134e89d4a4ae32a4e89f%40disroot.org.


Re: [qubes-users] feature request

2020-01-25 Thread Chris Laprise

On 1/25/20 7:15 AM, haaber wrote:

Hello, I have several virtual screens; I guess many user have. Is it
possible to reserve one of them exclusively for dom0 and templateVM
terminals -sort of a separated "admin screen"-  to avoid other
appVM-windows popping up and being able to capture input from keyboard?
   Bernhard



KDE lets you confine windows to certain screens or virtual desktops 
under System Settings / Desktop Management / Window Rules. You can 
specify how it matches the window, such as pattern matching on the 
window title.


For example, if you set Window Title to 'Regular expression' and the 
text to '^\[personal', then under Size/Position select 'Desktop', 'Apply 
Initially' and 'Desktop 2' ... that will make windows from any VM 
beginning with "personal" open only on Desktop 2. You can also use 
'Force' instead of 'Apply Initially' and that will prevent you from 
moving those windows to a different desktop.


I think the regular expression matching is probably powerful enough to 
do what you want. For example, a rule for any window title NOT beginning 
with '[' and NOT having also ']' would be a dom0 window. Another rule 
could have the names of all your templates.


--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6b8a41fd-8abf-06ff-b70b-82fba2219478%40posteo.net.


Re: [qubes-users] feature request

2020-01-25 Thread Claudia
January 25, 2020 1:40 PM, "Claudia"  wrote:

> January 25, 2020 11:58 AM, brendan.h...@gmail.com wrote:
> 
>> I think some window managers allow one to pin certain applications to 
>> particular virtual desktops.
>> But those aren’t really security features, more just window manager tricks 
>> to help users organize
>> windows.
>> 
>> My preference would be something along the lines of support for allowing 
>> multiple local x-servers
>> in dom0 [or in future displayVM(s)] and options to allow mapping of dom0 and 
>> guests/domUs each or
>> in groups to a particular x-server. Certain features would not work across 
>> x-windows sessions, e.g.
>> inter vm copy/paste. One could also enforce it at the qubes policy level 
>> (e.g. no qvm-copy either).
>> 
>> Useful if you want to reduce the chances of mistakenly leaking data across 
>> client work and/or
>> personas.
> 
> It seems to me like you could almost do this today, by starting another X on 
> another TTY each with
> its own qubes_guid, optionally as different user. Each guid could probably be 
> patched* to listen on
> different vchan "ports" (libvchan_[server|client]_init()), however I don't 
> think the vchan
> infrastructure has any kind of real access control below the VM level. So in 
> order to really
> isolate them on the dom0 side, you'd probably have to run a separate 
> xenstored for each X server,
> so that you could control which server has access to the xenstore device 
> node. But I don't think
> that would really be necessary if you're just trying to prevent accidental 
> leakage by the user.
> 
> (*Currently it appears to use a hardcoded vchan "port" of 6000. See 
> qubes-gui-daemon/xside.c, and
> qubes-gui-agent-linux/gui-agent/vmside.c. Note that gui-agent (domU) is 
> actually the server, and
> guid (dom0) is actually the client.)
> 

Actually, what was I thinking. If the VM is the server and dom0 guid is the 
client, they wouldn't have to use different ports, assuming the vchan semantics 
works like TCP/IP. You'd just have to come up with some way to control which 
domains can send MSG_CREATE requests to which instance of guid.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ef06df5178ac410b480ddae583002b04%40disroot.org.


Re: [qubes-users] feature request

2020-01-25 Thread Claudia
January 25, 2020 11:58 AM, brendan.h...@gmail.com wrote:

> I think some window managers allow one to pin certain applications to 
> particular virtual desktops.
> But those aren’t really security features, more just window manager tricks to 
> help users organize
> windows.
> 
> My preference would be something along the lines of support for allowing 
> multiple local x-servers
> in dom0 [or in future displayVM(s)] and options to allow mapping of dom0 and 
> guests/domUs each or
> in groups to a particular x-server. Certain features would not work across 
> x-windows sessions, e.g.
> inter vm copy/paste. One could also enforce it at the qubes policy level 
> (e.g. no qvm-copy either).
> 
> Useful if you want to reduce the chances of mistakenly leaking data across 
> client work and/or
> personas.

