Re: [qubes-devel] qubes-doc & rtd

2021-12-26 Thread Manuel Amador (Rudd-O)
On December 25, 2021 10:37:04 PM GMT+01:00, mm wrote: > >On 12/25/21 21:16, Manuel Amador (Rudd-O) wrote: >> >> Honestly if I were directing the project I would set up a Plone instance, >> and use its excellent i18n to write docs. Additionally, if wanted, I would

Re: [qubes-devel] qubes-doc & rtd

2021-12-25 Thread Manuel Amador (Rudd-O)
Honestly if I were directing the project I would set up a Plone instance, and use its excellent i18n to write docs. Additionally, if wanted, I would set up two way sync between a github repo and the site. Ask me for more details if interested. -- You received this message because you are

Re: [qubes-devel] Contributing to hardening AppVMs templates

2021-12-17 Thread Manuel Amador (Rudd-O)
On 16/12/2021 23.54, Hugo V.C. wrote: "is single user in each VM because it is assumed that the kernel is not trustworthy." Can you elaborate it a bit? I don't get what you mean. Are you assuming that compromising a jailed an unprivileged web browser is the same as running it as root? In

Re: [qubes-devel] Contributing to hardening AppVMs templates

2021-12-16 Thread Manuel Amador (Rudd-O)
On December 16, 2021 8:25:19 AM GMT+01:00, Hugus Maximus wrote: > >Hi all, > >I just published document discussing some well known security limitations >of Qubes OS: > >https://www.pentest.es/Demystifying_QubesOS_Security.pdf I will review it. That said, the security model of Qubes is

Re: [qubes-devel] Design questions for the next steps of the Qubes shared folders service

2021-12-15 Thread Manuel Amador (Rudd-O)
On 16/12/2021 01.07, Marek Marczykowski-Górecki wrote: Here is how qrexec policy prompt is doing it: https://github.com/QubesOS/qubes-core-qrexec/blob/master/qrexec/tools/qrexec_policy_exec.py#L64-L112 Bad news, I did not understand any of that code. :-( Just to see if I understand at least

Re: [qubes-devel] Design questions for the next steps of the Qubes shared folders service

2021-12-15 Thread Manuel Amador (Rudd-O)
On 16/12/2021 01.07, Marek Marczykowski-Górecki wrote: If going with standard qrexec prompt (+#5853), you'd get that for free;) Otherwise, you need a qrexec service that calls into GUI domain to do the prompt (and then validate its output to really allow only the thing that was asked about, not

Re: [qubes-devel] Design questions for the next steps of the Qubes shared folders service

2021-12-15 Thread Manuel Amador (Rudd-O)
Prefacing this response with: I went with the implementation as designed by the document.  In the future I will revise argument passing to use the new 4.1 style, instead of base64 over pipes. Currently the implementation uses a custom-made dialog — a very nice one, if I do say so myself — in

[qubes-devel] ANN: qubes-shared-folders 0.1.0, now with folder share manager

2021-12-15 Thread Manuel Amador (Rudd-O)
Hello, folks. A new version of Qubes shared folders has been released. https://github.com/Rudd-O/qubes-shared-folders The main highlight of this version is a revamped security model that allows the user to securely delegate folder access permissions to specific pairs of qubes, either as a

[qubes-devel] Re: Design questions for the next steps of the Qubes shared folders service

2021-12-13 Thread Manuel Amador (Rudd-O)
Information, suggestions, critiques, and patches welcome! On 13/12/2021 06.58, Manuel Amador (Rudd-O) wrote: Hi folks. I wrote the Qubes shared folders service in an afternoon.  It is what it is -- useful, but not ideal. I've come up with a design for an improved version that I would like you

[qubes-devel] Design questions for the next steps of the Qubes shared folders service

2021-12-12 Thread Manuel Amador (Rudd-O)
Hi folks. I wrote the Qubes shared folders service in an afternoon.  It is what it is -- useful, but not ideal. I've come up with a design for an improved version that I would like you to review for correctness and to see if it could be implemented better.  I think this design has

[qubes-devel] ANN: ansible-qubes (bombshell-client and qubes-network-server now compatible with Qubes 4.1

2021-10-28 Thread Manuel Amador (Rudd-O)
Hello, kind folks! I am done making changes and testing the new releases of ansible-qubes (which includes bombshell-client to run shell commands across VMs) and Qubes network server.  The master branches of both projects are now compatible with Qubes 4.1 and work correctly as expected. *

Re: [qubes-devel] Contributing a SaltStack module for qvm-appmenus

2021-03-17 Thread Manuel Amador (Rudd-O)
Good point.  Syntax may actually be a dict instead of a list of enabled ones, with the values of the dict being booleans for configuring yes/no to the menu entry. -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group

