Re: [qubes-devel] Why no arm64 support?

2022-11-11 Thread Holger Levsen
On Wed, Nov 02, 2022 at 10:44:11AM +0100, Michal Suchánek wrote: > why is Qubes limited to x86? [...] > arm64 on the other hand does have Xen port already. a.) because this is a rather recent thing and > So is tehre anything actually blocking running Qubes on non-x86? b.) someone (tm) has to

Re: [qubes-devel] qubes-mirage-firewall template

2022-09-01 Thread Holger Levsen
On Wed, Aug 31, 2022 at 06:02:23PM -0400, Demi Marie Obenour wrote: > I hope so too, and I would like it to become fast enough to be the > default. I have the same concern. On slow computers (eg x230) it's not only slow but might also be using one cpu 100% -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀

Re: [qubes-devel] Why code review is hard

2022-02-13 Thread Holger Levsen
On Sun, Feb 13, 2022 at 11:52:53AM +0100, David Hobach wrote: > I never stated it is. It was just a general comment on code review and > bash in specific - especially since I'm aware that Qubes has a lot of > bash in sometimes security relevant places (qubes-dom0-update, qubes-rpc, > ...). ah,

Re: [qubes-devel] Why code review is hard

2022-02-13 Thread Holger Levsen
On Sat, Feb 12, 2022 at 01:03:35PM +0100, David Hobach wrote: > just stumbled across it and was wondering what a reviewer would expect from > this code to do: [...] > At least on my amchine it executes "badCode" in both domU and dom0. I might miss where you stumbled upon this, but how is this

Re: [qubes-devel] systemd rescue mode vs qubes root account locked

2022-02-08 Thread Holger Levsen
On Tue, Feb 08, 2022 at 03:29:04AM +0100, Marek Marczykowski-Górecki wrote: > Generally, booting the installer is more reliable in some cases, since > it doesn't rely on dom0 being in any usable state. right. > But since that may be > inconvenient at times, you can get shell in initramfs using

[qubes-devel] systemd rescue mode vs qubes root account locked

2022-02-07 Thread Holger Levsen
hi, recently I had some hw issues which I needed to debug so I tried booting with systemd rescue mode (by appending systemd.unit=rescue.target to the kernel cmdline) but that failed because the root account is locked on Qubes. So I'm wondering what is the recommended resuce mode for Qubes?

Re: [qubes-users] Re: [qubes-devel] QubesOS weekly builds

2021-03-31 Thread Holger Levsen
On Wed, Mar 31, 2021 at 10:13:49AM +0200, Frédéric Pierret wrote: > > I guess you have ran diffoscope on two builds, how is the result? Do you > > already have this in CI too? (this is for testing for reproducible > > builds...) > Not yet but I've discussed few days ago with Marek on how to do

Re: [qubes-devel] QubesOS weekly builds

2021-03-30 Thread Holger Levsen
Hi Frédéric, On Sun, Mar 21, 2021 at 11:33:05PM +0100, Frédéric Pierret wrote: > Due to recent troubles with kernels 5.4.X and 5.10.X, I've decided to add > again to this weekly pipeline, the build of a fresh Qubes R4.1 ISO. I don't > build any package or any template. It uses only Qubes OS

Re: [qubes-devel] Signed repository metadata and untrusted templates

2020-07-27 Thread Holger Levsen
On Mon, Jul 27, 2020 at 04:04:07AM +0200, Marek Marczykowski-Górecki wrote: > > If I recall correctly, they use signatures on *source* packages, > > but not on *binary* packages. > Yes. And those formats are completely different. well. technically, signed .changes files are uploaded, these

Re: [qubes-devel] Re: [qubes-project] RFC Offline Documentation

2020-05-29 Thread Holger Levsen
On Fri, May 29, 2020 at 09:33:24AM +, tetrahedra via qubes-devel wrote: > I find the markdown files are human-readable enough for troubleshooting > purposes that I can just read them with vim. same here. -- cheers, Holger

[qubes-devel] Re: DNF for Debian

2020-05-29 Thread Holger Levsen
hi Mihai, On Fri, May 29, 2020 at 12:17:13PM +0200, Mihai Moldovan wrote: > Sorry for the late response. I've been busy, and, honestly, also always forgot > to actually answer. thanks for your reply & don't worry, this happens often & to many people, me included. > unman seems to be