It seems to me like you could almost do this today, by starting another X on 
another TTY each with its own qubes_guid, optionally as different user. Each 
guid could probably be patched* to listen on different vchan "ports" 
(libvchan_[server|client]_init()), however I don't think the vchan 
infrastructure has any kind of real access control below the VM level. So in 
order to really isolate them on the dom0 side, you'd probably have to run a 
separate xenstored for each X server, so that you could control which server 
has access to the xenstore device node. But I don't think that would really be 
necessary if you're just trying to prevent accidental leakage by the user.

(*Currently it appears to use a hardcoded vchan "port" of 6000. See 
qubes-gui-daemon/xside.c, and qubes-gui-agent-linux/gui-agent/vmside.c. Note 
that gui-agent (domU) is actually the server, and guid (dom0) is actually the 
client.)

Then, optionally you could implement some sort of policy to enforce which VMs 
are allowed to connect to which guid. Whether as a qubes-rpc policy of some 
sort, within guid, or just a simple X hook/script using the _NET_QUBESVM window 
property.

https://www.qubes-os.org/doc/gui/
https://www.cs.uic.edu/~xzhang/vchan/
https://github.com/QubesOS/qubes-core-vchan-xen
https://github.com/QubesOS/qubes-gui-daemon

PS: I can't believe the devs are actually thinking about rolling out GUI 
domains by default in 4.1. It's hard enough to get Qubes running on a given 
machine as it is now, let alone the fact that VGA passthru is a total crapshoot 
even under the best conditions. I still can't even get sys-usb to work without 
corrupting memory space of my VGA controller and SATA controller.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/30823052eccdc181ca9a0774fc3cd678%40disroot.org.


[qubes-users] feature request

2020-01-25 Thread brendan . hoar
I think some window managers allow one to pin certain applications to 
particular virtual desktops. But those aren’t really security features, more 
just window manager tricks to help users organize windows.

My preference would be something along the lines of support for allowing 
multiple local x-servers in dom0 [or in future displayVM(s)] and options to 
allow mapping of dom0 and guests/domUs each or in groups to a particular 
x-server. Certain features would not work across x-windows sessions, e.g. inter 
vm copy/paste. One could also enforce it at the qubes policy level (e.g. no 
qvm-copy either).

Useful if you want to reduce the chances of mistakenly leaking data across 
client work and/or personas.

B



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa793038-32f5-4891-bb70-3699f6ba88c8%40googlegroups.com.


[qubes-users] feature request

2020-01-25 Thread haaber

Hello, I have several virtual screens; I guess many user have. Is it
possible to reserve one of them exclusively for dom0 and templateVM
terminals -sort of a separated "admin screen"-  to avoid other
appVM-windows popping up and being able to capture input from keyboard?
  Bernhard

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1c4a6f80-6f85-f1c1-4995-dc5f0cb0ab2b%40web.de.


Re: [qubes-users] Feature request

2020-01-05 Thread Claudia
January 5, 2020 7:50 PM, "Franz" <169...@gmail.com> wrote:

> May be it already somehow exists and I am not aware of it, but it would be 
> very interesting to be
> able to save backup settings, that is a list of VMs that contain your current 
> ordinary activity and
> you want to backup more often and fast.
> 
> I mean not everything which in my case is over 250gb, not only vaultVM, which 
> is easy to set, but
> lacking other important VMs.
> 
> Rather being able to save a list of perhaps 5-7 more important VMs so that 
> they are ready for a
> fast backup.
> 
> I know there is a CLI that does just that and once even wrote a script for 
> that, but I am never
> sure it still works as intended over so many Qubes upgrades and after every 
> new Qubes installation
> all my scripts are moved from home to elsewhere for some reasons that do not 
> understand yet.
> 
> So backup is important and any incentive to win backup lazyness is worth 
> every effort, particularly
> because automating Qubes backups is impossible or extremely difficult.
> 
> Is it complicated to add this "save backup setting" to the GUI?
> Best

Isn't that sort of what "Qube Settings > Basic > Include in backups by default" 
does?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/08ab9bda08ab38dc0a70263986dcafaf%40disroot.org.