Re: [qubes-devel] Google Summer of Code - Gnome dom0 project

2021-03-16 Thread Manuel Amador (Rudd-O)
Is there anything else you guys would recommend me to look at? Any resources? IIRC Mutter is programmable via JavaScript.  It should be doable to select a window border color by looking at the correct window manager hint and then telling Mutter to paint the border of a window a color that

Re: [qubes-devel] Qubes network server: 4.0 and beyond

2020-04-13 Thread Manuel Amador (Rudd-O)
Good news.  Branch * https://github.com/Rudd-O/qubes-network-server/tree/r4.0 is now updated to include the admin code as a dom0 add-on package, using the Qubes extension mechanisms. Please, please, help me with a review of the code! I will now close the pull requests I opened against the

Re: [qubes-devel] Qubes network server: 4.0 and beyond

2020-04-13 Thread Manuel Amador (Rudd-O)
On 14/04/2020 01.29, Marek Marczykowski-Górecki wrote: > > I see all you do is to react to some events and update qubesdb then. We > have specific API that allows you to do that from a 3rd-party extensions. > You can find documentation here (see also other about 'qubes' module, > but you got that

[qubes-devel] Qubes network server: 4.0 and beyond

2020-04-13 Thread Manuel Amador (Rudd-O)
Folks, Given my own need to update my own machines, I've updated the Qubes network server code to work with 4.0 (and, soon, beyond 4.0). Unlike the previous iteration (which used /qrexec/ to set things up in NetVMs and AppVMs), this code re-scopes the feature to be limited to network-exposing

Re: [qubes-devel] Re: Question about storage pool "file"

2019-06-26 Thread Manuel Amador (Rudd-O)
On 26/06/2019 09.50, Rusty Bird wrote: > > So this would not cause data loss. > > But there are bound to be some serious data loss bugs in 'file' - the > worst that I know of is that cloning or backing up a running VM will > likely result in corrupted data (in the destination), because those >

[qubes-devel] Question about storage pool "file"

2019-06-25 Thread Manuel Amador (Rudd-O)
Folks, I haven't been able to understand the codebase for the "file" storage pool very well. At which point in the lifetime of a VM do changes get merged down from the COW private.img to the base private img? If my machine crashes, what prevents the data in the COW private.img from being lost

Re: [qubes-devel] qvm-create behavior / VM prefs (4.0)

2018-05-05 Thread Manuel Amador (Rudd-O)
On 2018-04-23 10:41, Ivan Mitev wrote: > Hi, > > In 4.0, when creating an AppVM based on a TemplateVM, is it expected > that none of the new VM's prefs are copied from the template VM ? > > For instance: (test2 is a TemplateVM) > > qvm-prefs test2 kernel -> '' > qvm-prefs test2 virt_mode -> 'hvm'

[qubes-devel] Re: Changing qubes-core-admin license to LGPL v2.1+

2017-07-18 Thread Manuel Amador (Rudd-O)
Jasper Tron >- - Jeepler >- - Jon Griffiths >- - Mario Geckler >- - Michal Rostecki >- - Nicklaus McClendon >- - Olivier Médoc >- - o >- - Patrick Schleizer >- - Joonas Lehtonen >- - qubesuser >- - Manuel Amador (Rudd-O) >- - Rusty Bird >- - ttasket >- - Unman >

Re: [qubes-devel] Qubes 4.0 development status update

2016-12-04 Thread Manuel Amador (Rudd-O)
On 12/05/2016 02:50 AM, Marek Marczykowski-Górecki wrote: > > There are also still a couple of rough edges during installation/first > run. For > example "LVM thin" storage should be used, but currently it needs to be > selected manually (using custom partitioning option). And depending on > the

Re: [qubes-devel] 4.8.7 kernel in unstable repository

2016-11-20 Thread Manuel Amador (Rudd-O)
On 11/11/2016 11:57 PM, Trammell Hudson wrote: > On Sat, Nov 12, 2016 at 12:47:22AM +0100, Marek Marczykowski-Górecki wrote: >> [...] But in anyone need something newer than 4.4.x >> for some hardware support - here it is. > That's great -- I've been struggling to get the power consumption > on

Re: [qubes-devel] Running (or not) Xen during installation

2016-11-04 Thread Manuel Amador (Rudd-O)
On 11/04/2016 12:07 PM, Ivan wrote: > > > Seconded - there should really be a way to test hardware compatibility > before installing. A menu entry right under "Test and install the image" during the installer GRUB boot? That would be very nice, actually. Donno what the menu entry should do, but

