Re: [qubes-users] Qubes VM compromised? - Follow up

2016-08-24 Thread johnyjukya
> My guess is that Paypal is giving you a hard time just because of the > tor exits you use to interact with their website. Could be. At first I didn't see how/why, but I guess refusing a legit password from what they judge as a dodgy IP address is a possibility. (Although accepting the password

Re: [qubes-users] Qubes VM compromised? - Follow up

2016-08-24 Thread johnyjukya
>> When I returned home, I tried logging in again, but from a different VM. >> Failed repeatedly. I figured I must have messed up the password. No >> luck >> trying other possibilities. I'm still a bit suspicious that one of my VM's has been compromised. I still saw password problems after rest

Re: [qubes-users] timesync on by default in debian-8 template (3.2-testing)

2016-08-24 Thread johnyjukya
I would say so, yes. I think exim, cups, and possibly some gvfs-samba thing were also all enabled on both the Fedora and debian-8 templates. I personally don't like having those on by default in all the VMs, listening on ports and poking around the network or Internet, as they really should only

Re: [qubes-users] Qubes VM compromised? - Follow up

2016-08-24 Thread johnyjukya
> When I returned home, I tried logging in again, but from a different VM. > Failed repeatedly. I figured I must have messed up the password. No luck > trying other possibilities. Update: a signed message from SIGAINT indicating it was a system problem: -BEGIN PGP SIGNED MESSAGE- Hash:

Re: [qubes-users] Qubes VM compromised?

2016-08-23 Thread johnyjukya
>> On 08/23/2016 06:01 PM, johnyju...@sigaint.org wrote: >>> Wow, what a weird day. >>> >>> A rather bizarre story, which is possibly a good example as to how >>> Qubes >>> can help protect you from hacking, or at least spot the effects of it. >> >> What threat model does this fit? If a skilled att

Re: [qubes-users] Qubes VM compromised?

2016-08-23 Thread johnyjukya
> On 08/23/2016 06:01 PM, johnyju...@sigaint.org wrote: >> Wow, what a weird day. >> >> A rather bizarre story, which is possibly a good example as to how Qubes >> can help protect you from hacking, or at least spot the effects of it. > > What threat model does this fit? If a skilled attacker trick

[qubes-users] Qubes VM compromised?

2016-08-23 Thread johnyjukya
Wow, what a weird day. A rather bizarre story, which is possibly a good example as to how Qubes can help protect you from hacking, or at least spot the effects of it. I use a sigaint address, because of a psycho ex and her corrupt cop buddies. Anyhow, I created another sigaint address today, to

Re: [qubes-users] Qubes for running virtual servers

2016-08-23 Thread johnyjukya
> How does Qubes perform as the host OS in a virtualised server environment? > > I'm thinking of a configuration where the host OS is Qubes with VM's > running for things like a virtualised email server, IDS server, perhaps a > Tor relay etc. I've used Qubes as a desktop host, I'm just curious abou

[qubes-users] Memory saving techniques

2016-08-23 Thread johnyjukya
I know I may be in the minority with an under-powered machine (4G), but I thought I'd share some tips for getting more room for additional AppVM's that worked well for me: I guess I should state that this really would "void your warrantee" and you shouldn't hassle the Qubes folks with problems you

Re: [qubes-users] vif in user ProxyVM?

2016-08-22 Thread johnyjukya
> On 08/22/2016 10:47 AM, johnyju...@sigaint.org wrote: >> I'm trying to create a ProxyVM of my own, to replace sys-firewall. >> >> I'm on 3.2rc2-testing. >> >> When I create a ProxyVM in either fedora23 or debian-8, eth0 shows up, >> but >> no vif interface appears. >> > > vif interfaces appear wh

Re: [qubes-users] /rw/config/rc.local on debian-8

2016-08-22 Thread johnyjukya
> On 2016-08-22 07:52, johnyju...@sigaint.org wrote: >> /rw/config/rc.local doesn't seem to be run on startup in debian-8 >> (3.2-testing). >> >> What is supposed to launch this? systemd, another startup script, or >> something dom0-related? >> >> I added "/rw/config/rc.local" to "/etc/rc.local" a

[qubes-users] timesync on by default in debian-8 template (3.2-testing)

2016-08-22 Thread johnyjukya
I notice in the debian-8 template that network time synchronization seems to be on by default in systemd. systemd-timesyncd.service loaded active running Network Time Synchronization time-sync.target loaded active activeSystem Time Synchronized It's disabled in fedora-23 by defau

Re: [qubes-users] Oddness in sys-net's VIF startup

2016-08-22 Thread johnyjukya
> In trying to figure out why my ProxyVM has no VIF (on Qubes 3.2-testing) I > was looking at the dmesg's of the servicevm's, and noticed something that > looked a bit odd (running rapidly through vif interface #'s) in sys-net > (fedora23 template). > Similarly, iptables-save shows duplicate rules

