It'd be useful if those qubesctl update commands were in the docs, 
especially with the concurrency option.

Em domingo, 11 de outubro de 2020 às 13:16:43 UTC-3, 
marm...@invisiblethingslab.com escreveu:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> On Sat, Oct 10, 2020 at 09:50:00PM -0500, Andrew David Wong wrote:
> > I still upgrade dom0 and templates the old-fashioned way, because I'm
> > used to it, I understand it, and I already have custom scripts for daily
> > maintenance that include these commands.
> > 
> > Specifically, I mean these kinds of commands:
> > 
> > `sudo qubes-dom0-update -y` in a dom0 terminal
> > 
> > `dnf -y --refresh upgrade` in Fedora TemplateVM terminals
> > 
> > `apt-get clean && apt-get -y update && apt-get -y dist-upgrade && 
> apt-get -y
> > autoremove && apt-get clean` in Debian-based TemplateVM terminals
> > 
> > However, when I occasionally use the Qubes Update tool, I see that it
> > creates a `disp-mgmt-*` DisposableVM for each VM it updates. This 
> prompts me
> > to wonder: Is updating with the Qubes Update tool more secure than my
> > old-fashioned methods? 
>
> Short answer: in some cases yes.
>
> > Are certain operations performed within that
> > DisposableVM in order to protect the TemplateVM?
>
> DisposableVM is used not to protect the TemplateVM, but to protect dom0
> from potentially compromised TemplateVM. Salt stack is a complex piece
> of software and we do not trust it won't get compromised when
> interacting with compromised template. The benefit of using salt stack
> is not there (the usage of DisposableVM actually makes it more resource
> intensive and slower...). The good part is that in addition to perform
> standard update commands, we can apply other changes before/after the
> update. For example this is how we delivered APT fix for Debian
> templates in context of QSB#46. This is also how we updated onion
> version of repositories addresses when we switched them.
> Another benefit is to have a single command to update any template.
>
> > If so, then how should I invoke this new update method with a command 
> like
> > the ones above? Are there drop-in replacements that I can use in my 
> scripts?
>
> The salt version of dom0 update is:
>
> sudo qubesctl state.sls update.qubes-dom0
>
> And then for TemplateVM and StandaloneVM (all at once):
>
> sudo qubesctl --skip-dom0 --templates --standalones state.sls 
> update.qubes-vm
>
> Useful options:
>
> --max-concurrency - limit how many templates are updated at the same
> time - adjust to available RAM (default 4, GUI updater sets it
> to 1)
> --targets=vm1,vm2,... - limit to specific VMs, instead of all the
> templates (use instead of --templates --standalones)
> --show-output - show update summary instead of just OK/FAIL
>
> For other options see qubesctl --help
>
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -----BEGIN PGP SIGNATURE-----
>
> iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAl+DL+IACgkQ24/THMrX
> 1yz3RggAmUQApMbqF5Ky2byELjFAUnXKLc+oqTcSmnLPbPkmWnIes6m7xj/JjHd2
> H5pwReIDmWU52Li0FtDDnF25pX424ncWDdP/v/xRXtUU+/ZDGtt3GYPPSus3SRdS
> WsGQP+YKPkQDBsWizmu4irV5hp4mnHf8oFvwue9VfVDWyAkHumtaC8ey+aFtLhlh
> FpGcHNn2n9y+1MW5+mTIZd3U89ByNUj7BZJwxyQt68fjN6rTH7RyknS05BY5GOQi
> 4MygHqYqdoWMMKu78RvtIW0sbAVOUTq2gpecVzTeB2mt3gfKG307lByt2fClqKuB
> JwjL0TWIYdj8lAXTBBni6fSMirJJqA==
> =pAog
> -----END PGP SIGNATURE-----
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/41daf59b-adf6-4be6-bc1c-7c6661d23910n%40googlegroups.com.

Reply via email to