[qubes-users] mapping 1 img file to multiple guests.

2016-10-05 Thread Drew White
mapping 1 drive image to multiple guests.

Is this possible?
If not, why not?
If so, how so (so that it actually updates itself properly)?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2bc3a5e8-7e43-475a-ab92-fe65bb255e39%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Major problems with 3.2, devs must address

2016-10-05 Thread Chris Laprise

On 10/05/2016 07:15 PM, Andrew David Wong wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-05 15:30, boromirsbe...@sigaint.org wrote:

Alot of this is posted on the reddit.com/r/qubes board, there are alot of
problems with 3.2, both security + function.


1. Dom0 is exposed to Sata connected drives. This is evident when running
qubes on a usb connected drive going into dom0 file manager, the sata
drive is automatically mounted and exposed to dom0. Part of Tails security
is to require auth and manual mounting of locally connected drives, if
this is not necessary for some reason users are owed an explanation.


I believe this is what the dedicated storage domain (which we're currently
working on implementing) is meant to handle:


Wanted to mention here that it mainly comes down to DMA attacks from 
compromised HD/SSD firmware. In a legacy/BIOS configuration, the 
auto-mounting part only involves one internal partition (/boot) and you 
have the option of protecting it with AEM... if it works.


SATA buses rarely have the kind of plug-and-play, external profile that 
USB has, so a physical attack where the case is opened is probably 
necessary. And even then it would probably be an active one, not a 
passive one where malware can just migrate between USB devices in a 
sneakernet fashion.


Hotswap drive bays might raise the risk to USB levels, but that's a 
pretty rare situation on a PC.





2. Attaching USB controller to a usbVM (running qubes on a sata connected
disk), renders all vm's unable to start, even after controller is
detatched. Short-term remedy is to detatch and reboot.

Thanks for the report! Tracking:

https://github.com/QubesOS/qubes-issues/issues/2367


My entire equipment hierarchy is intel, recent hardware,
compatibility should not be an issue.

Often times, recent hardware is less compatible than older hardware. This
seems to be true generally in the Linux world, not just with Qubes. It
takes a little while for software support to catch up to the newer hardware
(in contrast to the Windows world).


On top of that, how its all put together matters as much as who made the 
parts. There was never really such a thing as "PC Compatible" in 
personal computing... It was either Mac, or "IBM compatible" which 
shifted to "Windows compatible". Where Linux, Xen, etc fit in is in the 
subset of models where the vendor desires to use the most 'vanilla' 
(non-cost-reduced) chips, and that is sometimes a function of catering 
to business Linux users on the side.


Where Linux, Xen, etc do NOT fit in is when a PC is designed as cheap 
consumer goods or hobbyist "performance rig" and its more profitable to 
hire a couple engineers to iron out the wrinkles with those funky 
drivers containing the workarounds that make hardware with half-broken 
and hidden shortcuts appear functional. Their target in that case is one 
and only one thing: Windows. (And yes, the crummy cost-reduced chips and 
firmware are based on older designs, so they often kinda-sorta work with 
existing Linux drivers. But chances are you will never get to scratch 
that itch of having everything work with Linux on that discount consumer 
PC.)


So the best choices are usually Linux-dedicated brands, and certain 
business models from top-tier brands. If you want to depart from that 
(not very small) selection flying your "PC compatible" and "homemade 
rig" flags while carrying the burden of Qubes' additional hardware 
requirements, well, don't expect much.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/69556249-bdd1-9c13-b334-4185098a05ea%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't BkUp? Error: 'ascii' codec can't decode byte 0xd0 in position 0: ordinal not in range (128)?

2016-10-05 Thread gaikokujinkyofusho
On Wednesday, October 5, 2016 at 6:56:35 PM UTC-4, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-10-04 17:26, gaikokujinkyofu...@gmail.com wrote:
> > I was trying to back up a VM (a single VM if it matters) to a external 
> > drive that I had mounted in one of the appvms which I have done in 3.1 with 
> > no problems but here I got the following error:
> > 
> > Error: 'ascii' codec can't decode byte 0xd0 in position 0: ordinal not in 
> > range (128)
> > 
> > not sure what to make of it?
> > 
> 
> Do you have non-ASCII characters anywhere (e.g., VM name, backup name, 
> passphrase)?
> 

Does "-" count? Well regardless that seems to have been the problem as I had 
that in there, though I had used the exact same name before and it didn't make 
a diff? Anyway, no dash, no problem (it seems)?! Thanks!

> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJX9YUHAAoJENtN07w5UDAwHYsQAMy2Xb//PYRAHsprTZ6D+gC4
> aDdY7l3SRmKLBQaYZvqWAXCoMFge4AyT72j+k/6bnO64yStpG8kr+657Ayqvy8XL
> XwphVaAuIGW4yVgdwfCDDi+mhGl6kOoeA79W+uXbMFtwHIgX8fk3y4e0H4r8oM+a
> 7Y1uc84nQLcSsOQLltkTNrw3IvHsmRP6Ghy7cVRRc+P9kdfXAe+TVuLwl6IfhWfW
> KmrKoEh0E/eg7NYR6UUB4y/oLuYhz2FIvORPiQTwaqg3Ql3mGwnpYGR18ELUMEFk
> c4fIEskF0Acs/XP5kyWE9lUC4qbEE6z65kUnoPDYfnErR1KStUBDnD8b/JCt6Hdo
> VDOPWkBZQAKoHQSsSvm2VBJUX8NPnQ3Q4kpymIpe9NP/2jGr4tacxaC4030yzi2r
> ApHP8YvT3eRiufuWbxKsc4CIMBZ5rwd/CZ+f2LubePtO+nVRaAUYcyslv59UZ3QJ
> 1MM6VwYurjoojjVFJV7wTUcaRMEzQwqosR2UDJ+X1j/e8GpWVVh8UiPJd3/x+DA/
> qq0+w+nTIhh1PfyIhg8srXZbcwdi8DRHqm0r2QyxHOPvW3kdo6PdoXXGvppGWFu8
> JToffOPxQFrf8IyK964bEYMI6nSlZX9bA2YTvSMYXbohlv0l4bzhJiWnYcGFF+CX
> vfryeUVOqe7yhT4UCzDq
> =O4FM
> -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f398da12-2603-47f6-a3c2-34dc80023f6e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Q] Linux HVM & inter-VM networking

2016-10-05 Thread Drew White
Easiest way to perform the action on an "InterVM" ProxyVM or NetVM
This is a part of my personal script that allows me to have an InerVM Network 
along with external networking available.
I'm a developer, so I use this sort of thing for testing and more.

Replace X with the number for the network you have, whether it's a 
1/2/3/4/5/6/7/8/9/10/11/12/13 ... etc...

My personal script auto detects the IPs upon boot. Then sets everything 
accordingly.

So as you can see, it works, and I have been using this for a long time.


#
intervm_internalnet='10.137.X.0';

# Sets iptables so that anything targeting local network can find itself. Only 
use for interVM machine.
   iptables -I FORWARD 1 -i vif+ -o vif+ -s $intervm_internalnet/24 -d 
$intervm_internalnet/24 -m state --state NEW -p tcp -m tcp -j ACCEPT
   iptables -I FORWARD 1 -i vif+ -o vif+ -s $intervm_internalnet/24 -d 
$intervm_internalnet/24 -p udp -m udp -j ACCEPT
#

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/935a18cf-ecfc-45ec-804e-12608bb99168%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Remarks for Firewall Rules, combine Firewall rules and own iptables rules

2016-10-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-05 02:49, Robert Mittendorf wrote:
> Hello fellow Qubes-Users,
> 
> I'd like to suggest to have an additional (optional) field in firewall rules 
> to store remarks for specific rules
> (like "needed for xyz" "IP of www.MyHomepage.de" and others)
> 
> Is it possible to use Qubes firewall rules and own iptables-rules together, 
> or will the firewall rules overwrite any own iptables config?
> 
> Thank you,
> 
> 
> Robert
> 

This suggestion is already being tracked here:

https://github.com/QubesOS/qubes-issues/issues/952

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=X8cO
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/db5356d9-1320-793b-8a2a-d612b4954129%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Q] Linux HVM & inter-VM networking

2016-10-05 Thread Pablo Di Noto
El miércoles, 6 de abril de 2016, 5:39:40 (UTC-3), 
li...@mullvad.net escribió:
> On Tuesday, February 9, 2016 at 3:18:41 PM UTC+1, Marek Marczykowski-Górecki 
> wrote:

> 
> On Tue, Feb 09, 2016 at 06:06:47AM -0800, Stefan wrote:
> 
> > Am Dienstag, 9. Februar 2016 14:41:57 UTC+1 schrieb Marek 
> 
> > Marczykowski-Górecki:
> 
> >  
> 
> > > > Solution: Qubes 3.1 disables ProxyARP by default; enable it on your 
> > > > Firewall VM: 
> 
> > > > echo 1 > /proc/sys/net/ipv4/conf/$DEST_DEV/proxy_arp 
> 
> > > > where DEST_DEV is the device name of your target VM. 
> 
> > > > That did the trick in my case. 
> 
> > > Can you describe exactly your setup, including network configuration in 
> 
> > > Windows? "route print" command output from there would be useful. 
> 
> > With pleasure :-)
> > Linux AppVM (10.137.3.15), based on the fedora-23 template, no 
> > modifications to the AppVM firewall
> > Windows HVM with Windows 7 (10.137.3.13), no Qubes Tools. Configured as 
> > home network, firewall disabled (though I don't think this is any longer 
> > necessary).
> 
> > Both connected to the same FirewallVM (fedora-23 template).
> > Tried to establish a connection from Linux to Windows by following 
> 
> > https://www.qubes-os.org/doc/qubes-firewall/:
> 
> > sudo iptables -I FORWARD 2 -s 10.137.3.15 -d 10.137.3.13 -j ACCEPT
> > 
> > pinging didn't work, so I started digging… this is the routing of the 
> > FirewallVM:
> 
> > $ route -n
> 
> > Kernel IP routing table
> 
> > Destination     Gateway         Genmask         Flags Metric Ref    Use 
> > Iface
> > 0.0.0.0         10.137.2.1      0.0.0.0         UG    0      0        0 eth0
> > 10.137.2.1      0.0.0.0         255.255.255.255 UH    0      0        0 eth0
> > 10.137.3.13     0.0.0.0         255.255.255.255 UH    32744  0        0 
> > vif8.0
> > 10.137.3.13     0.0.0.0         255.255.255.255 UH    32745  0        0 
> > vif7.0
> > 10.137.3.15     0.0.0.0         255.255.255.255 UH    32747  0        0 
> > vif5.0
> 
> > Note that the Windows VM has two interfaces (for whatever reason).
> 
> > Sniffing with Wireshark on vif7.0 showed no traffic. vif8.0 revealed that:
> > - the icmp requests arrive on the interface
> > - Windows sends ARP requests for 10.137.3.15
> > - ...but gets no ARP response
> 
> > Manually adding an ARP entry didn't do the trick. Windows now sent ping 
> > replies (visible on vif8.0), but they didn't reach the Linux AppVM.
> > 
> > Enabling proxy_arp for vif8.0 solved the problem.
> > 
> > 
> > Enclosed is a screenshot of Windows' "route print" (sorry, no Qubes Tools, 
> > no copy-paste).
> > 
> > 
> > Hope this helps :-)
> 
> Try setting netmask 255.255.255.255 in Windows. If it still doesn't help
> perhaps it would require additional route entry to 10.137.3.1 directly
> through emulated ethernet. But in such a case, enabling proxy_arp is
> just the simples solution.
> 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> 
> I have the same problem between an Ubuntu 14.04 HVM and a debian-8 AppVM. No 
> arp responses sent to the HVM. I have the same setup as Thomas with a 
> 255.255.255.0 mask in the HVM. Setting it to 255.255.255.255 didn't help 
> (Because now my gw is outside my local network?)
> 
> I have tried basing my ProxyVM on both fedora-23-minimal and fedora-23, same 
> results.
> 
> I could temporarily make it work by manually adding an arp entry in the HVM:
> $ sudo arp -s  
> 
> But after finding this thread I solved it by activating proxy arp in 
> /rw/config/qubes-firewall-user-script on the ProxyVM:
> # Activate proxy arp
> for i in /proc/sys/net/ipv4/conf/vif*/proxy_arp; do
>     echo 1 > $i
> done 
> 
> Are there any security implications of activating proxy arp? Why was it 
> turned off (everything worked as expected in Qubes R3.0)
> 
> /Linus

I have just ran into this issue while using Qubes R3.2, and a Ubuntu HVM.
Should we include this instructions on the 
https://www.qubes-os.org/doc/qubes-firewall/ page?
Somehow, it took me a whole day to get to this post. I just wanted to access a 
new HVM thru SSH.

I can add this info into it, if there is editing available.
Regards,
///Pablo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/93543d11-ff74-495e-ae59-4415f0055c9f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Problems with USB Pass through / iGPU drivers

2016-10-05 Thread jidar
Howdy Qubes users, I've been following things for a while now and I've 
got a new laptop to run Qubes and will be submitting a HCL report after 
I work out all the kinks. The laptop is a Dell Precision 5510 with NVMe 
SSD, Xeon Processor and lots of ram. While working on this I've run into 
a few issues:


1. I'm attempting to pass through a Trezor/KeepKey device for use as a 
bitcoin hardware wallet. The problem I'm finding (see attached) is that 
the device shows up in the correct AppVM, but it doesn't have all of the 
same meta-data as the original device. I believe this causes 
applications in the AppVM to not recognize the device, and will not 
initialize.


