Re: [qubes-users] USB drive attaches but doesn't display in Nautilus

2018-08-28 Thread Ward Family
Also tried attaching the partition with the same result. It's still saying
that

"special device /dev/xvdi does not exist" (or xvdi1 as the case may be)

This recurs across a variety of usb external devices, including those
without partitions.

On Mon, Aug 27, 2018 at 8:10 AM awokd  wrote:

> On Mon, August 27, 2018 11:35 am, Ward Family wrote:
> > Using fdisk -l in sys-usb (prior to attaching elswhere) produces:
> > Disk /dev/sda: 28.7 GiB, 3075200 bytes, 60062500 sectors
> > Units: sectors of 1 * 512 = 512 bytes
> > Sector size (logical/physical): 512 bytes / 512 bytes
> > I/O size (minimum/optimal): 512 bytes / 512 bytes
> > Disklabel type: dos
> > Disk identifier: 0x
> >
> >
> > Device Boot Start   End  Sectors Size  Id
> > Type
> > /dev/sda132   60062499   60062468   28.7G   c   W95
> > FAT32   (LBA)
>
> That looks normal. Try attaching just the partition instead:
> qvm-block attach usb1 sys-usb:sda1
>
> Attaching the whole device might have resulted in the partition ending up
> on /dev/xvdi1 instead. Running qvm-block by itself after the attach should
> tell you what device it's on.
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJx9ZAFgMNVyN8UkamQNmSDE8Pe2E6hm%2BPabFQYuAn1H%3D-yD5A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] quality/reliability of ZFS in Qubes 4

2018-08-28 Thread chrisrowlands01
Hello,

I did search before posting this, and did see some limited references to ZFS in 
specific cases, but not a clear answer to this general question, so here goes;

I'm wondering, how is ZFS support in Qubes as of 4.0?  That is, once it's set 
up properly, can I expect it to run about as fast and/or reliably as it would 
on any other Linux system with appropriate hardware?

I have a zpool for user data set up on a machine whose OS I'm looking to 
convert to Qubes, and I want to know whether there are any serious stability or 
compatibility issues I should be aware of going in, especially since Qubes adds 
all the complexity of its' various virtualization mechanisms on top of an 
already exceptionally complicated filesystem.  (I'm planning to install Qubes 
itself on a SSD in EXT4.)

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a237c61b-ffab-4ee7-b501-601f560dcf32%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to cache these disk reads done by the likes of [14.xvda-0]

2018-08-28 Thread Marcus Linsner
How to cache these disk reads that are reported by `sudo iotop` on dom0 as:

Total DISK READ : 188.51 M/s | Total DISK WRITE :   0.00 B/s
Actual DISK READ: 188.92 M/s | Actual DISK WRITE:   0.00 B/s
  TID  PRIO  USER DISK READ  DISK WRITE  SWAPIN IO>COMMAND  

13206 be/4 root   51.63 M/s0.00 B/s  0.00 %  0.00 % [14.xvda-0]
13207 be/4 root   54.63 M/s0.00 B/s  0.00 %  0.00 % [14.xvda-1]
13209 be/4 root   49.11 M/s0.00 B/s  0.00 %  0.00 % [14.xvda-3]
13208 be/4 root   33.13 M/s0.00 B/s  0.00 %  0.00 % [14.xvda-2]

What's happening here is that some qube(Fedora 28 AppVM) is under memory 
pressure (/about to run out of memory) and due to how lame kernel is handling 
that, it does a lot of uncached reads(for whatever reason - yet to be fully 
determined) well before the in-AppVM Linux kernel OOM-killer triggers to kill 
the process using most RAM. This effectively freezes everything in that AppVM 
(none of the windows(like terminals) get updated, it can be 
Paused/Resumed/Killed from Qube Manager though). This goes on for plenty of 
minutes, I've yet to see it trigger the OOM-killer. (unless I use 12000MB RAM 
instead of 4000MB, then I can Pause/Unpause several times and it triggers; but 
never with 4000MB)

So I figure, if, even temporarily, Xen (or what? probably not dom0) would be 
able to cache these reads that the AppVM is doing (rather than count on that 
VM's OS to cache the reads(which it can no longer do when under memory 
pressure) then that out of memory point (inside that AppVM) would be reached 
sooner and hopefully no AppVM OS freeze would be seen.
Is it possible? How?

