[qubes-users] No wireless network detected inside StandaloneVM

2019-08-06 Thread rolltidewub
In my standalone VMs one running Kali and one running Kodachi the never detect 
any wireless network's in my windows 7 standalone VM it shows and detects and 
connects to the wireless network. If I boot kali or kodachi from the UDB it 
detects the wireless network fine but inside the qube it does not.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6e7d75e2-51b0-4208-a517-52456522c9fa%40googlegroups.com.


Re: [qubes-users] Is there a Step-by-step?

2019-08-06 Thread 'awokd' via qubes-users

V C:

I am a layman that gets Qubes to work...the only thing different I do
different then awokd, is I use a Mac and terminal to create a bootable
thumb with .iso. Tons of articles and tutorials...likely not as secure.
Default to awokd he/she is smarter...


Don't defer to me, I used dd from Linux to make mine! Rufus in Windows 
might be broken, but the first thing for him to check is that he is 
running it per the documentation.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a8aaa437-bdf2-764b-36e3-b1e88d14e7c0%40danwin1210.me.


Re: [qubes-users] Autoconnect to VPN not working in fedora based AppVM

2019-08-06 Thread Chris Laprise

On 8/6/19 6:28 PM, 'awokd' via qubes-users wrote:

799:

Hello,

For my corporate work I am running a custom build AppVM which is based on a
fedora-30-minimal package with some additional packages.
I am using the gnome network manager applet with the openconnect plugin to
connect to our corporate VPN (Cisco Anyconnect).
This is working fine, but I would like to have the VPN started as soon as
the VM boots up.
Normally this can be done, by right clicking network manager icon, choose
"Edit Connection" then edit the settings for the Ethernet connection (VM
uplink eth0), open the "General Tab" and enable "[x] Automatically connect
to vpn" and choose the VPN connection which I have configured.

Unfortunately this setting will not survive the boot of the AppVM,
therefore I think the setting is saved somewhere where the AppVM has no
write possibility and therefore the setting will be forgotten when I
shutdown the AppVM.

QUESTION:
How can I make this change permanent or do you another idea how to launch
the VPN connection upon start of the AppVM?


I think /rw/config/NM-system-connections is a bind-dir to
/etc/NetworkManager/system-connections, which is where network
connections usually get saved. You would think the edit you described
would be saved in the same place. Try making it, then doing a sudo grep
-ris vpnhostname inside /etc to see where it is getting saved. You
should then be able to https://www.qubes-os.org/doc/bind-dirs/ it to
have it persist. The connection files are plain text so they might give
a hint where to look too.

You could also maybe put a script command in /rw/config/rc.local to
start openconnect.



FWIW, I always got erratic behavior from NM's VPN autostart; I don't 
know if they've fixed that issue.


The VPN doc has a section about making NM start the VPN using an 
external script (its step 4):


https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/74d8038c-44bf-c4a0-e4a8-16cf71d27957%40posteo.net.


Re: [qubes-users] handling DNS resolution when running comercial VPNs

2019-08-06 Thread Chris Laprise

On 8/6/19 7:57 PM, thecodingninjaisb...@gmail.com wrote:
Running ```sudo iptables -C FORWARD -o eth0 -j DROP``` throws an error 
itself: iptables: Bad rule (does matching rule exist in that chain?). So 
how can this ever run if running it directly in bash from inside the 
appvm does not work?


On Tuesday, August 6, 2019 at 7:47:53 PM UTC-4, thecodingn...@gmail.com 
wrote:


So apparently the tasket repo does not work|out of the box
(obviously). Working through everything, now ran into an unfamiliar
issue: pre-start firewall check fails with status 1. Looking at the
code it seems the firewall rules are not there although firewall
service is running actively. Executing the for loop in a standalone
bash throws:|
|
|
Fatal:can't open lock file /run/xtables.lock: Permission denied
|
The file is there, but i'm thinking this denial is purposeful and i
prob should not sudo the loop execution. Any advice?


FYI, the qubes lists discourage top-posting. Please reply at the bottom.

The firewall rules should be in 
/rw/config/qubes-firewall.d/90_tunnel-restrict. If they're not, this may 
indicate the setup steps were not followed through to completion (i.e. 
if you installed to your template, but forgot step 4).


