[qubes-users] checking allocated disk space

2020-02-17 Thread pixel fairy
trying to see how much space is allocated, not actually used in all the 
qubes. is there an easy command for this? something like qvm-volume info 
but for all the qubes?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2104823c-c9c1-4fc9-aa9c-090863f09825%40googlegroups.com.


[qubes-users] dom0 journalctl errors in red

2020-02-17 Thread anon

Hello ,

I see this all in red, I'm not sure what it's trying to tell me ?  
increase dom0 memory allocation or ?



Xen free = 387860283 too small for satisfy assignments! 
assigned_but_unused=379654787, domdict={'23': {'mem_used': 352968704, 
'slow_memset_react': False, 'last_target': 1720813675, 'no_progress': 
False, 'memory_current': 1682808832, 'memory_maximum': 4194304000, 
'memory_actual': 1699652469, 'id': '23'}, '28': {'mem_used': 297312256, 
'slow_memset_react': False, 'last_target': 1538314176, 'no_progress': 
False, 'memory_current': 1503195136, 'memory_maximum': 4194304000, 
'memory_actual': 1520039249, 'id': '28'}, '15': {'mem_used': None, 
'slow_memset_react': False, 'last_target': 402653184, 'no_progress': 
False, 'memory_current': 402694144, 'memory_maximum': 419430400, 
'memory_actual': 402694144, 'id': '15'}, '18': {'mem_used': 1347514368, 
'slow_memset_react': False, 'last_target': 2831155200, 'no_progress': 
False, 'memory_current': 2814312448, 'memory_maximum': 2831155200, 
'memory_actual': 2831155200, 'id': '18'}, '16': {'mem_used': None, 
'slow_memset_react': False, 'last_target': 150994944, 'no_progress': 
False, 'memory_current': 150994944, 'memory_maximum': 150994944, 
'memory_actual': 150994944, 'id': '16'}, '22': {'mem_used': 759627776, 
'slow_memset_react': False, 'last_target': 3054263423, 'no_progress': 
False, 'memory_current': 2995167232, 'memory_maximum': 3355443200, 
'memory_actual': 3012013357, 'id': '22'}, '0': {'mem_used': 1371455488, 
'slow_memset_react': False, 'last_target': 4294967296, 'no_progress': 
False, 'memory_current': 4211744768, 'memory_maximum': 4294967296, 
'memory_actual': 4294967296, 'id': '0'}, '21': {'mem_used': 1347584000, 
'slow_memset_react': False, 'last_target': 3670016000, 'no_progress': 
False, 'memory_current': 3653173248, 'memory_maximum': 3670016000, 
'memory_actual': 3670016000, 'id': '21'}, '25': {'mem_used': 1162686464, 
'slow_memset_react': False, 'last_target': 4375907382, 'no_progress': 
False, 'memory_current': 4295909376, 'memory_maximum': 4823449600, 
'memory_actual': 4312755167, 'id': '25'}, '19': {'mem_used': 1225986048, 
'slow_memset_react': False, 'last_target': 3512729600, 'no_progress': 
False, 'memory_current': 3495886848, 'memory_maximum': 3512729600, 
'memory_actual': 3512729600, 'id': '19'}, '24': {'mem_used': 313790464, 
'slow_memset_react': False, 'last_target': 1572864000, 'no_progress': 
False, 'memory_current': 1556021248, 'memory_maximum': 1572864000, 
'memory_actual': 1572864000, 'id': '24'}, '20': {'mem_used': 1017421824, 
'slow_memset_react': False, 'last_target': 3899579394, 'no_progress': 
False, 'memory_current': 3913129984, 'memory_maximum': 4194304000, 
'memory_actual': 3913129984, 'id': '20'}, '14': {'mem_used': None, 
'slow_memset_react': False, 'last_target': 150994944, 'no_progress': 
False, 'memory_current': 150994944, 'memory_maximum': 150994944, 
'memory_actual': 150994944, 'id': '14'}, '17': {'mem_used': 339472384, 
'slow_memset_react': False, 'last_target': 1676558755, 'no_progress': 
False, 'memory_current': 1659715584, 'memory_maximum': 4194304000, 
'memory_actual': 1676558755, 'id': '17'}, '13': {'mem_used': None, 
'slow_memset_react': False, 'last_target': 297795584, 'no_progress': 
False, 'memory_current': 297836544, 'memory_maximum': 314572800, 
'memory_actual': 297836544, 'id': '13'}}


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1593141b-2cae-f162-e834-ecf65e4574cf%40riseup.net.


Re: [qubes-users] Wireguard on Debian 10 from Qubes-vpn-support

2020-02-17 Thread Chris Laprise

On 2/17/20 6:09 PM, Daniil Travnikov wrote:
I am looking right now on this guide: 
https://github.com/tasket/Qubes-vpn-support/wiki/Wireguard-VPN-connections-in-Qubes-OS


So have a question: is it possible to do this on Debian 10 ?


Debian 10 now has wireguard packages in 'testing', not just 'unstable'. 
So that is different.


TBH the one time I remember testing this on Debian 10, I did something 
like this:


1. Install the 'kernel-latest-qubes-vm' package in dom0. This will 
provide a 5.x kernel with wireguard module built-in. Set your VPN VM to 
use this kernel.


2. Install only the 'wireguard-tools' package (from testing) in Debian 
10. Otherwise, there may be a conflict between the built-in and DKMS 
modules.