Side question: how can I send eg. sysrq+m to a qube? (seems not possible 
according to this 2016 post https://phabricator.whonix.org/T553#10438 ? )

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/709b48c4-0b72-4674-b27c-40e7fc2736c4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Luks with yubikey + aem

2018-08-28 Thread Joe
On Sunday, 17 January 2016 10:51:28 UTC-5, Marek Marczykowski-Górecki  wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Thu, Jan 07, 2016 at 01:25:10PM +, Rusty Bird wrote:
> > Rusty Bird:
> > > - To protect the LUKS key with "something you have" -- the AEM
> > > stick -- we could add a secret.luks.encrypted file, which holds the
> > > actual LUKS passphrase (not usually typed in during boot, only when
> > > unsealing fails due to upgrades), symmetrically encrypted with
> > > another passphrase.
> > 
> > Ugh, this doesn't prevent a multi-stage attack:
> > 
> > 1. the attacker visually captures the disk passphrase during a
> > successful boot
> > 2. later, they take a copy of the encrypted disk and infect the system
> > 3. later, the user attaches the AEM stick and boots; the infected
> > system copies secret.luks.encrypted.sealed somewhere -- cue scary
> > music as STATEFULNESS reveals itself from the shadows yet again; now
> > the user notices the failed unseal
> 
> And this is great thing about YubiKey - you can't easily copy it.
> Otherwise yes, AEM stick could be "something you have" factor (not sure
> if exactly the way you've proposed, but something like this). 
> 
> > 4. the attacker quickly gets to the infected notebook; then reverts it
> > to the original state, and unseals + decrypts the LUKS passphrase
> > 
> > Portable Qubes installations limit the attacker to copying only a
> > couple of megabytes of the encrypted disk data during (3), instead of
> > taking a complete copy during (2); they also make the infection harder.
> > 
> > Or secret.luks.encrypted.sealed could be on a second-stage AEM stick,
> > which the user should connect *after* verifying the OTP... :\
> > 
> > > - To protect the secret from visibility, we could plug in Matthew 
> > > Garrett's TOTP concept via a secret.totp file containing the seed.
> > > And then add a non-default GRUB boot entry to unseal the regular
> > > static secret.{txt,png}, in case the user doesn't have their
> > > authenticator device with them.
> > 
> > The mobile device's TOTP generator would have to be working in a sort
> > of verifier (not prover) mode, simultaneously displaying OTPs for a
> > couple of preceding and following 30-second time steps. Is there
> > anything like that for Android?
> 
> I don't think so...
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJWm7h3AAoJENuP0xzK19csdugH/RV7m3yDqt2nopo1Q5F9X/mJ
> 5JO/IGGCAYjFm+vZChxP0NvU5pfGe1RJEu3UnuG/lQTGppMkT527EzUlzRAQTG23
> z1ioPwu+Y4+iTwdsE1FpeEPsqnZw/yHeBYo0Mo2XcuTuqobe2kEn9ufanovjmFdN
> jbqfTk8UfVdAe7jX7jiEeoU2Oae/btqO0gS8j7W7ktXOSfePeZpXo91eeoAP8bqb
> gR/oXrAtVECEz8QSqwIS4FEUN9Ns8IrcQtRfND/AuApE2JQ2Fs52IHBhMnhBYmCA
> qJtwFGqraarEOuGno8bHpHQ5n0eTP36GQRguAGzLOgwHH/lCAcJZhdTT3sEJaSQ=
> =Lm3q
> -END PGP SIGNATURE-

Any further discussion or thought about this?
I want to use AEM, but I am currently using yubikey Chal/Resp for LUKS at boot 
time (https://github.com/the2nd/ykluks).  
I am sure installing AEM would conflict in some way.  

I would like AEM and ykluks to work simultaneously if possible... or if AEM can 
use the yubikey instead of a USB drive, and still be used as 2nd factor to 
decrypt the multiple LUKS devices.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/54516264-ed1a-412a-b22f-2d8cb9554609%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Yubikey, luks disk encryption password, and usb-vm ?

2018-08-28 Thread Joe
On Monday, 5 June 2017 00:33:44 UTC-4,   wrote:
> On Sun, 4 Jun 2017 22:29:57 +0200
> 
> > On 06/04/2017 10:03 PM, wrote:
> > > When using a usb-vm, my usb keyboard is not accessible at boot time,
> > > and thus my disk encryption password must be typed on the built-in
> > > keyboard. 
> > > 
> > > When not using a usb-vm, a usb keyboard can be used to enter the
> > > disk encryption password.
> > > 
> > > When using a simple static password at boot typed by the yubikey
> > > (which acts like a keyboard), it has the same limitations as the
> > > usb keyboard, wherein it can't type the disk password when a usb-vm
> > > is being used. 
> > > 
> > > I could not determine whether the documentation discussing
> > > challenge-response addresses this problem with boot-time disk
> > > passwords as some sub-component
> > > ( https://www.qubes-os.org/doc/yubi-key/ ). I only see the
> > > screensaver discussed, but not disk passwords at boot. 
> > > 
> > > While still using a usb-vm to manage all usb devices, is there any
> > > way to authorize the yubikey automatically at boot time so it can
> > > type in a password for me?
> > > 
> > > Also, here: ( https://github.com/adubois/qubes-app-linux-yubikey),
> > > am I missing the referenced qubes-yubikey-vm and qubes-yubikey-dom0
> > > in the repos, because they don't seem to exist?
> > > 
> > > Thanks!  
> > 
> > With USB VM enabled, all USB devices are hidden from dom0 even during
> > the Linux kernel boot (but not before). If you need to use USB devices
> > during Qubes OS boot (keyboard, yubikey, anti-evil-maid, ...) and
> > don't mind rigorously checking nobody has plugged any suspicious USB
> > devices into your machine before powering it on (as you should be
> > doing anyway), you can follow the steps outlined below.
> > 
> > There's a Linux kernel command line argument you need to remove from
> > /etc/default/grub -- find the line starting with "GRUB_CMDLINE_LINUX"
> > and drop the "rd.qubes.hide_all_usb" argument. Save the changes and
> > rebuild grub configuration using `sudo grub2-mkconfig -o
> > /boot/grub2/grub.cfg` and then reboot.
> > 
> > Please note that if you have anti-evil-maid installed, you also need
> > to re-run `anti-evil-maid-install` script on your AEM device.
> > Unsealing of your secrets will, as expected, fail during next boot.
> > 
> > Once you reboot without this option, you can use any USB device
> > normally.
> > 
> > 
> > Cheers,
> > Patrik
> > 
> 
> Thanks for the clear answer! It took some searching, but it looks like
> that for me, that flag was only present in /boot/efi/EFI/qubes/xen.cfg
> and it does not seem to require rebuilding grub to work. I didn't see
> that location discussed here https://www.qubes-os.org/doc/usb/ under
> "Removing a USB qube" either. 
> 
> Now, to see if I can get the luks challenge response working rather
> than just a static password ...

If you're still interested.
This solution works great with Yubikey (chal/resp mode), with sys-usb running 
as your USB Qube.
It temporarily allows USB devices during the boot up when it asks for a 
password (challenge) or the LUKS passphrase.  Once done, it then unbinds the 
USB PCI devices from Dom0, so the USB qubes can handle USB devices as it should.

https://github.com/the2nd/ykluks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a8a40cbd-5431-414a-8192-e27782a9cfc7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL: HP Spectre X360 - 15" i7-8550u 16GB / 512GB / GeForce MX150 /Intel 802.11b/g/n/ac Wi-Fi

2018-08-28 Thread monsalvo
Hello,
I've successfully installed Qubes OS R4.0 on an HP Spectre x360 with the 
following specs: 


CPU: 1.8GHz Intel Core i7-8550U (quad-core, 8MB cache, up to 4.0GHz with Turbo 
Boost) 
Graphics: Nvidia GeForce MX150 (2GB GDDR5 RAM); Intel UHD Graphics 620
RAM: 16GB DDR4
Screen: 15.6-inch 4K UHD (3,840 x 2,160) IPS WLED backlit
Storage: 512GB SSD (PCIe NVMe M.2)
Ports: 1 x Thunderbolt 3, 1 x USB-C 3.1, 1 x USB 3.1 Type-A, 1 x HDMI, 1 x 
3.5mm audio jack, 1 x SD card reader
Connectivity: Intel 802.11b/g/n/ac Wi-Fi (2x2), Bluetooth 4.2
Camera: FHD webcam

Enabled virtualization in the BIOS and that was it.

Qubes OS works out of the box, everything I tested so far including the touch 
screen.

Martin

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ca20ce1-88ec-4e10-ac1e-17c5ef5b3e87%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TemplateVM of a TemplateVM

2018-08-28 Thread 'Avery Fuentes' via qubes-users


‐‐‐ Original Message ‐‐‐
On August 27, 2018 10:48 AM, unman  wrote:

> On Mon, Aug 27, 2018 at 05:13:29AM -, 'awokd' via qubes-users wrote:
>
> > On Mon, August 27, 2018 2:02 am, averyfuentes9rs via qubes-users wrote:
> >
> > > Hola Qubers,
> > > For stream-lined management and ease of updating I wanted to implement
> > > the following Qubes hierachy:
> > >
> > > 1.  Official FC28-minimal TemplateVM from qubes-itl-templates repo
> > > 2.  'FC28-base' TemplateVM, a clone of 1)
> > > With same small adaptations
> > >
> > > 3.  'FC28-$ROLE': TemplateVM which uses 2) as a Template
> > > With the goal of creating a role specific template that automatically
> > > benefits from all changes made to 2) 4) 'AppVM-$ROLE': AppVM based on 
> > > 3) +
> > > some user settings
> > >
> > >
> > > Trying to create a TemplateVM from a TemplateVM I get:
> > > $ qvm-create --class=TemplateVM --template=FC28-base --label=red
> > > FC28-Test
> > > app: Error creating VM: Got empty response from qubesd. See journalctl in
> > > dom0 for details.
> >
> > > Is a TemplateVM of a TemplateVM an unsupported feature or should I create
> > > an issue on github for this?
> >
> > Unsupported/not implemented, but it's an interesting idea- multiply
> > layered templates. Anyways, I think the expectation under Qubes would be
> > to clone your 'FC28-base' as many times as needed, then you can apply Salt
> > scripts to those to customize further. You can do some limited
> > customization (selecting services to start or not) from the AppVM, but
> > sounds like you'd like more.
>
> awokd is right: it's not implemented.
> In fact the idea has been raised on these lists a few times before. E.g:
> https://groups.google.com/d/topic/qubes-users/a_VX6xSWj-Q/discussion
> https://groups.google.com/d/topic/qubes-users/iLJjTTQqgrw/discussion
>
> You'll see that the current implementation precludes templateception,
> and changing to allow it would alter the security profile.
>
> As awokd says, multiple templates are the way to go. There's some extra
> admin pain but you can mitigate this using salt (or a simple bash
> script) and a caching proxy.
>
> unman

Thanks for the links. marmareks description of the template mechanism working 
on block level logically explains why this is not possible.

It raises a few other (more or less) random thoughts:

1) The python trace I posted above should not happen. IMO qvm-clone should 
display an error for this setup being unsupported instead.

2) qubesctl should have something like a '--recursive' flag:
Expected behabvior: Lets say I execute 'state.apply' on an AppVM 'FC28-Random', 
adding the recursive flag would first execute 'state.apply' on the TemplateVM 
'FC28-Random' is based on and afterwards apply 'state.apply' to the AppVM 
itself.

I find 2) especially helpful, since software and OS upgrades need to done in 
the TemplateVM. As a new user to Qubes + Salt (alternatively as I'm prone to 
forgetting things :-P) I frequently forget to run qubesctl twice to incorporate 
all changes that I expect to manifest in the AppVM. IMO the '--recursive' flag 
would make the situation more "working as expected".

---
Salud, Avery



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/UsT2YfOGoPx2CvemXI_x6u_aO-y9m2L-KJsu1K1TfnNhLOelUdi3coYfkUU4_Iwy1z7IbKmm5QNnTdCNGZS18xFmRpHFy6Mg-n7K6ZAqxsk%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.