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8a77bc32-2dff-64f6-55fd-0f25acdf5faf%40posteo.net.


[qubes-users] Re: Receive-only email VM

2019-08-06 Thread V C
Couldn't you just use a dedicated VM and thunderbird, don't set up outbound 
in thunderbird?

On Tuesday, August 6, 2019 at 1:11:32 AM UTC-5, alex@gmail.com wrote:
>
> Some time ago there was a post on reddit (
> https://www.reddit.com/r/Qubes/comments/9q76f2/splitmail_setup/) that 
> described setting up an offline mail vm. Just kill the "send" part there 
> and you'll get a mail black hole that receivs but never sends. Seems like 
> this is more or less what you want.
>
> On Tuesday, August 6, 2019 at 5:06:54 AM UTC+3, redd...@vfemail.net wrote:
>>
>> In Qubes, is it possible to set up a VM that can receive email, but not 
>> send information out, via email or otherwise?
>>
>> The motivation is: Many online accounts rely on an email address to reset 
>> passwords. However, the VM that handles inbound emails, processes a lot of 
>> untrusted input. If the VM gets compromised by an attacker, the attacker 
>> can then send password reset emails and read them. So to defend against 
>> this, I want to prevent the compromised VM from communicating out the 
>> contents of these password reset emails.
>>
>> Specifically:
>> 1. Assume the VM is compromised (can't rely on in-VM enforcement 
>> mechanisms).
>> 2. Assume the email provider is not compromised
>>
>> To further illustrate the problem, here are example setups and why they 
>> don't work:
>>
>> Setup 1: Use qubes firewall to restrict to the email provider's server 
>> and IMAP port. Block UDP requests using qvm-firewall.
>> Why it doesn't work: Attacker can create an account on the same email 
>> provider and connect to their account (the firewall rules will not prevent 
>> this). They can then sync emails containing any data, to their account.
>>
>> Setup 2: Like Setup 1, but use POP3.
>> Why it doesn't work: Attacker creates account at provider, transmits data 
>> via POP3 delete operations.
>>
>> Does anyone have a email setup with this inbound-only property, ideally 
>> that does not require running their own email server?
>>
>> Thank you.
>>
>>
>> -
>> This free account was provided by VFEmail.net - report spam to 
>> ab...@vfemail.net
>>  
>> *ONLY AT VFEmail!* - Use our *Metadata Mitigator*™ to keep your email 
>> out of the NSA's hands! 
>> $24.95 ONETIME Lifetime accounts with Privacy Features!
>> No Bandwidth Quotas!   15GB disk space! 
>> Commercial and Bulk Mail Options! 
>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9973f5d0-72a8-494f-bb6b-65124b247392%40googlegroups.com.


[qubes-users] Re: Runing qubes on macbook air (11 ince) mid 2012

2019-08-06 Thread V C
Never seen any body do it...would be cool to see!

On Saturday, August 3, 2019 at 1:20:00 PM UTC-5, 27casa...@gmail.com wrote:
>
> will it work to run qubes on this macbook?
>
> After all it has a i5 processor 4 gigs of ram.
>
> In my opinion this is by far the best ultrabook around in this price range.
>
> Would be grate if some one could tell me.
>
> Thanks for youre time and support 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ff0b99ee-5b2d-4a31-977f-5dcbf8150a0b%40googlegroups.com.


Re: [qubes-users] Is there a Step-by-step?

2019-08-06 Thread V C
I am a layman that gets Qubes to work...the only thing different I do 
different then awokd, is I use a Mac and terminal to create a bootable 
thumb with .iso. Tons of articles and tutorials...likely not as secure. 
Default to awokd he/she is smarter...

Other tips:
1) I had to play with my bios to install (F1 and ctrl/shift to enter?)
2) Get a Lenovo or well documented , compatible laptop. Start with that 
then upgrade if you can/want...Lenovo T450 and 420 has worked for me.

Qubes is the only way to go for me...thanks Qubes devs and others! Don't 
give up...