3. Given the above, it may now be possible to skip using HVM mode 
altogether.


--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9986fe3c-f3e8-f336-b8ea-2b025077b03a%40posteo.net.


[qubes-users] Wireguard on Debian 10 from Qubes-vpn-support

2020-02-17 Thread Daniil Travnikov
I am looking right now on this guide: 
https://github.com/tasket/Qubes-vpn-support/wiki/Wireguard-VPN-connections-in-Qubes-OS

So have a question: is it possible to do this on Debian 10 ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9d53386f-c3a0-487c-8896-939da0bed779%40googlegroups.com.


Re: [qubes-users] Telegram desktop installation

2020-02-17 Thread dhorf-hfref . 4a288f10
On Mon, Feb 17, 2020 at 10:49:43AM +0100, 'Ase' via qubes-users wrote:
> I am not sure how to properly install telegram-desktop. 
> As you may know Telegram desktop is a portable application so would
> you install it in the appVM where it is supposed to run or would you
> install it in a TemplateVM? I guess if I install in the templateVM
> -being portable- I cannot run it from an appVM.

not sure what "portable" in this case means, but if you can install
it "as a user" (~= to your homedir) or to /usr/local, you can install
it in the appvm just fine.


> Also side question: how to force updating & upgrading TemplateVM's
> (debian 10 and fedora 30) from terminal rather than waiting for
> notification upgrade popping up in taskbar?

the CLI equiv of rightclick-update in qube manager is:
qvm-run -u root --service SomeTemplateVM qubes.InstallUpdatesGUI

you can add something like
"for t in `qvm-ls | awk '/TemplateVM/{print$1}'`; do ..."
to that for an updatealltemplates.sh



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200217095511.GZ8973%40priv-mua.


[qubes-users] Telegram desktop installation

2020-02-17 Thread 'Ase' via qubes-users
I am not sure how to properly install telegram-desktop. 
As you may know Telegram desktop is a portable application so would you install 
it in the appVM where it is supposed to run or would you install it in a 
TemplateVM? I guess if I install in the templateVM -being portable- I cannot 
run it from an appVM.

Also side question: how to force updating & upgrading TemplateVM's (debian 10 
and fedora 30) from terminal rather than waiting for notification upgrade 
popping up in taskbar?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M0HYQBW--3-2%40keemail.me.


Re: [qubes-users] Running sshd on an AppVM

2020-02-17 Thread dhorf-hfref . 4a288f10
On Mon, Feb 17, 2020 at 08:59:18AM +, tetrahedra via qubes-users wrote:
> like only debian's `apt-search` will search the binary names, fedora's
> `dnf search` appears not to.

dnf whatprovides sshd



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200217090326.GY8973%40priv-mua.


Re: [qubes-users] Running sshd on an AppVM

2020-02-17 Thread tetrahedra via qubes-users

On Mon, Feb 17, 2020 at 08:16:32AM +, tetrahedra via qubes-users wrote:

I need to set up a reverse SSH tunnel -- where a remote machine, behind a
firewall, connects to my local machine, running sshd.

The documentation for exposing a VM port to the outside world is clear
enough.

But sshd doesn't appear to be installed on any template, nor does it
appear to be installable (`dnf search sshd` only returns apache-sshd).

No documentation mentions sshd. There are references to sshd in the
qubes-users archive that indicate sshd used to be available. But it
seems to be no longer available.

How do I set up an SSH server on my AppVM?


Answering my own question:
the package is `openssh-server` (on both Fedora and Debian). It looks
like only debian's `apt-search` will search the binary names, fedora's
`dnf search` appears not to.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200217085918.GA1673%40danwin1210.me.


Re: [qubes-users] Running sshd on an AppVM

2020-02-17 Thread dhorf-hfref . 4a288f10
On Mon, Feb 17, 2020 at 08:16:32AM +, tetrahedra via qubes-users wrote:
> But sshd doesn't appear to be installed on any template, nor does it
> appear to be installable (`dnf search sshd` only returns apache-sshd).

the pkg is called "openssh-server". 
after installing it in the template, i recommend to 
"systemctl disable sshd" in the template (so it wont run in all appvms).

note you may need some appvm-rc.local addon to keep a static
host key with your appvm:

cp -pf /rw/sshd/* /etc/ssh/
chgrp ssh_keys /etc/ssh/*key


> How do I set up an SSH server on my AppVM?

i deviate from the regular "how to do portforwards with qubes" for
this and have a qubes-rpc service that basicly just does 
"exec sudo sshd -i" in the target vms, then do a socat/systemdsocket
bounce to the rpc service straight from sys-net.
that way the "messing with firewalls" is limited to exactly one INPUT
rule in sys-net, plus one qubes-rpc policy, and there are no 
perma-running services in the target vm at all!



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200217082837.GX8973%40priv-mua.


[qubes-users] Running sshd on an AppVM

2020-02-17 Thread tetrahedra via qubes-users

I need to set up a reverse SSH tunnel -- where a remote machine, behind a
firewall, connects to my local machine, running sshd.

The documentation for exposing a VM port to the outside world is clear
enough.

But sshd doesn't appear to be installed on any template, nor does it
appear to be installable (`dnf search sshd` only returns apache-sshd).

No documentation mentions sshd. There are references to sshd in the
qubes-users archive that indicate sshd used to be available. But it
seems to be no longer available.

How do I set up an SSH server on my AppVM?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200217081200.GA1044%40danwin1210.me.