Re: [qubes-users] Screen corruption on nvidia

2016-08-22 Thread johnyjukya
> Added testing repos to (clones of) debian-23 and debian-8 templates (as > well as whonix-gw/whonix-ws), did upgrades/dist-updates, restarted, loaded > up a bunch of AppVM's, and have been pounding on things awhile. > > No sign of screen garbage yet! :) > > Looks promising. Day 3 of banging on r

[qubes-users] Oddness in sys-net's VIF startup

2016-08-22 Thread johnyjukya
In trying to figure out why my ProxyVM has no VIF (on Qubes 3.2-testing) I was looking at the dmesg's of the servicevm's, and noticed something that looked a bit odd (running rapidly through vif interface #'s) in sys-net (fedora23 template). Is this normal?: [ 42.978214] IPv6: ADDRCONF(NETDEV_U

[qubes-users] vif in user ProxyVM?

2016-08-22 Thread johnyjukya
I'm trying to create a ProxyVM of my own, to replace sys-firewall. I'm on 3.2rc2-testing. When I create a ProxyVM in either fedora23 or debian-8, eth0 shows up, but no vif interface appears. There are iptables entries for 10.137.4.*, so the firewall mechanism seems to be doing (part of) it's thi

[qubes-users] /rw/config/rc.local on debian-8

2016-08-22 Thread johnyjukya
/rw/config/rc.local doesn't seem to be run on startup in debian-8 (3.2-testing). What is supposed to launch this? systemd, another startup script, or something dom0-related? I added "/rw/config/rc.local" to "/etc/rc.local" and it works, but was wondering what might be the official way to do this

Re: [qubes-users] Re: Android Emulator

2016-08-21 Thread johnyjukya
> On Friday, August 5, 2016 at 1:52:12 AM UTC+8, Torsten Grote wrote: >> I tried it now and it works, but is barely usable, because it is >> very(!!!) slow. On top of running ARM emulation in an AppVM, I needed to >> turn on software graphic rendering, because hardware rendering didn't >> work. > >

Re: [qubes-users] Screen corruption on nvidia

2016-08-20 Thread johnyjukya
> I see the updated packages are for qubes-gui-agent's in the fedora/debian > templates. Will grab those, fire up several AppVM's, and see if things > improve. Added testing repos to (clones of) debian-23 and debian-8 templates (as well as whonix-gw/whonix-ws), did upgrades/dist-updates, restarte

Re: [qubes-users] Screen corruption on nvidia

2016-08-19 Thread johnyjukya
>> Several packages were recently pushed to testing repos (see >> qubes-buider-github comments on the issue). Have you had a chance to try >> those? > > Cool, I will grab the latest qubes-gui-vm from current-testing and see if > that helps. Sorry, that was phrased wrong, and I hate to add any conf

Re: [qubes-users] qvm-run only available from dom0?

2016-08-19 Thread johnyjukya
> On 2016-08-19 05:11, johnyju...@sigaint.org wrote: >> When I try to run qvm-run from within an AppVM, I get "Request refused." >> >> Is this by design, for security reasons? If so, I guess that's >> perfectly >> reasonable. I just don't see that fact documented anywhere. >> > > Yes, but it's co

Re: [qubes-users] USB Root Drive Corruption - Solved???

2016-08-19 Thread johnyjukya
>> This problem persists in 3.2rc2. >> >> (And I get 0 errors on the same USB drive under Tails. When I can find >> the SATA power connector around here somewhere, I'll try moving the >> drive >> direct onto the SATA bus.) > > I think the problem *may* be that systemd has a default 90 second timeo

[qubes-users] Clipboard

2016-08-19 Thread johnyjukya
Is there any qvm-* command, or other method, to programmatically copy to the qubes clipboard? (Similar to my last question, a perfectly reasonable answer might be "of course not, are you crazy?" due to security concerns. Requiring explicit dom0/GUI user interaction for clipboard manipulation seem

[qubes-users] qvm-run only available from dom0?