On Tuesday, August 6, 2019 at 1:35:09 AM UTC-5, awokd wrote:
>
> Ryan Michael: 
> > 
> > More details below, but they're irrelevant to my question: is there a 
> > clear, step-by-step how-to guide for installing qubes? Like, without all 
> > the jargon and knowledge.. assumptions, I guess? If so, could you please 
> > link me or help me find it?  I'm struggling so much (see below). If one 
> > doesn't exist, I really think one is crucial to qubes being accessible. 
> > Despite my research and determination, i'm about to give up, aha. 
>
> https://www.qubes-os.org/doc/installation-guide/ is probably the closest 
> there is. I gently suggest considering learning a bit of GNU/Linux 
> first. I went from Windows 7 to a year or two on Debian desktop before 
> Qubes, but you could also set up an Ubuntu VM in Virtualbox on Windows 
> to get some practice with it. 
>
> If you want to dive in to Qubes, the abbreviated steps are 
> -do a full system backup 
> -download ISO 
> -copy to USB drive per Rufus screenshot in above link 
> -boot from USB drive 
> -follow prompts, noting you can erase your entire hard drive so be sure 
> to do a full backup first 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/73b32ddc-f33e-4012-ba92-aade50f78dcb%40googlegroups.com.


Re: [qubes-users] handling DNS resolution when running comercial VPNs

2019-08-06 Thread thecodingninjaisback
Running ```sudo iptables -C FORWARD -o eth0 -j DROP``` throws an error 
itself: iptables: Bad rule (does matching rule exist in that chain?). So 
how can this ever run if running it directly in bash from inside the appvm 
does not work?

On Tuesday, August 6, 2019 at 7:47:53 PM UTC-4, thecodingn...@gmail.com 
wrote:
>
> So apparently the tasket repo does not work out of the box (obviously). 
> Working through everything, now ran into an unfamiliar issue: pre-start 
> firewall check fails with status 1. Looking at the code it seems the 
> firewall rules are not there although firewall service is running actively. 
> Executing the for loop in a standalone bash throws:
> Fatal: can't open lock file /run/xtables.lock: Permission denied
> The file is there, but i'm thinking this denial is purposeful and i prob 
> should not sudo the loop execution. Any advice?
>
>
> On Tuesday, August 6, 2019 at 11:09:27 AM UTC-4, Chris Laprise wrote:
>>
>> On 8/6/19 10:42 AM, thecodingn...@gmail.com wrote: 
>> > Hello, 
>> > 
>> > I have a commercial VPN that does not have any options to pass a DNS 
>> > handling script. Following how i setup my qubes: sys-net <> 
>> sys-firewall 
>> > <> VPN <> AppVm. As you see here I've setup a service vm named VPN 
>> where 
>> > the VPN software is installed. I've also tried the other variation 
>> which 
>> > is to have an additional firewall between VPN and AppVm. Neither setup 
>> > works for browsing although the VPN is connecting as expected and AppVm 
>> > can do IP pings (DNS ping for same address fails), but no web browsing 
>> > is available which i suspect is due to no DNS handling setups. I have 
>> > spent so much time trying to figure this out that I'm now left 
>> > frustrated. Is there a way to do this DNS handling at system level 
>> > rather than relying on VPN software to do that? If so, then how do i go 
>> > about it? 
>> > 
>> > PS: Is there a difference between the two setups at all? what is the 
>> > advantage of having an additional firewall between VPN and AppVm? 
>> > 
>> > OS: Qubes 4 
>> > VPN Software: Proprietary based on openvpn 
>>
>> Hi, 
>>
>> There is a VPN guide in the doc section: 
>>
>> https://www.qubes-os.org/doc/vpn/ 
>>
>> The CLI section is a very manual way to do it, but it shows how DNS 
>> support is implemented in Qubes and provides some Qubes-specific 
>> firewall protection. The Network Manager section can be useful if your 
>> VPN provider has instructions for setting up the connection in NM. 
>>
>> A more automated and reliable way to setup VPNs is to use 
>> Qubes-vpn-support: 
>>
>> https://github.com/tasket/Qubes-vpn-support 
>>
>> Most VPN services that are based on openvpn will offer downloadable 
>> configuration files for openvpn. You can drop such config files into 
>> Qubes-vpn-support and they should work. 
>>
>> OTOH, the 'proprietary' VPN apps are not a good fit for Qubes 
>> networking. You can probably use them in each AppVM where you run your 
>> browsers or other apps, but they won't handle DNS or firewall security 
>> properly in a ProxyVM (the kind of 'provides network' VM you setup like 
>> a firewall). 
>>
>> A separate firewall VM is not required as your ProxyVM will behave just 
>> like a firewall in Qubes 4. This is assuming you trust the VPN software 
>> not to be attacked/exploited in some way (and IMO this is a rather low 
>> risk). 
>>
>> -- 
>>
>> Chris Laprise, tas...@posteo.net 
>> https://github.com/tasket 
>> https://twitter.com/ttaskett 
>> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886 
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/59fc239b-3e65-4f80-bc4e-569a44e1fff3%40googlegroups.com.