I then attempted to work out how one might setup the sys-usb VM to have 
a internet connection (so I could load the proper applications into it, 
and have them connect out, ie: broadcast bitcoin transactions). While 
doing this I found that the design of sys-usb doesn't allow this (it 
gets set to a NetVM without any network devices). Is there a supported 
way of doing this? I'm not at all concerned about rogue USB devices 
showing up on my laptop, so while I understand others concerns that is 
not one I have.


2. I've read the instructions for setting up a sys-usb VM, which got me 
to this point, this is the only reason I needed to setup a sys-usb VM 
was for question (1). Are there instructions for removing it? I tried 
the following:


sudo qubesctl top.disable qvm.sys-usb
sudo qubesctl state.highstate

But the VM was still present, and seemed to be holding USB devices (like 
my mouse).


3. Is there much in the way of documentation for setting up the correct 
intel drivers for the iGPU? I ask because scrolling webpages can be 
pretty choppy on what I'd consider a very powerful laptop. I read 
earlier that somebody was using drivers that they plug into Dom0 but my 
understanding of how VMs are displayed makes me wonder that inserting 
Video drivers into Dom0 would have a positive effect on the behavior of 
a VM's display.



Thanks!
--jidar

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/nt3q88%24ucu%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to backup an iPhone under Qubes

2016-10-05 Thread qubes

Hi,

how can I back up my iPhone without a separate Os?

I have installed Windows 10 in an HVM and tried to add both USB 
controller devices but then the VM does not start.


Backing up via Wifi does not work because the HVM is behind a NAT.

I have not tried WIndows 7 because I have not access to it.

So is there any solution which does not require another os or another 
computer?


Thx in advance

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c3b060c5776c78042ad37402fa50ea24%40posteo.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Screen geometry for VMs

2016-10-05 Thread Achim Patzner
Am 05.10.2016 um 08:20 schrieb Alex:

> The problem solved itself after forcing an update of qubes-gui-vm (and
> only this package) from the stable repo to the version in
> current-testing, which solved the multi-monitor problem (I have 6
> monitors, and qubes-gui-vm only managed up to 4). I guess it may have
> something to do with screen geometry.

Actually for the first time in ages the screen dimension is not 0 x 0 mm
in xrandr so the dimensions are coming through. There always was a
metric shitton of utilities and libraries dividing by these values
without testing them first and I guess somewhere along the way nearly
every program picked up something that would do it. Sometimes
repeatedly. Divisions by zero are expensive.


Achim

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d1c8d4c-a500-1734-6eb1-cbe7d5d822f6%40noses.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Remarks for Firewall Rules, combine Firewall rules and own iptables rules

2016-10-05 Thread Robert Mittendorf

Hello fellow Qubes-Users,

I'd like to suggest to have an additional (optional) field in firewall 
rules to store remarks for specific rules

(like "needed for xyz" "IP of www.MyHomepage.de" and others)

Is it possible to use Qubes firewall rules and own iptables-rules 
together, or will the firewall rules overwrite any own iptables config?


Thank you,


Robert

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b72ece35-1556-4207-15c0-028acad68a7c%40digitrace.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Needed Packages for sys-usb on Fedora-minimal

2016-10-05 Thread Fabrizio Romano Genovese
Ok, I figured out what the problem was: I was trying to use my phone as a usb 
storage in mtp mode. To do that you also need the package gvfs-mtp. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/398a403e-bf21-4a4a-aaf9-30bcbcb20c48%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Screen geometry for VMs

2016-10-05 Thread Alex
On 10/04/2016 10:51 PM, Wojtek Porczyk wrote:
> On Tue, Oct 04, 2016 at 10:29:16PM +0200, Alex wrote:
>> starting to buffer for ~1 minute after just 3 seconds of playback.
> 
> This seems like poor Tor circuit. Isn't this firefox in a VM
> connected through sys-whonix?
No, these machines are not routed through a TOR circuit. And I have a
100Mbit vdsl link to the Internet, which did not experience any speed
issue: other computers in the network, not running Qubes but Fedora 24,
were playing youtube videos just fine.

The problem solved itself after forcing an update of qubes-gui-vm (and
only this package) from the stable repo to the version in
current-testing, which solved the multi-monitor problem (I have 6
monitors, and qubes-gui-vm only managed up to 4). I guess it may have
something to do with screen geometry.

-- 
Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/636486fa-50e3-5332-0cc7-f03bfbb705c1%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature