Re: [qubes-users] Re: Looking to edit rules.ml of my mirage-firewall VM but since I cannot run shell, IDK what to do

2019-04-21 Thread Sphere
On Thursday, April 11, 2019 at 8:02:33 PM UTC+8, Thomas Leonard wrote:
> On Thursday, April 11, 2019 at 4:16:17 AM UTC+1, Sphere wrote:
> > @unman Thanks for the clarification. I suppose I misunderstood it wrong 
> > since I thought you have to set it directly using some sort of text editor 
> > and be done with it. So I'll have to recompile it I see, welp guess I have 
> > no choice but go through with that haha
> > 
> > On Thursday, April 11, 2019 at 3:16:32 AM UTC+8, 799 wrote:
> > > Hello,
> > > 
> > > 
> > > 
> > > Thomas Leonard  schrieb am Mi., 10. Apr. 2019, 20:42:
> > > (...)
> > > 
> > > To change the rules, you edit rules.ml, rebuild and redeploy (this should 
> > > only take a couple of seconds after the first build).
> > > 
> > > 
> > > (...)
> > > 
> > > 
> > > 
> > > Can you or someone from the mirage fw for Qubes team give some examples 
> > > how to write rules for mirage?
> > > 
> > > 
> > > Examples:
> > > 
> > > 
> > > 1)  can access  via ssh
> > > 2)  can reach  using  via TCP
> > > 3) Block access from  to  
> > >
> > > I think some example rules will make it easier to understand how to write 
> > > rules.
> 
> I've added some examples at 
> https://github.com/mirage/qubes-mirage-firewall/pull/54 (see the changes to 
> rules.ml).
>  
> Actually, matching on individual machines was a bit ugly, so I also made some 
> changes to let you name all the machines you want to refer at the start of 
> the rules file. You'll need those changes too for the new examples to work.
> 
> > > Regarding rebuilding and redployment:
> > > Maybe we can write a small script that will do the following:
> > > 
> > > 
> > > - launch mirage build VM
> > > - apply changes to rules.ml
> > > - rebuild
> > > - copy new kernel files back to dom0
> > > - shutdown mirage build VM
> > > - restart mirage firewall proxyVM
> 
> See: 
> https://github.com/mirage/qubes-mirage-firewall/#easy-deployment-for-developers
> 
> e.g. I build and deploy the firewall from my dev VM with:
> 
> [dev]$ make && test-mirage qubes_firewall.xen mirage-firewall
> 
> It does what you describe, and also tails the log file so you can see it from 
> the build VM. The process is triggered from the build VM rather than from 
> dom0 because working in dom0 is risky. There is a policy so that only the 
> builder VM can push the kernel, and only the mirage-firewall kernel can be 
> updated.
> 
> Note that the instructions for test-mirage show how to set up a "mirage-test" 
> unikernel. You'll need to use "mirage-firewall" as the name instead.
> 
> > I second this idea. I'm having a hard time myself trying to absorb the very 
> > raw instructions of making rules in the rules.ml
> > 
> > While the added convenience expands the surface of attack by a bit, I think 
> > this can be very useful in environments where you have to frequently 
> > interact with firewall rules.
> > 
> > Also got questions about makings rules in rules.ml
> > 
> > let from_client = function
> >   | { dst = (`External _ | `NetVM) } -> `NAT
> >   | { dst = `Client_gateway; proto = `UDP { dport = 53 } } -> `NAT_to 
> > (`NetVM, 53)
> >   | { dst = (`Client_gateway | `Firewall_uplink) } -> `Drop "packet 
> > addressed to firewall itself"
> >   | { dst = `Client _ } -> `Drop "prevent communication between client VMs"
> > 
> > Does `NAT_to (`NetVM, 53) mean that NAT will be applied to the outgoing 
> > packet then NetVM itself will process the DNS Query within its own VM 
> > context? If this is right, then configuring a wrong DNS server within NetVM 
> > would essentially mean DNS resolutions will fail right?
> 
> Yes. Client AppVMs are by default configured to use the firewall as their DNS 
> (check your /etc/resolv.conf). The firewall then just forwards these requests 
> to sys-net.
> 
> > Or is this because the rule { dst = `Client_gateway; proto = `UDP { dport = 
> > 53 } } -> `NAT_to (`NetVM, 53) is intended for internal DNS resolutions? 
> > (From my own understanding, that seems to be the case but I'd like to be 
> > corrected if this rule really is for internet DNS resolutions)
> > 
> > Moving forward, if I have no lapses in understanding the guidelines in 
> > making rules, then this must be the ruleset for allowing only outgoing 
> > traffic towards port 25, 110, and 143:
> > 
> > let from_client = function
> >   | { dst = (`External _ | `NetVM); proto = `TCP { dport = 25, 110, 143 } } 
> > -> `NAT
> 
> Nearly: dport = (25 | 110 | 143)
> 
> >   | { dst = (`Client_gateway | `Firewall_uplink) } -> `Drop "packet 
> > addressed to firewall itself"
> >   | { dst = `Client _ } -> `Drop "prevent communication between client VMs"
> > 
> > I also want to know why there is an underscore in front of `External and 
> > `Client
> 
> That space contains information about which client or external machine it is. 
> "_" matches anything.

Thank you very much for the sweet details! Sorry if I only got to reply now as 
I was on vacation

-- 
You received this message because you are 

Re: [qubes-users] qubes-mirage-firewall 0.5

2019-04-21 Thread Sphere
I have been briefly reminded that technology is not some magic bullet where you 
just fire and forget.
Thank you for this

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/977cc4bb-868b-43ff-b044-fe8ffb3a7238%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] /usr/bin/notify-send does not work when invoked via qubes-rpc

2019-04-21 Thread unman
On Sun, Apr 21, 2019 at 06:50:06AM -0700, tom...@gmail.com wrote:
> Hi all,
> 
> I struggle to get something that's working in Q3.2 also in Qubes4:
> 
> - I need to display message from AppVm on the screen (via notify-send in 
> dom0) and do it via qubes-rpc executed in AppVm "storage". rpc procedure is 
> named 'storage.log'
> - allow policy in dom0:
>   > cat /etc/qubes-rpc/policy/storage.log:
>   > storage dom0 allow
>   > $anyvm $anyvm deny
> - procedure:
>   > cat /etc/qubes-rpc/storage.log
>   > #!/usr/bin/bash
>   > 
>   > read message
>   > /usr/bin/notify-send "$message"
> 
> RPC is called this way in appvm 'storage':
>   > echo 'message from vm'|qrexec-client-vm dom0 storage.log
> 
> What happens:
> - In Q3.2 this works since years
> - In Q4 action is executed, but nothing is displayed on screen. Action is 
> actually executed-in journalctl I see 'storage.log' is allowed, and if I add 
> 'echo $message|systemd-cat' that message is logged also.
> 
> 
> - If its run in dom0, message is displayed on the screen:
>   > echo 'dom0 message'|/etc/qubes-rpc/storage.log
> 
> 
> It seems like /usr/bin/notify-send does nothing when invoked via RPC.
> 
> Any ideas?
> 

Can I ask why you want to do this?
Why dont you just call notify-send in the qube? 
What is the advantage of using a qubes-rpc call here?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190422020659.u7d5by5wffuzmy4m%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] MirageOS as NetVM

2019-04-21 Thread miragenetvm
Faq:

Can I install Qubes OS on a system without VT-d?

Yes. You can even run a NetVM, but you will not benefit from DMA
protection for driver domains. On a system without VT-d, everything should
work in the same way, except there will be no real security benefit to
having a separate NetVM, as an attacker could always use a simple DMA
attack to go from the NetVM to Dom0. Nonetheless, all of Qubes’ other
security mechanisms, such as qube separation, work without VT-d.
Therefore, a system running Qubes will still be significantly more secure
than one running Windows, Mac, or Linux, even if it lacks VT-d.

Since I only have 3GB RAM on my libreboot laptop, can I use Mirage to
function as a NetVM to save memory?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8686fb250dab600d73df67dc166927d7.squirrel%40_.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Log qubes firewall packets

2019-04-21 Thread tomhet
> >> Wondering how to log packets blocked and accepted by qubes firewall
> >> for specific vm or all vms if thats the only option? Couldn't find
> >> anything in website or google or qvm-firewall

> > Unfortunately, Qubes firewall was not designed for such use case.
> > 
> > If you are familiar with the iptables (and nftables too), you may be
> > able to workraound this limitation. But it really not trivial to achieve

So, logging is done via -j LOG target, like this (with same rules that would 
match actual action):
   iptables -t nat -A SSH2 -j LOG --log-prefix "DNAT SSH2-tunnel: "
   iptables -t nat -A SSH2 -j DNAT -p tcp --to 10.137.2.11:22

For blocked packages you should add log entry before DROP statements. You 
should review all chains and tables. Add your changes to 
sys-firewall:/rw/config/qubes-firewall-user-script. Be careful when 
inserting/adding rules, as they qubes dynamically changes the tables.

By default LOG uses systemd log but it is configurable.
Your question is not related to Qubes, but is general iptables-question.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a9399c1d-d316-48fb-af62-4832d60db84a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Log qubes firewall packets

2019-04-21 Thread Frozentime345

Okay thanks, should I post this in issues as a feature request?

On 4/21/19 4:06 PM, Zrubi wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 4/21/19 9:13 PM, Frozentime345 wrote:

Wondering how to log packets blocked and accepted by qubes firewall
for specific vm or all vms if thats the only option? Couldn't find
anything in website or google or qvm-firewall



Unfortunately, Qubes firewall was not designed for such use case.

If you are familiar with the iptables (and nftables too), you may be
able to workraound this limitation. But it really not trivial to achieve
.

- -- 
Zrubi

-BEGIN PGP SIGNATURE-
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=4NxJ
-END PGP SIGNATURE-



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/578b2297-0d79-1678-0710-7369124b9069%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Log qubes firewall packets

2019-04-21 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 4/21/19 9:13 PM, Frozentime345 wrote:
> Wondering how to log packets blocked and accepted by qubes firewall
> for specific vm or all vms if thats the only option? Couldn't find
> anything in website or google or qvm-firewall
> 

Unfortunately, Qubes firewall was not designed for such use case.

If you are familiar with the iptables (and nftables too), you may be
able to workraound this limitation. But it really not trivial to achieve
.

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=4NxJ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/efc45631-892a-73fb-e6fc-ffb6f25532b5%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Log qubes firewall packets

2019-04-21 Thread Frozentime345
Wondering how to log packets blocked and accepted by qubes firewall for 
specific vm or all vms if thats the only option? Couldn't find anything 
in website or google or qvm-firewall


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/049dca62-08a1-6f03-9fb7-73f99f5866b2%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes Installation freeze

2019-04-21 Thread Blue
I've so far been unable to get qubes 4.0.1 to install on my Dell laptop, it 
keeps freezing of file 909/1042 kernel-qubes-vm.x86_64. Its a nvme drive if 
that makes a difference.

I've verified the ISO of qubes and that matches, I created the pen drive in 
Ubuntu using the DD command,as  per the site, and I've used 2 different 16gb 
pen drives.

The pen drive boots in legacy mode and lets me enter all settings and starts 
install. The installation hangs at the file shown above and I cannot find any 
way to exit or restart the machine other than a hard reboot.

I've tried the UEFI troubleshooting on the qubes site as well, anyone else got 
any ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/29ccac95-230f-41c1-9969-a81213f10702%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [qubes-devel] Re: [qubes-project] Re: Google "Season of Docs" -- deadline April 22

2019-04-21 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 19/04/2019 10.15 PM, Andrew David Wong wrote:
> On 19/04/2019 1.12 AM, Michael Carbone wrote:
>> On 3/20/19 3:53 PM, Michael Carbone wrote:
>>> On 3/15/19 3:27 AM, Andrew David Wong wrote:
 On 14/03/2019 8.28 AM, Michael Carbone wrote:
> https://opensource.googleblog.com/2019/03/introducing-season-of-docs.html

>  https://developers.google.com/season-of-docs/


 This looks great. I think we should consider applying.

>>>
>>> will do! I'll loop in all the folks needed once it's open.
>>>
> 
>> hey all,
> 
>> sorry for the short notice -- I'll be submitting the Season of Docs
>> application on Monday night April 22 (deadline April 23).
> 
>> Before then we need a 2019 Google Season of Docs page
>> (https://www.qubes-os.org/gsod ?) that has project ideas for technical
>> writing / documentation.
> 
>> So let's get started with some brainstorming on technical writing /
>> documentation needs!
> 
>> Also with these ideas we need volunteer mentors - if you'd like to be a
>> mentor, you need to register here:
> 
>> https://forms.gle/a1x26WQGzURLerv66
> 
>> More info here:
> 
>> https://developers.google.com/season-of-docs/
> 
>> https://developers.google.com/season-of-docs/docs/project-ideas
> 
>> Thanks,
>> Michael
> 
> 
> Thanks, Michael. I've created an initial version of the GSoD page here:
> 
> https://www.qubes-os.org/gsod/
> 
> It's pretty minimal and bare. Everyone, please help add content to this
> page, especially project ideas to the ideas list.
> 

Cross-posting to qubes-users for greater visibility. Everyone is
welcome to contribute.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=0n49
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39abebc3-e3de-0a11-6349-709910a4f108%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] /usr/bin/notify-send does not work when invoked via qubes-rpc

2019-04-21 Thread tomhet
Hi all,

I struggle to get something that's working in Q3.2 also in Qubes4:

- I need to display message from AppVm on the screen (via notify-send in dom0) 
and do it via qubes-rpc executed in AppVm "storage". rpc procedure is named 
'storage.log'
- allow policy in dom0:
  > cat /etc/qubes-rpc/policy/storage.log:
  > storage dom0 allow
  > $anyvm $anyvm deny
- procedure:
  > cat /etc/qubes-rpc/storage.log
  > #!/usr/bin/bash
  > 
  > read message
  > /usr/bin/notify-send "$message"

RPC is called this way in appvm 'storage':
  > echo 'message from vm'|qrexec-client-vm dom0 storage.log

What happens:
- In Q3.2 this works since years
- In Q4 action is executed, but nothing is displayed on screen. Action is 
actually executed-in journalctl I see 'storage.log' is allowed, and if I add 
'echo $message|systemd-cat' that message is logged also.


- If its run in dom0, message is displayed on the screen:
  > echo 'dom0 message'|/etc/qubes-rpc/storage.log


It seems like /usr/bin/notify-send does nothing when invoked via RPC.

Any ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3bfbe56-9408-4253-be6f-87bb0e244345%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Make files in AppVM persistent

2019-04-21 Thread 799
Hello,

unman  schrieb am So., 21. Apr. 2019, 02:29:

> (...)
> Don't make the changes in the template.
> bind-dirs is intended to work in the AppVM, (as I think you originally
> tried).
> You need to configure bind-dirs and restart the qube, *then* make any
> changes that you want to make in /etc/openvpn.
> You can check that the changes are there in /rw/bind-dirs/etc/openvpn.
>

Sorry, my mistake ... With your hint, the documentations says it already:

(...) Inside your TemplateBasedVM (...)

Maybe it would be good to change this into:

(...) Inside your AppVM which is based on a Template (...)

Additionally it seems that you need to run 6 steps, the numeration seems to
be fixed, now it has two times 3 steps - I'll try to fix this in the GitHub
repo.

O/799.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2ub1Zx0yS_ZuhHj%3D2cMcRkoc9ASG-Lw0r90PFgP94W8fA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes4: net,fw,appvms-all in 10.137.0.* ?

2019-04-21 Thread tomhet
Hi all,

  I tried test install of Qubes4 to test migration from 3.2 and I was surpised 
that sys-new,sys-fw and all appvm share same network 10.137.0.*
This is in contrast to 3.2, where appVMs are in 10.137.2.*, firewalls in 
10.137.1.*, and just sys-net in 10.137.0.*
(like drawn in http://roscidus.com/blog/images/qubes/qubes-net.png)

Why this change? I guess it did not happened accidentally in current v4 
install. 

Seems I'll have to do lot of IP changes in iptable rules in sys-firewall (and 
for each appvm accepting connections from other appvm). I was hoping that appVM 
IPs will be kept when restoring from 3.2 backup (which anyway did not happen).

If 10.137.0 is shared between all types of VMs there is no point in trying to 
manually set IPs to match those of 3.2 (in qubes .xml files describing vm 
configs), as networks are anyway different.

regards,
  Tom


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d190d69c-6b77-46f2-b212-6d9556f8c7bb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.