Re: [qubes-users] handling DNS resolution when running comercial VPNs

2019-08-06 Thread thecodingninjaisback
So apparently the tasket repo does not work out of the box (obviously). 
Working through everything, now ran into an unfamiliar issue: pre-start 
firewall check fails with status 1. Looking at the code it seems the 
firewall rules are not there although firewall service is running actively. 
Executing the for loop in a standalone bash throws:
Fatal: can't open lock file /run/xtables.lock: Permission denied
The file is there, but i'm thinking this denial is purposeful and i prob 
should not sudo the loop execution. Any advice?


On Tuesday, August 6, 2019 at 11:09:27 AM UTC-4, Chris Laprise wrote:
>
> On 8/6/19 10:42 AM, thecodingn...@gmail.com  wrote: 
> > Hello, 
> > 
> > I have a commercial VPN that does not have any options to pass a DNS 
> > handling script. Following how i setup my qubes: sys-net <> sys-firewall 
> > <> VPN <> AppVm. As you see here I've setup a service vm named VPN where 
> > the VPN software is installed. I've also tried the other variation which 
> > is to have an additional firewall between VPN and AppVm. Neither setup 
> > works for browsing although the VPN is connecting as expected and AppVm 
> > can do IP pings (DNS ping for same address fails), but no web browsing 
> > is available which i suspect is due to no DNS handling setups. I have 
> > spent so much time trying to figure this out that I'm now left 
> > frustrated. Is there a way to do this DNS handling at system level 
> > rather than relying on VPN software to do that? If so, then how do i go 
> > about it? 
> > 
> > PS: Is there a difference between the two setups at all? what is the 
> > advantage of having an additional firewall between VPN and AppVm? 
> > 
> > OS: Qubes 4 
> > VPN Software: Proprietary based on openvpn 
>
> Hi, 
>
> There is a VPN guide in the doc section: 
>
> https://www.qubes-os.org/doc/vpn/ 
>
> The CLI section is a very manual way to do it, but it shows how DNS 
> support is implemented in Qubes and provides some Qubes-specific 
> firewall protection. The Network Manager section can be useful if your 
> VPN provider has instructions for setting up the connection in NM. 
>
> A more automated and reliable way to setup VPNs is to use 
> Qubes-vpn-support: 
>
> https://github.com/tasket/Qubes-vpn-support 
>
> Most VPN services that are based on openvpn will offer downloadable 
> configuration files for openvpn. You can drop such config files into 
> Qubes-vpn-support and they should work. 
>
> OTOH, the 'proprietary' VPN apps are not a good fit for Qubes 
> networking. You can probably use them in each AppVM where you run your 
> browsers or other apps, but they won't handle DNS or firewall security 
> properly in a ProxyVM (the kind of 'provides network' VM you setup like 
> a firewall). 
>
> A separate firewall VM is not required as your ProxyVM will behave just 
> like a firewall in Qubes 4. This is assuming you trust the VPN software 
> not to be attacked/exploited in some way (and IMO this is a rather low 
> risk). 
>
> -- 
>
> Chris Laprise, tas...@posteo.net  
> https://github.com/tasket 
> https://twitter.com/ttaskett 
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe56a8c0-1163-4bbb-b0c5-50aa9b31d1ba%40googlegroups.com.