2016-08-19 Thread johnyjukya
When I try to run qvm-run from within an AppVM, I get "Request refused." Is this by design, for security reasons? If so, I guess that's perfectly reasonable. I just don't see that fact documented anywhere. (The demonstration of one of the Xen exploits executes a qvm-run of xcalc in dom0 from an

Re: [qubes-users] USB Root Drive Corruption

2016-08-19 Thread johnyjukya
> This problem persists in 3.2rc2. > > (And I get 0 errors on the same USB drive under Tails. When I can find > the SATA power connector around here somewhere, I'll try moving the drive > direct onto the SATA bus.) I think the problem *may* be that systemd has a default 90 second timeout on jobs,

Re: [qubes-users] Screen corruption on nvidia

2016-08-19 Thread johnyjukya
However, under Qubes, I experience random screen corruption. See: https://i.imgur.com/ovEFgYO.png > This problem persists in 3.2rc2. > > JJ Actually, just FYI, the behavior seems to be a lot better under 3.2rc2. I've only seen it a couple of times, versus seeing it consistently un

Re: [qubes-users] Screen corruption on nvidia

2016-08-18 Thread johnyjukya
This problem persists in 3.2rc2. JJ >>> However, under Qubes, I experience random screen corruption. >>> >>> See: https://i.imgur.com/ovEFgYO.png > >> Looks like it could be this issue: >> >> https://github.com/QubesOS/qubes-issues/issues/1028 >> >> As you can see from the qubes-builder-github co

[qubes-users] Qubes 4.0 Hardware Requirements

2016-08-18 Thread johnyjukya
The Qubes security team has written: > Consequently, we have decided to move to hardware memory > virtualization for the upcoming Qubes 4.0 release [4]. And Joanna has written: > For Qubes 4 we want to move away from using PV as the default > method of virtualization in favor of using hw-aided (

Re: [qubes-users] USB Root Drive Corruption

2016-08-18 Thread johnyjukya
This problem persists in 3.2rc2. (And I get 0 errors on the same USB drive under Tails. When I can find the SATA power connector around here somewhere, I'll try moving the drive direct onto the SATA bus.) > Thanks for the feedback. The fact USB is a bad idea all around for > security (and poten

Re: [qubes-users] Re: installing Signal on Qubes mini-HOWTO

2016-08-17 Thread johnyjukya
On the Signal matter, just some personal paranoia Re: Signal and Google Play Services: I've been the subject of some rather intense and ongoing hacking (iPhone, iPad, Android phone/tablet, PC, MacBook, cable modem connection, you name it). On the Android phone, I wiped it several times, and switc

Re: [qubes-users] USB Root Drive Corruption

2016-08-17 Thread johnyjukya
Thanks for the feedback. The fact USB is a bad idea all around for security (and potentially stability), and the fact I was getting minor corruption, should have been a warning to me to move the drive right onto the SATA bus, rather than risking worse corruption. I guess I only have myself to bla

Re: [qubes-users] USB Root Drive Corruption

2016-08-17 Thread johnyjukya
Well, my wild enthusiasm with Qubes has turned into complete frustration and exasperation this morning. The "mild" corruption I was seeing on boot (running Qubes from a USB 2.5" HD) wasn't quite so mild the last time I booted. This time, rather than "recovering journal... done," the fsck spewed m

[qubes-users] Service VM Size, Memory, Security

2016-08-16 Thread johnyjukya
One of the banes of a Qubes addict's existence is memory. Too many times I see that red stop sign and breathe a sigh of frustration, that I need to shut down or mem-set other VM's to start up another AppVM. I like my VM separation, dammit, which means lots of VMs. In a perfect world, I'd have a

Re: [qubes-users] Screen corruption on nvidia

2016-08-16 Thread johnyjukya
>> However, under Qubes, I experience random screen corruption. >> >> See: https://i.imgur.com/ovEFgYO.png > Looks like it could be this issue: > > https://github.com/QubesOS/qubes-issues/issues/1028 > > As you can see from the qubes-builder-github comments, some patches for > this > are already i

[qubes-users] Screen corruption on nvidia

2016-08-15 Thread johnyjukya
I realize that nVidia's aren't the preferred video card, but (being divorce-poor) one sometimes has to make do with what one has. :) With my on-board nVidia (GeForce7100) and the nouveau driver (on both Tails and Qubes), things work okay, then suddenly at some random point the screen gets filled

Re: [qubes-users] Updates Proxy a security Risk?

2016-08-13 Thread johnyjukya
>> Say you have a VM (e.g. "Banking only"), which has a NetVM of >> sys-firewall, >> but for which you have disallowed or greatly restricted networking, >> turned >> off DNS and ICMP, but left on "allow connection to updates proxy." >> > > That box should be unchecked by default in AppVMs and check

[qubes-users] USB Root Drive Corruption

2016-08-12 Thread johnyjukya
I realize USB drives (or USB *anything*) is a stupid, stupid idea when it comes to being security conscious, but while trying out Qubes, I do have my root drive on an external USB HD. (And there's something to be said for taking your drive with you.) It works great in general, is fast enough, and

[qubes-users] Updates Proxy a security Risk?

2016-08-12 Thread johnyjukya
Greetings, Qubers. Say you have a VM (e.g. "Banking only"), which has a NetVM of sys-firewall, but for which you have disallowed or greatly restricted networking, turned off DNS and ICMP, but left on "allow connection to updates proxy." As I understand it, this creates rules in sys-firewall to en

<    1   2