[qubes-users] Feature request

2020-01-05 Thread Franz
May be it already somehow exists and I am not aware of it, but it would be
very interesting to be able to save backup settings, that is a list of VMs
that contain your current ordinary activity and you want to backup more
often and fast.

I mean not everything which in my case is over 250gb, not only vaultVM,
which is easy to set, but lacking other important VMs.

Rather being able to save a list of perhaps 5-7 more important VMs so that
they are ready for a fast backup.

I know there is a CLI that does just that and once even wrote a script for
that, but I am never sure it still works as intended over so many Qubes
upgrades and after every new Qubes installation all my scripts are moved
from home to elsewhere for some reasons that do not understand yet.

So backup is important and any incentive to win backup lazyness is worth
every effort, particularly because automating Qubes backups is impossible
or extremely difficult.

Is it complicated to add this "save backup setting" to the GUI?
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDNAW9rDge7SsAjBXdPbBfS0mGz03tdmbZ3RJY7XM5btw%40mail.gmail.com.


Re: [qubes-users] Feature request: "HDD Airbag" analog

2017-03-15 Thread .
i see. well, at least helping info on how one can implement this. the 
idea is not only to have one device for multiple tasks. large SSDs are 
still not so affordable. regarding practical scenarios for things like 
2x2 TB HDDs: local Wikipedia dump. or/and huge Squid cache. imo, it is 
better to use local storage than online, even if TOR is used. local KBs 
like Wikipedia means almost 100% no one can trace what user researching 
and for how long, assuming HW and system has no backdoors to net 
ofrourse. low security settings of many TOR nodes turning TOR usage into 
a joke, not mention other known attacks. i recall news article about 3 
or more governments pursuing readers of wikileaks. imo its impossible 
for observer to determine which articles person is reading and when (on 
airgaped PC), by only having fact of person's monthly wikipedia dump 
downloads (few hundred of gigabytes in compressed state). by observer 
right now i mean nonhuman software observers, active 24/7/366, having 
access to ISP traffic and possibly to target KB server via backdoors. of 
course this is more like anonymity than security matter.



On 16/03/2017 03:39, Andrew David Wong wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-03-15 13:11, thinkpad user wrote:

Feature request: "HDD Airbag" analog

overview: https://support.lenovo.com/nl/en/solutions/ht003517 list
  of supported devices:
http://support.lenovo.com/nl/en/downloads/ds015000

is it possible to add this feature to Qubes? or atleast provide
some interface to poweroff/park HDD? yes, Qubes requires SSD for
good operation, but imo most users like to have SSD + large HDD for
media or other content. i believe qubes can be really friendly for
not so geeky user, by having such features or atleast providing
support so user could write such soft.


Realistically, the probability of Qubes implementing this is
approximately zero, IMHO. (Not Qubes-specific, not security-critical,
already not enough time/resources to pursue actual Qubes goals,
missing expertise, world moving away from HDDs, etc.) It should be
implemented somewhere upstream, if anywhere.

- -- 
Andrew David Wong (Axon)

Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=70kE
-END PGP SIGNATURE-



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/650a89fe-353a-717a-6248-4952952cb50f%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Feature request: "HDD Airbag" analog

2017-03-15 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-03-15 13:11, thinkpad user wrote:
> Feature request: "HDD Airbag" analog
> 
> overview: https://support.lenovo.com/nl/en/solutions/ht003517 list
>  of supported devices: 
> http://support.lenovo.com/nl/en/downloads/ds015000
> 
> is it possible to add this feature to Qubes? or atleast provide 
> some interface to poweroff/park HDD? yes, Qubes requires SSD for 
> good operation, but imo most users like to have SSD + large HDD for
> media or other content. i believe qubes can be really friendly for
> not so geeky user, by having such features or atleast providing
> support so user could write such soft.
> 