[qubes-users] Re: [QubesOS/qubes-issues] Support for HiDPI (#1951)

2019-08-06 Thread Sven Semmler
On 8/6/19 9:46 AM, Abdullah Alansari wrote:
> 2. I will try to figure out how to use `xrandr` to add a 3840x2160 with 200% 
> zoom. I did some research before but I couldn't find any fast solutions and 
> will need to understand `xrandr` more to do what I need.

xrandr knows nothing about "200% zoom" it only deals in resolution (e.g.
3840x2160)

Your "200% zoom" is implemented by GTK/Gnome and Qt. The easiest way to
get there is to use gnome-tweaks and qt5ct.

Also: this is an issue tracker for Qubes and since you understand now
that it's actually not an issue with Qubes it would be kind if you'd
close the issue and move further discussion over to the
qubes-users@googlegroups.com mailing list.

/Sven

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/18f18291-e844-6836-6271-2be3f3236cf1%40SvenSemmler.org.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Autoconnect to VPN not working in fedora based AppVM

2019-08-06 Thread 'awokd' via qubes-users
799:
> Hello,
> 
> For my corporate work I am running a custom build AppVM which is based on a
> fedora-30-minimal package with some additional packages.
> I am using the gnome network manager applet with the openconnect plugin to
> connect to our corporate VPN (Cisco Anyconnect).
> This is working fine, but I would like to have the VPN started as soon as
> the VM boots up.
> Normally this can be done, by right clicking network manager icon, choose
> "Edit Connection" then edit the settings for the Ethernet connection (VM
> uplink eth0), open the "General Tab" and enable "[x] Automatically connect
> to vpn" and choose the VPN connection which I have configured.
> 
> Unfortunately this setting will not survive the boot of the AppVM,
> therefore I think the setting is saved somewhere where the AppVM has no
> write possibility and therefore the setting will be forgotten when I
> shutdown the AppVM.
> 
> QUESTION:
> How can I make this change permanent or do you another idea how to launch
> the VPN connection upon start of the AppVM?
> 
I think /rw/config/NM-system-connections is a bind-dir to
/etc/NetworkManager/system-connections, which is where network
connections usually get saved. You would think the edit you described
would be saved in the same place. Try making it, then doing a sudo grep
-ris vpnhostname inside /etc to see where it is getting saved. You
should then be able to https://www.qubes-os.org/doc/bind-dirs/ it to
have it persist. The connection files are plain text so they might give
a hint where to look too.

You could also maybe put a script command in /rw/config/rc.local to
start openconnect.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a481f1ef-e3d0-c288-38d7-3940a747e745%40danwin1210.me.


[qubes-users] Autoconnect to VPN not working in fedora based AppVM

2019-08-06 Thread 799
Hello,

For my corporate work I am running a custom build AppVM which is based on a
fedora-30-minimal package with some additional packages.
I am using the gnome network manager applet with the openconnect plugin to
connect to our corporate VPN (Cisco Anyconnect).
This is working fine, but I would like to have the VPN started as soon as
the VM boots up.
Normally this can be done, by right clicking network manager icon, choose
"Edit Connection" then edit the settings for the Ethernet connection (VM
uplink eth0), open the "General Tab" and enable "[x] Automatically connect
to vpn" and choose the VPN connection which I have configured.

Unfortunately this setting will not survive the boot of the AppVM,
therefore I think the setting is saved somewhere where the AppVM has no
write possibility and therefore the setting will be forgotten when I
shutdown the AppVM.

QUESTION:
How can I make this change permanent or do you another idea how to launch
the VPN connection upon start of the AppVM?

- O.

PS: those are the steps to build my office AppVM (initiated from dom0):

basetemplate=fedora-30-minimal
worktemplatevm=t-fedora-30-work
WorkAppVM=my-office

qvm-clone $basetemplate $worktemplatevm

qvm-run --auto --user root --pass-io --no-gui $worktemplatevm \
  'dnf install -y emacs keepass libreoffice gedit gimp gnome-terminal
firefox \
  nano git mc terminus-fonts less unzip dejavu-sans-fonts pinentry-gtk \
  qubes-gpg-split qubes-core-agent-networking qubes-usb-proxy
pulseaudio-qubes \
  gstreamer gstreamer-plugins-base libffi libpng12 libXScrnSaver
libsigc++20 \
  pangox-compat xclip iputils iproute \
  # qubes-core-agent-qrexec qubes-core-agent-systemd polkit
notification-daemon qubes-input-proxy-sender'

### AnyConnect VPN - OpenConnect
qvm-run --auto --pass-io --no-gui --user root $worktemplatevm \
 'dnf -y install NetworkManager-openconnect network-manager-applet
qubes-core-agent-network-manager \
  NetworkManager-openconnect-gnome NetworkManager-vpnc-gnome
NetworkManager-openvpn-gnome NetworkManager-openvpn'

# Add network-manager to Qubes Settings > Services
qvm-service --enable $WorkAppVM network-manager

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2vhk1WGQ9R8qr%2BycqTFhGy%2BVKGguyC0vLQ7NzDeqWJqHg%40mail.gmail.com.