Re: [qubes-devel] Running (or not) Xen during installation

2016-11-04 Thread Manuel Amador (Rudd-O)
On 11/03/2016 08:13 PM, Marek Marczykowski-Górecki wrote: > Hi, > [...] > So, now the question - do we want to keep launching Xen for > installation, or launch just plain Linux? You're asking us about something whose answer you already know. And we agree with you. If there is no security

Re: [qubes-devel] Extra partitions in /etc/crypttab in initramfs

2016-10-28 Thread Manuel Amador (Rudd-O)
On 10/28/2016 11:28 AM, Trammell Hudson wrote: > I'm not sure if this issue affects anyone else, but the /etc/crypttab in > initramfs does not have entries for extra partitions that were created > during installation. It only has / and swap. > > Since I'm configuring / to be read only, I have a

Re: [qubes-devel] ANN: git-remote-qubes: Inter-VM Git for Qubes OS

2016-10-28 Thread Manuel Amador (Rudd-O)
On 10/28/2016 01:48 PM, HW42 wrote: > Marek Marczykowski-Górecki: > [...] > > I see. The server part is much more critical, so it's ok to have as it > > is now. Actually my solution also pass the data manually on the > client side > > - but it uses "cat" for this: > > > (echo $GIT_EXT_SERVICE

Re: [qubes-devel] ANN: git-remote-qubes: Inter-VM Git for Qubes OS

2016-10-28 Thread Manuel Amador (Rudd-O)
On 10/28/2016 01:48 PM, HW42 wrote: > Marek Marczykowski-Górecki: > [...] > > I see. The server part is much more critical, so it's ok to have as it > > is now. Actually my solution also pass the data manually on the > client side > > - but it uses "cat" for this: > > > (echo $GIT_EXT_SERVICE

[qubes-devel] Re: ANN: git-remote-qubes: Inter-VM Git for Qubes OS

2016-10-28 Thread Manuel Amador (Rudd-O)
On 10/28/2016 10:51 AM, cyrinux wrote: > Le jeudi 27 octobre 2016 13:47:14 UTC+2, Manuel Amador (Rudd-O) a écrit : >> It gives me great pleasure to announce the inter-VM Git bridge for Qubes >> OS, which allows you to git push and git pull from VMs stored in other >> repo

Re: [qubes-devel] ANN: git-remote-qubes: Inter-VM Git for Qubes OS

2016-10-28 Thread Manuel Amador (Rudd-O)
On 10/28/2016 09:17 AM, Marek Marczykowski-Górecki wrote: > On Fri, Oct 28, 2016 at 04:56:36AM +0000, Manuel Amador (Rudd-O) wrote: > > On 10/27/2016 01:13 PM, Marek Marczykowski-Górecki wrote: > >> On Thu, Oct 27, 2016 at 11:47:04AM +0000, Manuel Amador (Rudd-O) wrote: >

Re: [qubes-devel] ANN: git-remote-qubes: Inter-VM Git for Qubes OS

2016-10-27 Thread Manuel Amador (Rudd-O)
On 10/27/2016 01:13 PM, Marek Marczykowski-Górecki wrote: > On Thu, Oct 27, 2016 at 11:47:04AM +0000, Manuel Amador (Rudd-O) wrote: > > It gives me great pleasure to announce the inter-VM Git bridge for Qubes > > OS, which allows you to git push and git pull from VMs stored in

[qubes-devel] Re: Automated tests results

2016-10-27 Thread Manuel Amador (Rudd-O)
On 10/27/2016 11:32 AM, Marek Marczykowski-Górecki wrote: > On Thu, Oct 27, 2016 at 01:31:21PM +0200, Marek Marczykowski-Górecki > wrote: > > Hi, > > > If anyone is curious, I've uploaded example test results: > > https://ftp.qubes-os.org/~marmarek/tests-r3.2-20161025.html > > and original text

[qubes-devel] Race condition in bootup

2016-10-12 Thread Manuel Amador (Rudd-O)
I filed a ticket about it a long time ago and then made a fix today: https://github.com/QubesOS/qubes-core-agent-linux/pull/20 -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group

[qubes-devel] ANN: Qubes network server

2016-10-11 Thread Manuel Amador (Rudd-O)
Folks, it gives me great pleasure to announce the product of over two years of work (primarily because I never paid enough attention to this project to bring it to completion): Qubes network server. The traditional Qubes OS networking model contemplates a client-only use case. User VMs (AppVMs or

[qubes-devel] Window border colors

2016-07-26 Thread Manuel Amador (Rudd-O)
Hello. I just did an update, rebooted, and now my window borders do not have the VM's colors. The prefix on the window title is correct tho. What gives? -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-devel" group.