Re: [qubes-devel] Re: DNF for Debian

2020-05-26 Thread Holger Levsen
Hi unman, On Sun, May 03, 2020 at 05:07:14PM +0100, unman wrote: > I'd be happy to take on maintenance of this package, and may be anything > else that's Qubes required but seems to be lapsing in Debian. cool. I'll be happy to review & sponsor these uploads to Debian! > Also, I wonder if there

[qubes-devel] Re: DNF for Debian

2020-05-03 Thread Holger Levsen
Hi Mihai, On Fri, Sep 13, 2019 at 05:36:55PM +0200, Mihai Moldovan wrote: > I've packaged DNF cool! > for Debian and would like to find someone to take over these > packages and maintain them as part of the distribution. > > I'm not a DD and while I believe the packages to be of reasonable if

Re: [qubes-devel] New page with packages status

2019-03-31 Thread Holger Levsen
On Wed, Mar 20, 2019 at 01:57:47AM +0100, Marek Marczykowski-Górecki wrote: > https://ftp.qubes-os.org/~qubesosbot/status.html > It's updated daily. very nice, thank you! :) -- tschau, Holger ---

Re: [qubes-devel] More regular point releases schedule?

2019-02-06 Thread Holger Levsen
On Wed, Feb 06, 2019 at 05:54:29PM +0100, Marek Marczykowski-Górecki wrote: > It may be a good idea to introduce regular schedule for stable [point > releases[1]. It would minimize the need to download a lot of updates > just after installation. This is even more significant, if some updates > may

Re: [qubes-devel] ANN: Fast incremental backups project

2018-12-23 Thread Holger Levsen
On Sun, Dec 23, 2018 at 02:48:55AM +0100, Marek Marczykowski-Górecki wrote: > Also note that we'd like to have at least some level of hiding metadata > - like VM names (leaked through file names). I think it would be nice if this was an optional feature (on by default), as I find it super

[qubes-devel] Re: [qubes-users] Whonix support ending for Qubes 3.2

2018-10-06 Thread Holger Levsen
On Fri, Oct 05, 2018 at 10:26:18PM -0500, Andrew David Wong wrote: > the Qubes OS > Project will continue to support Qubes 3.2 as planned until 2019-03-28. [6] thank you, Qubes OS! > [...] Users who decide to continue using Whonix on Qubes 3.2 do so > at their own risk. this has been the case

Re: [qubes-devel] Whonix version support policy

2018-09-14 Thread Holger Levsen
On Thu, Sep 13, 2018 at 09:00:40PM -0500, Andrew David Wong wrote: > * One month after a new stable version of Qubes OS is released, Whonix >TemplateVMs will no longer be supported on any older version of Qubes >OS. I'm quite disappointed by this. -- cheers, Holger

Re: [qubes-devel] Qubes 3.2.1 ISO size

2018-09-13 Thread Holger Levsen
On Thu, Sep 13, 2018 at 12:58:20AM +0200, Marek Marczykowski-Górecki wrote: > The alternative would be releasing Qubes 3.2.1 as is, adding a note that > single-layer DVD is not enough for installation. Since this release is > looong overdue, I tend to this option, but want to hear opinions of >

Re: [qubes-devel] Fedora 26 and Debian 8 approaching EOL

2018-05-25 Thread Holger Levsen
On Thu, May 24, 2018 at 07:29:18PM -0500, Andrew David Wong wrote: > Thank you for the correction. I've updated the announcement on the > website to clarify this: > https://github.com/QubesOS/qubes-posts/commit/3db9a35e297b3defa0863f8ab02ebd56e8384053 thank you, looks good! -- cheers,

Re: [qubes-devel] PSA: keep your code signing keys inaccessible to email clients

2018-05-14 Thread Holger Levsen
On Mon, May 14, 2018 at 11:30:09AM -0400, Jean-Philippe Ouellet wrote: > On Mon, May 14, 2018 at 11:26 AM, Holger Levsen <hol...@layer-acht.org> wrote: > > On Mon, May 14, 2018 at 11:20:29AM -0400, Jean-Philippe Ouellet wrote: > >> The immediate impact on Qubes developer

Re: [qubes-devel] problems when upgrading to qubes-core-agent_3.2.25-1+deb9u1

2018-03-12 Thread Holger Levsen
On Mon, Mar 12, 2018 at 08:43:47PM +0100, Marek Marczykowski-Górecki wrote: > Hmm, indeed something is not right. But since the removal failed, it > should be safe... "should"... > What was your previous qubes-core-agent package version? 3.2.22-1+deb9u1 > > and the missing dconf commands feels

[qubes-devel] problems when upgrading to qubes-core-agent_3.2.25-1+deb9u1

2018-03-12 Thread Holger Levsen
hi, I just upgraded my 3.2 installation and on Debian 9 templates I saw this: Preparing to unpack .../qubes-core-agent_3.2.25-1+deb9u1_amd64.deb ... Unpacking qubes-core-agent (3.2.25-1+deb9u1) over (3.2.22-1+deb9u1) ... dpkg: warning: unable to delete old directory '/var/run/qubes': Directory

Re: [qubes-devel] Re: Qubes OS 4.0-rc3 has been released!

2018-01-24 Thread Holger Levsen
On Wed, Jan 24, 2018 at 04:29:14PM +0100, Marek Marczykowski-Górecki wrote: > On Wed, Jan 24, 2018 at 06:35:15AM -0800, joeh9...@gmail.com wrote: > > Hi, this is in no way meant to appear impatience but I'm going to install > > Qubes OS on my new laptop (Lenovo P71) and am just wondering whether

Re: [qubes-devel] Qubes Air's usefulness

2018-01-23 Thread Holger Levsen
On Tue, Jan 23, 2018 at 02:47:30PM +0100, 'Tom Zander' via qubes-devel wrote: > On Tuesday, 23 January 2018 03:13:17 CET Kelly Dean wrote: > > If a user needs Qubes, that means he needs more security than a > > conventional OS gives. > I'd like to challange that assumption. me too. Qubes is

Re: [qubes-devel] solved: gnome-terminal in disposable VMs closes prematurely

2018-01-18 Thread Holger Levsen
On Thu, Jan 18, 2018 at 03:16:26PM +0100, Marek Marczykowski-Górecki wrote: > Let me try (on f26): > $ sakura hmpf. I've only tried in on f25… (IOW: still using xterm in dom0 as less is more there.) -- cheers, Holger -- You received this message because you are subscribed to the

Re: [qubes-devel] solved: gnome-terminal in disposable VMs closes prematurely

2018-01-18 Thread Holger Levsen
On Thu, Jan 18, 2018 at 02:58:14PM +0100, 'Tom Zander' via qubes-devel wrote: > Thats rather unfortunate, I would suggest trying Konsole as an alternative, I found "sakura" to be much more lightweight and still supporting font-resizing with ctrl+(plus|minus) by default. It's also available on

Re: [qubes-devel] Upgrade instructions for R3.2 and QSB37 patches

2018-01-15 Thread Holger Levsen
On Sun, Jan 14, 2018 at 04:28:49PM -0600, Andrew David Wong wrote: > I agree that: > > 1. We should keep our promise to support R3.2 for a full year after the >release of R4.0 stable. > > 2. We should not force R3.2 users to install an upgrade that may break >their stable installations.

Re: [qubes-devel] Difference between PVH and PVHVM

2017-12-16 Thread Holger Levsen
On Mon, Dec 11, 2017 at 12:45:34PM -0500, Jean-Philippe Ouellet wrote: > Marmarek or HW42 could probably give you better answers, but the > following is my understanding: > > The terminology is admittedly somewhat confusing, especially since Xen > people no longer talk about a discrete set of

Re: [qubes-devel] Re: Template's root volume partition table in Qubes 4.0 - dalaying rc2 one more week

2017-10-16 Thread Holger Levsen
On Mon, Oct 16, 2017 at 03:45:24PM +0200, Marek Marczykowski-Górecki wrote: > Given those two options, we've decided it's better to have cleaner > situation longterm (option 2) at the cost of less convenient rc stage, > than the other way around. After all, we'll need to support this for a > much

Re: [qubes-devel] Re: Qubes 3.2 Kernel 4.12

2017-08-26 Thread Holger Levsen
On Fri, Aug 25, 2017 at 09:16:07PM +0200, Marek Marczykowski-Górecki wrote: > I see a few options for this problem: > > 1. Use "unstable" repository for non-longterm kernels. We've done this > before, for 4.8 kernels. [...] Or create new repository specifically for > non-longterm kernels. I like

Re: [qubes-devel] Qubes Security Bulletin #32: Xen hypervisor and Linux kernel vulnerabilities (XSA-226 through XSA-230)

2017-08-15 Thread Holger Levsen
On Tue, Aug 15, 2017 at 04:05:27PM +0200, Marek Marczykowski-Górecki wrote: > Actually: > sudo qubes-dom0-update --enablerepo=qubes-dom0-security-testing q.e.d. & thanks! -- cheers, Holger -- You received this message because you are subscribed to the Google Groups "qubes-devel"

Re: [qubes-devel] Qubes Security Bulletin #32: Xen hypervisor and Linux kernel vulnerabilities (XSA-226 through XSA-230)

2017-08-15 Thread Holger Levsen
Hi, first of all: thanks for this handling this update! On Tue, Aug 15, 2017 at 08:31:31AM -0500, Andrew David Wong wrote: > Patching > = [...] > The packages are to be installed in dom0 via the qubes-dom0-update command or > via the Qubes VM Manager. A system restart will be required

Re: [qubes-devel] Re: 3.2.1 should be released

2017-06-19 Thread Holger Levsen
On Mon, Jun 19, 2017 at 09:30:37AM +0200, Marek Marczykowski-Górecki wrote: > > > As for Qubes 3.2.1 - exactly as Reg said - it's blocked on 4.9 kernel > > > testing. > > does it not make sense to anyone else that at the least the testing > > image should also be released to get more eyes on it

Re: [qubes-devel] Re: qubes-core-agent package split

2017-05-30 Thread Holger Levsen
On Tue, May 30, 2017 at 02:21:57AM +0200, Marek Marczykowski-Górecki wrote: > > > Package: qubes-core-agent-network > > > Package: qubes-core-agent-network-manager > > maybe qubes-core-agent-network_ing_(-support) and > > qubes-core-agent-network-manager? > Those names are long enough

Re: [qubes-devel] Re: qubes-core-agent package split

2017-05-29 Thread Holger Levsen
On Mon, May 29, 2017 at 07:30:04AM +0200, Marek Marczykowski-Górecki wrote: > > > > While at it - is it better to name it qubes-nautilus or > > > > qubes-core-agent-nautilus? > > > > > > I think the latter is definitly better than the former, but maybe > > > rather

[qubes-devel] Re: qubes-core-agent package split

2017-05-22 Thread Holger Levsen
Hi Marek, sorry for the late reply… On Mon, Apr 24, 2017 at 02:08:39AM +0200, Marek Marczykowski-Górecki wrote: > Currently the package in title is "everything but the kitchen sink" type > of package. It contains at least: > > - qrexec-agent > - all kind of qrexec services (file copy, etc) >

Re: [qubes-devel] Qubes packages updates, what has changed?

2017-03-21 Thread Holger Levsen
Hi Marek, sorry for the late reply, your replies often include lots of data to process… that's awesome just sometimes hard to find the time to :) Thanks a lot for all this information! On Tue, Mar 07, 2017 at 12:36:17AM +0100, Marek Marczykowski-Górecki wrote: > Yes, we currently do not fill

[qubes-devel] Qubes packages updates, what has changed?

2017-03-06 Thread Holger Levsen
Hi, I just did a dom0 upgrade and was offered to update qubes-gui-dom0 to version 3.2.9-1.fc23, however when I clicked on "package changelog" in yum-extender the changelog was empty. This has happened before… So I'm wondering: how can I find out, what has changed and why does Qubes 3.2 receive

Re: [qubes-devel] [RFC] Keyboard shortcuts for qubes-manager

2016-12-20 Thread Holger Levsen
On Tue, Dec 20, 2016 at 03:15:29PM -0500, Jean-Philippe Ouellet wrote: > > CTRL-Shift-K maybe? > Is this because you are worried about accidental use? Or some other reason. yes > We already do have a confirmation dialog before a VM is actually > killed, keyboard shortcut or not. I was aware

Re: [qubes-devel] [RFC] Keyboard shortcuts for qubes-manager

2016-12-20 Thread Holger Levsen
Hi, first of all: yay, keyboard shortcuts! Thanks for your work on this! two minor comments: On Tue, Dec 20, 2016 at 02:31:13PM -0500, Jean-Philippe Ouellet wrote: > 3. Ctrl+C for Clone, because Clone and Copy start with C > Ctrl+Shift+N may also be a good candidate here, idk. CTRL-C is