Realistically, the probability of Qubes implementing this is
approximately zero, IMHO. (Not Qubes-specific, not security-critical,
already not enough time/resources to pursue actual Qubes goals,
missing expertise, world moving away from HDDs, etc.) It should be
implemented somewhere upstream, if anywhere.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=70kE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d7edb21-d575-3676-3918-08887e810c7f%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Feature request: "HDD Airbag" analog

2017-03-15 Thread thinkpad user
Feature request: "HDD Airbag" analog

overview:
https://support.lenovo.com/nl/en/solutions/ht003517
list of supported devices:
http://support.lenovo.com/nl/en/downloads/ds015000

is it possible to add this feature to Qubes? or atleast provide some interface 
to poweroff/park HDD? yes, Qubes requires SSD for good operation, but imo most 
users like to have SSD + large HDD for media or other content. i believe qubes 
can be really friendly for not so geeky user, by having such features or 
atleast providing support so user could write such soft.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/16be7dee-54e1-404a-9e42-581fba972bb8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-13 Thread Achim Patzner
Am 10.11.2016 um 12:43 schrieb Eva Star:

>> I hope I'm not too offtopic but a gui option to shut down multiple vms at 
>> once would be cool.
> `qvm-shutdown --all --wait` -- will shutdown all VMs (if it helps)

Multiple, not all. Select multipel lines and then get a pop-up option
"shut these down". Or "qvm-shutdown --class=Template --all".


Achim

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/524504aa-61af-72ca-8db6-842c6aba33b2%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-13 Thread Achim Patzner
Am 10.11.2016 um 00:24 schrieb Marek Marczykowski-Górecki:
> On Tue, Nov 08, 2016 at 10:37:02PM +0100, Achim Patzner wrote:
> > Maybe I should have added the (obviously in my eyes obvious) argument:
> > The current update-procedures are launched by a GUI-application and then
> > open a window that is asking questions which need keyboard interaction.
> > And in some cases the default answer (at least in Fedora) (which is
> > making things worse – at least the default Xterm is looking different
> > for Fedora and Debian) is not what you want. Or at least not what I want
> > (aborting the update). Now someone wants to add another bloody
> > interactive option that will require at least me to select the
> > non-default option.
>
> I'd like to change this default - indeed it is very confusing, but I
> don't know how.

Only be recompiling it. This is hardcoded. I remember a
"Linux-Stammtisch" in the area where the discussion over this topic
nearly led to bloodshed so please avoid supplying patches unless you've
got a black belt in something.

> The only related option is to accept automatically.
> Maybe this is the way to go?

I'm currently living with about 10 Fedora-based templates. I'm usually
updating the fattest, reviewing the list carefully and then go on with
the update. The others are just getting a treatment using qvm-run
(because I am annoyed by all those questions using the Manager). So
using "-y" on the command line would not be exactly what I consider safe
nor secure.

> Personally I like to review list of packages to be updated, but I guess
> most users don't do that.

… until they have been burnt. I just spent hours finding out how I
destroyed my native Arch system until I remembered that I'm EFI booting
without grub and forgot copying the new kernel (which I didn't notice
being installed because I didn't check the f* list) to /boot/efi/EFI/arch.

> I think it's important to give the user some feedback. Fully automated
> updates are somehow broken in most tools[1] - this is why we have this
> terminal window,

I guess I mentioned already that I'm mildly hating someone for using an
xterm in default settings 8-). Although it is looking coool when you're
updating 20 machines at the same time and showing your stamp collection
to someone I've yet to figure out how to use a different font size for it.

> instead of just some progress bar or something even less intrusive.

Sometimes I like the way Ubuntu and the likes are handling things –
until they break something. 8-)

> But automatically shutting down the template (after user have a chance
> to see update feedback) is a good idea. Something like "Press enter to
> shutdown template, or Ctrl-C to just close this window".

I once got into a serious discussion with Jordan Hubbard about the fact
that I really disliked the sudden pop-ups asking for something innocent
like "do you really want to shut down/have your cat slaughtered by
satanists/vote for Trump?" with the least convenient option being the
default while I was busily typing at something (you know that Macs are
used by pushing mice and touching pads; that's why you can remove keys,
one after the other, without any user noticing it).

It's the same with the update process; the keyboard is not flushed
before the "shutdown or not" question so any extraneous return key will
still be in the buffer. Shutting a machine down isn't as bad as messing
up your boot disk (which I did on the Mac by accepting a system update I
would not have accepted if I had time to read the pop-up) but you should
always be careful with users… Their attitude might type first, think later.


Achim

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee71786a-1bf7-475b-3637-fee3a1e6bc38%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-12 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Nov 08, 2016 at 01:07:38AM -0800, Andrew David Wong wrote:
> On 2016-11-07 10:05, Eva Star wrote:
> > After template updated ask user at the console to shutdown current template.
> > 
> > "Shutdown current template [Y/n]"
> > 
> 
> Currently tracking a very similar suggestion here:
> 
> https://github.com/QubesOS/qubes-issues/issues/832

Indeed this is similar, but not the same because it does matter when you
shutdown the template - until you do so, child VMs do not see the
changes.

Created new issue here:
https://github.com/QubesOS/qubes-issues/issues/2431

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYJ4nRAAoJENuP0xzK19csKJYH/232f3ts6oGOcVDvnqubDaEI
NFSENa+ovKD9v7ZQjVmd0bdWlj7vH8HfhzCgzJZzFR0qLZb5sBHKmE1o3iqEkiYf
HYi3WBKNgu7YtGhmS8iGLnBilSuJYjAyiaAzvVRbEHc8WFuy04U42lPzKSo/GMj6
FQxLXU/1lVz8TmwKVRkmVq+VuOxkO4OS58STu2PW5pKn3B1nx+qREzhNURhybYSV
d4zgGQmvztNk88PG2sppnQAeYprqgR+fINwLqjPu8Mg7DfW2kb6EIpcFMJbNGqb3
WvV1ZmNPeIMAtzv8rvlvPE80niEOBsU0UDiTJ6T0YMlMBt/LnhEJeSX3yj2fm8o=
=5wOE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161112212951.GC15162%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-10 Thread Eva Star

> I hope I'm not too offtopic but a gui option to shut down multiple vms at 
> once would be cool.

`qvm-shutdown --all --wait` -- will shutdown all VMs (if it helps)

p.s. Marek, this command work NOT well. Time to time it freeze Qubes Manager  
and never end especially at the situations when need to shutdown cascade of VMs 
like this sys-net > sys-firewal -> sys-firrewall2 -> whinux -> sys-firrewall3 
-> AppVm

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ba2c73c5-7a00-4da1-93f3-ca08bc9ba72e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-09 Thread raahelps
I hope I'm not too offtopic but a gui option to shut down multiple vms at once 
would be cool. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ea416e8b-ae11-4fa6-ba0f-3d6c0d19404b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-09 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Nov 08, 2016 at 10:37:02PM +0100, Achim Patzner wrote:
> Am 08.11.2016 um 12:31 schrieb Andrew David Wong:
> > >>> After template updated ask user at the console to shutdown current
> > template.
> > >>
> > >>> "Shutdown current template [Y/n]"
> > >>
> > >> Currently tracking a very similar suggestion here:
> > >>
> > >> https://github.com/QubesOS/qubes-issues/issues/832
> >
> > > Wouldn't a command-line tool qvm-update-template [--all]
> > > [--shutdown-after-upgrade] [, ]* be much more
> > flexible?
> >
> > Yes, but I don't think the primarily goal of that ticket is flexibility.
> > Rather, I think it's to implement a quality-of-life feature that will
> > benefit users generally, including novice users who never touch the
> > command-line.
> 
> Maybe I should have added the (obviously in my eyes obvious) argument:
> The current update-procedures are launched by a GUI-application and then
> open a window that is asking questions which need keyboard interaction.
> And in some cases the default answer (at least in Fedora) (which is
> making things worse – at least the default Xterm is looking different
> for Fedora and Debian) is not what you want. Or at least not what I want
> (aborting the update). Now someone wants to add another bloody
> interactive option that will require at least me to select the
> non-default option.

I'd like to change this default - indeed it is very confusing, but I
don't know how. The only related option is to accept automatically.
Maybe this is the way to go?
Personally I like to review list of packages to be updated, but I guess
most users don't do that.

> No. Thank you very much, but no. If someone is making things even more
> like a text adventure they could just as well do it right, make the
> update process command line based and give up interactive decisions in
> favor of command line parameters to finally deliver a launch-and-forget
> solution. That could be easily scripted without opening that barrel of salt.

I think it's important to give the user some feedback. Fully automated
updates are somehow broken in most tools[1] - this is why we have this
terminal window, instead of just some progress bar or something even
less intrusive.
But automatically shutting down the template (after user have a chance
to see update feedback) is a good idea. Something like "Press enter to
shutdown template, or Ctrl-C to just close this window".

[1] https://phabricator.whonix.org/T373

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYI7A9AAoJENuP0xzK19cslx4H/3JFzlpcZZxatNmBjcB9Fuuf
gOgWK5iG8ql1ekKKYvGldOatjw3+c9pYGtY/u3jZTF5lrdifMO5kh1cbsnJ9EYJ8
Z7bjJ07Xa/3Now3fxfznBhe5tKpi+q6SqNjiGXNuSkZyoZqMfH+z1Zlv4FYXlft1
FlD5HpID7zJt90EAJVgQ5S1JAnDA++jmJDvIR/04H/LBiyCzJRrWw/4tctotzbOL
wQa1pEa79Fz2fuw5UlWvkcGRMXR9H+Yu+oAJ0+TO/ObwGrSfwlqcOqg/qSNjFIm6
PAfxPM2iGuL/B0oRVi8ST2Zb50LLa5K5k2jCk8WGdBv2RisXMrXh2sJkLspwxeM=
=dI89
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161109232445.GW7073%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-08 Thread Achim Patzner
Am 08.11.2016 um 12:31 schrieb Andrew David Wong:
> >>> After template updated ask user at the console to shutdown current
> template.
> >>
> >>> "Shutdown current template [Y/n]"
> >>
> >> Currently tracking a very similar suggestion here:
> >>
> >> https://github.com/QubesOS/qubes-issues/issues/832
>
> > Wouldn't a command-line tool qvm-update-template [--all]
> > [--shutdown-after-upgrade] [, ]* be much more
> flexible?
>
> Yes, but I don't think the primarily goal of that ticket is flexibility.
> Rather, I think it's to implement a quality-of-life feature that will
> benefit users generally, including novice users who never touch the
> command-line.

Maybe I should have added the (obviously in my eyes obvious) argument:
The current update-procedures are launched by a GUI-application and then
open a window that is asking questions which need keyboard interaction.
And in some cases the default answer (at least in Fedora) (which is
making things worse – at least the default Xterm is looking different
for Fedora and Debian) is not what you want. Or at least not what I want
(aborting the update). Now someone wants to add another bloody
interactive option that will require at least me to select the
non-default option.

No. Thank you very much, but no. If someone is making things even more
like a text adventure they could just as well do it right, make the
update process command line based and give up interactive decisions in
favor of command line parameters to finally deliver a launch-and-forget
solution. That could be easily scripted without opening that barrel of salt.


Achim

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24af09d7-f174-a1b7-e0d9-ac7e659f93a4%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-08 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-11-08 03:20, Achim Patzner wrote:
> m 08.11.2016 um 10:07 schrieb Andrew David Wong:
>> On 2016-11-07 10:05, Eva Star wrote:
>>> After template updated ask user at the console to shutdown current
>> template.
>>
>>> "Shutdown current template [Y/n]"
>>
>>
>> Currently tracking a very similar suggestion here:
>>
>> https://github.com/QubesOS/qubes-issues/issues/832
> 
> Wouldn't a command-line tool qvm-update-template [--all]
> [--shutdown-after-upgrade] [, ]* be much more flexible?
> 
> 
> Achim
> 

Yes, but I don't think the primarily goal of that ticket is flexibility.
Rather, I think it's to implement a quality-of-life feature that will
benefit users generally, including novice users who never touch the
command-line.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYIbeOAAoJENtN07w5UDAwmccQAKpiMzbhePkkj46KaVOQ5WoY
K1AtMMhzmRnU1Faq0RHafTEc31UaJSNczioGwDQvFDszVU0D1Df+BspnKBHkDpBW
zhAvtMm/vTMN7DnYVEWEfiAnyIwY2kGjWTq4tP3e1aEA/NW9G+r9OnwMVcLXFuBd
SFV9oX7tbVmn4Xd/zMzsZlhV9I+8pxC72GAlQPsbfJwT/qDNwDN2nuJzpIqnfXVV
BKJPQ3squBXR9hGBx03yGj9gRCJyZzvcMSQlv58nSjP9oCOYHJ3qls97qx4JVSLi
exurkz8jtpVOBskGZXHZ9QNRpm5Pc4p8prgPzwNE/xkJ8gNAXWTeuJYb8Z4iY5H+
p4zim60oved4OxpeuYySzdl/x+ThyIrxPL2SAeDyeKfW/CIeXWL+J6Dho2aQxHXZ
lCjmF+YWqEqANM4b3pAd6SGOiZfHR3yOuPYuxGIiquIYLC0/V5Smc7eZeN2nXdV2
vRzuExSUNvigR3xJru+zFNh56mrZgS55bPOZaLjI2z5ZZDmtgXOdl7vtWcw6AHM+
+oXzv3ZUB9JhR5TOPekYG2JaaqqoNvlW5j+V+S+D/giM1Bn7M+BiHWQrSAsNX45L
dPKDSuvYXYP+v38SEI5I/ADlJxnjpVrmSD+MEnp+eFmZcL7/PCOCE9jXCuwK/ef1
knavpTYoo1VSqKr2quSn
=IKkm
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c3386bf9-f1c9-3ddf-6995-f724dc82eb8a%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-08 Thread Achim Patzner
m 08.11.2016 um 10:07 schrieb Andrew David Wong:
> On 2016-11-07 10:05, Eva Star wrote:
> > After template updated ask user at the console to shutdown current
> template.
>
> > "Shutdown current template [Y/n]"
>
>
> Currently tracking a very similar suggestion here:
>
> https://github.com/QubesOS/qubes-issues/issues/832

Wouldn't a command-line tool qvm-update-template [--all]
[--shutdown-after-upgrade] [, ]* be much more flexible?


Achim

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/04a97647-4ff9-0636-239d-55ce636e3f46%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [feature request] Shutdown template after update

2016-11-07 Thread Jean-Philippe Ouellet
See also https://github.com/QubesOS/qubes-issues/issues/2388

If we have appropriate metadata for each VM, we could automatically
shut-down VMs if they were not running prior to triggering the update.

This may be a preferable user experience.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_CfB4nvHct3xQE3JtkR1bXjxf01D9cLYcpn8MF%2BxxMrew%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] [feature request] Shutdown template after update

2016-11-07 Thread Eva Star

After template updated ask user at the console to shutdown current template.

"Shutdown current template [Y/n]"

--
Regards

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39d4981f-fc90-2588-9b00-30133c6e1d86%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] feature request: luksAddNuke

2016-07-05 Thread thinkpad user
On Tuesday, February 17, 2015 at 3:17:08 PM UTC+4, Andrew wrote:
> (and only ever work on clones of your disk).

this will work only with clones of _not corrupted_ data.
ofcourse user can have special method of destroying data, but having such extra 
method encapsulates key data nature (location of headers, ...) from user.

if user somehow has low tech knowledge level, it should design and develop 
tools for traceless data destruction, if failed to find existing. R isnt fast 
and easy task.

> Even if you encountered such a miraculously dumb government, you might
> still be exposing yourself to criminal liability (or worse) for
> knowingly causing the destruction.

only in case of provable intentional destruction

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b3c876c2-0568-4500-9e7f-f52c8feb99e8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.