Re: [qubes-users] handling DNS resolution when running comercial VPNs

2019-08-06 Thread Chris Laprise

On 8/6/19 10:42 AM, thecodingninjaisb...@gmail.com wrote:

Hello,

I have a commercial VPN that does not have any options to pass a DNS 
handling script. Following how i setup my qubes: sys-net <> sys-firewall 
<> VPN <> AppVm. As you see here I've setup a service vm named VPN where 
the VPN software is installed. I've also tried the other variation which 
is to have an additional firewall between VPN and AppVm. Neither setup 
works for browsing although the VPN is connecting as expected and AppVm 
can do IP pings (DNS ping for same address fails), but no web browsing 
is available which i suspect is due to no DNS handling setups. I have 
spent so much time trying to figure this out that I'm now left 
frustrated. Is there a way to do this DNS handling at system level 
rather than relying on VPN software to do that? If so, then how do i go 
about it?


PS: Is there a difference between the two setups at all? what is the 
advantage of having an additional firewall between VPN and AppVm?


OS: Qubes 4
VPN Software: Proprietary based on openvpn


Hi,

There is a VPN guide in the doc section:

https://www.qubes-os.org/doc/vpn/

The CLI section is a very manual way to do it, but it shows how DNS 
support is implemented in Qubes and provides some Qubes-specific 
firewall protection. The Network Manager section can be useful if your 
VPN provider has instructions for setting up the connection in NM.


A more automated and reliable way to setup VPNs is to use Qubes-vpn-support:

https://github.com/tasket/Qubes-vpn-support

Most VPN services that are based on openvpn will offer downloadable 
configuration files for openvpn. You can drop such config files into 
Qubes-vpn-support and they should work.


OTOH, the 'proprietary' VPN apps are not a good fit for Qubes 
networking. You can probably use them in each AppVM where you run your 
browsers or other apps, but they won't handle DNS or firewall security 
properly in a ProxyVM (the kind of 'provides network' VM you setup like 
a firewall).


A separate firewall VM is not required as your ProxyVM will behave just 
like a firewall in Qubes 4. This is assuming you trust the VPN software 
not to be attacked/exploited in some way (and IMO this is a rather low 
risk).


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/341bd739-021a-6c80-756c-eb890cde7179%40posteo.net.


[qubes-users] handling DNS resolution when running comercial VPNs

2019-08-06 Thread thecodingninjaisback
Hello,

I have a commercial VPN that does not have any options to pass a DNS 
handling script. Following how i setup my qubes: sys-net <> sys-firewall <> 
VPN <> AppVm. As you see here I've setup a service vm named VPN where the 
VPN software is installed. I've also tried the other variation which is to 
have an additional firewall between VPN and AppVm. Neither setup works for 
browsing although the VPN is connecting as expected and AppVm can do IP 
pings (DNS ping for same address fails), but no web browsing is available 
which i suspect is due to no DNS handling setups. I have spent so much time 
trying to figure this out that I'm now left frustrated. Is there a way to 
do this DNS handling at system level rather than relying on VPN software to 
do that? If so, then how do i go about it?

PS: Is there a difference between the two setups at all? what is the 
advantage of having an additional firewall between VPN and AppVm?

OS: Qubes 4
VPN Software: Proprietary based on openvpn

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4f8203be-70e6-4196-8d35-2f3881f028a7%40googlegroups.com.


[qubes-users] Re: Runing qubes on macbook air (11 ince) mid 2012

2019-08-06 Thread Daniil Travnikov
Also you can post about your try here :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b526c80a-98f7-4dc7-b14e-ed381c2f389a%40googlegroups.com.