Re: [qubes-devel] Qubes 4.0 development status update

2016-12-05 Thread Holger Levsen
Hi Marek, thanks for sharing this information. I found it quite interesting! (and wouldnt mind to see such posts every 3 months or so…) -- cheers, Holger -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group

[qubes-devel] Bug#837910: ITP: qubes-gui-daemon -- Qubes GUI daemon

2016-09-15 Thread Holger Levsen
Package: wnpp Severity: wishlist Owner: Holger Levsen <hol...@layer-acht.org> * Package name: qubes-gui-daemon Upstream Author : Joanna Rutkowska <joa...@invisiblethingslab.com> * URL : https://github.com/QubesOS/qubes-gui-daemon.git * License : GPL2+ Prog

[qubes-devel] Bug#837908: ITP: qubes-gui-common -- Common files for Qubes GUI - protocol headers

2016-09-15 Thread Holger Levsen
Package: wnpp Severity: wishlist Owner: Holger Levsen <hol...@layer-acht.org> * Package name: qubes-gui-common * Upstream Author : Joanna Rutkowska <joa...@invisiblethingslab.com> Rafal Wojtczuk <ra...@invisiblethingslab.com> Marek M

[qubes-devel] Bug#837906: ITP: qubes-gui-agent -- Qubes GUI Agent for VMs

2016-09-15 Thread Holger Levsen
Package: wnpp Severity: wishlist Owner: Holger Levsen <hol...@layer-acht.org> * Package name: qubes-gui-agent Upstream Author : Joanna Rutkowska <joa...@invisiblethingslab.com> * URL : https://github.com/QubesOS/qubes-gui-agent-linux.git * License : GPL2+

[qubes-devel] Bug#837905: ITP: libvchan-xen-qubes -- Qubes vchan libraries

2016-09-15 Thread Holger Levsen
Package: wnpp Severity: wishlist Owner: Holger Levsen <hol...@layer-acht.org> * Package name: libvchan-xen-qubes Upstream Author : Joanna Rutkowska <joa...@invisiblethingslab.com> Rafal Wojtczuk <ra...@invisiblethingslab.com>

[qubes-devel] Bug#837902: ITP: qubes-core-agent -- The Qubes core files for VMs

2016-09-15 Thread Holger Levsen
Package: wnpp Severity: wishlist Owner: Holger Levsen <hol...@layer-acht.org> * Package name: qubes-core-agent Upstream Author : Joanna Rutkowska <joa...@invisiblethingslab.com> Rafal Wojtczuk <ra...@invisiblethingslab.com> * URL : https://

[qubes-devel] Bug#837900: ITP: qubes-core-admin-linux -- Linux-specific files for Qubes dom0

2016-09-15 Thread Holger Levsen
Package: wnpp Severity: wishlist Owner: Holger Levsen <hol...@layer-acht.org> * Package name: qubes-core-admin-linux Upstream Author : Marek Marczykowski <marma...@invisiblethingslab.com> * URL : https://github.com/QubesOS/qubes-core-admin-linux.git * License

[qubes-devel] Bug#837896: ITP: qubes-core-admin -- The Qubes core files (Dom0-side)

2016-09-15 Thread Holger Levsen
Package: wnpp Severity: wishlist Owner: Holger Levsen <hol...@layer-acht.org> * Package name: qubes-core-admin Upstream Author : Joanna Rutkowska <joa...@invisiblethingslab.com> Rafal Wojtczuk <ra...@invisiblethingslab.com> * URL : https://

[qubes-devel] Bug#827108: yum: please include --downloadonly patch from upstream

2016-06-12 Thread Holger Levsen
Package: yum Version: 3.4.3-3 Severity: wishlist Hi, to be able to use Debian for sys-firewall VM of Qubes-OS.org yum needs to support the --downloadonly option, which it currently does not. Fedora has version 3.4.3-507 so it seems this functionality was added via a patch. It would be great if

Re: [qubes-devel] Re: Reinitialize Templates

2016-06-12 Thread Holger Levsen
On Sun, Jun 12, 2016 at 01:01:00PM +0200, Marek Marczykowski-Górecki wrote: > > what version of yum is needed? Debian indeed has only 3.4.3-3, even in > > unstable :/ > Hmm, Fedora has 3.4.3-507, so I'm afraid --downloadonly option is added > only in some Fedora local patch :/ hmpf. if that