Re: [qubes-users] ANN: Leakproof Qubes VPN

2016-11-09 Thread SEC Tester
Hey Rudd-O, Thanks for your effort and great contribution to the Qubes community. Not sure why Chris was critical, especially without specifically showing evidence of any problems. Maybe just a troll? I haven't tried your program out yet, Im keeping it as my backup option, as im still hoping

Re: [qubes-users] Re: HELP: TemplateVM's have lost internet access

2016-11-09 Thread SEC Tester
Thank you for the reply Unman. You might be right about them never having internet access. Because dnf & yum works, i think i assumed the internet work. The reason i actually found this issues, was because i was ping testing, trying to solve a problem i was having setting up a VPN ProxyVM.

[qubes-users] Re: Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-09 Thread SEC Tester
I've considered leaving network lock off, and building my own custom IP Tables, or firewall rules to stop the leaks. But this is currently beyond my skill set, so would need some hand holding to learn what to do. I have looked at the section here on the Qubes site on how to stop leaks using

[qubes-users] Re: HELP: TemplateVM's have lost internet access

2016-11-09 Thread SEC Tester
Hey Drew, Cheers for the reply. It wasn't possible to 100% follow your instructions; In "Global settings" it doesn't seem possible to set the default "netVM" to "none". It only lists choices of netVM or ProxyVMs. I left it set to "sys-firewall". I followed the rest of your instructions.

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-10 Thread Sec Tester
Thank you Chris & David for the replies. Unfortunately at this stage no one seems to know a solution. I will try out the Qubes VPN guide, as i really need to use my vpn. But will miss the AirVPN GUI features. I hope in time i'll find a way to secure from leaks while still using the GUI.

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread Sec Tester
After further testing, more specifically its a DNS IP leak with the AirVPN GUI with network lock off. I also leak DNS when running OpenVPN in the VPN-Proxy-VM, Havent yet applied Qubes scripts to stop leaks. -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread Sec Tester
I have successfully applied the setup and scripting in https://www.qubes-os.org/doc/vpn/ No more DNS leaks. This means i can atleast use my vpn, until i find a way to make things work with the AirVPN GUI. -- You received this message because you are subscribed to the Google Groups

[qubes-users] Re: proper way to autostart script in dom0

2016-11-12 Thread Sec Tester
maybe it needs to be made exacutable.. from the directory of file in terminal sudo chmod +x /the/directory/of/file/filename.sh -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it,

Re: [qubes-users] Thoughts on Qubes OS Security... Could be improved.

2016-11-14 Thread Sec Tester
> > Why not grsecurity/PaX? especially with Qubes 4 switching to HVM (or PVHv2 or > whatever it's called now), it will apparently work fine. Nice suggestion. I would certainly welcome its implementation. Actually looks like there were successful efforts to implement this back in 2013.

[qubes-users] Re: Improvement: check disk space before copy to VM

2016-11-14 Thread Sec Tester
Could open up a vulnerability if not done carefully. VM could use it to query and identify other VMs in existence on the system. But if it required a dom0 authorization before checking & transferring, should be ok. -- You received this message because you are subscribed to the Google Groups

[qubes-users] Disguising Qubes VMs

2016-11-14 Thread Sec Tester
A thought on security through obfuscation. Right now in terminal is you type: "uname -r" we get the kernel version, which has "qubes" in the name. Straight away the attacker, knows he's dealing with a qubes VM. Could we not name the kernels to match their original OS? And following that same

[qubes-users] Re: Problem creating Win7 HVM

2016-11-21 Thread Sec Tester
I downloaded another Win7_64bit.iso from another source, same problem. >>Getting Stuck at a glowing windows logo Before windows even starts the >>install process. I found the Qubes VM directory dom0 /var/lib/qubes/vm-templates/ And confirmed when i delete the VM, that the VM is deleted from

[qubes-users] Re: Does the Standard Firewall-VM Actaully do anything?

2016-11-16 Thread Sec Tester
It also raises the question, Is there any benefit running a VPN-Proxy-VM through sys-firewall? Or maybe save the overhead and just connect VPN-Proxy-VM directly to sys-Net? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from

Re: [qubes-users] Just Broke Debian-8 Template

2016-11-16 Thread Sec Tester
On Thursday, 17 November 2016 10:33:28 UTC+10, Vít Šesták wrote: > I've tried to replicate it in a DVM and it behaved according to my > expectation: > > When running sudo apt remove imagemagick, it asks me for also removing some > qubes-* packages. The reason is that those packages depend on

[qubes-users] Does the Standard Firewall-VM Actaully do anything?

2016-11-16 Thread Sec Tester
So im finally getting around to rebuilding the sys-firewall VM on a minimal template. Put it off because i thought there would be a lot of scripting to setup. According to documentation, it doesnt need any extra packages. https://www.qubes-os.org/doc/templates/fedora-minimal/ And when creating

Re: [qubes-users] Just Broke Debian-8 Template

2016-11-16 Thread Sec Tester
On Wednesday, 16 November 2016 21:08:14 UTC+10, Unman wrote: > On Wed, Nov 16, 2016 at 10:26:34AM +, Unman wrote: > > On Tue, Nov 15, 2016 at 09:50:58PM -0800, Sec Tester wrote: > > > So i wanted to uninstall that rubbish image editor "imagemagick" > >

[qubes-users] Replacing Dolphin on Whonix-ws

2016-11-17 Thread Sec Tester
I Really dislike Dolphin. Thumbnail previews dont even seem to work, and its kinda annoying to use. I'd like to swap it out for something lite and simple (like the fedora-23 file browser) Just wanted to check thats not going to break anything? Looking at the package removal list, i think it

[qubes-users] Re: Genymotion in Qubes

2016-11-12 Thread Sec Tester
Nice question. I would also like to know. Have you setup a Win7 HVM? This maybe be the best place to try setup Genymotion. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send

Re: [qubes-users] Thoughts on Qubes OS Security... Could be improved.

2016-11-12 Thread Sec Tester
> > This might add significant time to the install, but could be a tick box > > option, with a note about extra time. > > I think a better practice along these lines is to supply the additional > packages needed to create a desktop-friendly template... alongside the > minimal template. This

Re: [qubes-users] Re: #2 .odt files and LibreOffice Install

2016-11-12 Thread Sec Tester
you want to copy the file from your work VM to the fedora-23 template and then install all with terminal? 1)open terminal in your workVM 2)ls (useful to lists directories/files) 3)cd Downloads (or where ever you saved it) 4)qvm-copy-to-vm "DestinationVM" filename

[qubes-users] Re: Installing VPN in Qubes Versus VPN on a Router

2016-11-13 Thread Sec Tester
I guess the main benefit to having VPN on router is it takes that overhead off the PCs CPU & memory. But the paper is right, a lot of network hardware is backdoored. Especially the cisco stuff. And im suspicious of the Chinese stuff too. We should endeavor to run open source routers. But im

[qubes-users] Re: Fedora 24 template available for Qubes 3.2

2016-11-12 Thread Sec Tester
NICE!! Any specific improvements or fixes running Fedora-24? I noticed F-23 seemed to have trouble playing flash videos for me. F-24 Min template coming? A Deb-8 min template would also be nice :) -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] Thoughts on Qubes OS Security... Could be improved.

2016-11-12 Thread Sec Tester
Hi Marek, >On Sunday, 13 November 2016 03:33:50 UTC+10, Marek Marczykowski-Górecki wrote: > > They have basically said, Elite hackers can gain root, so lets just not > > even bother with this foundational layer of security. > > The point is _if_ someone is able to run arbitrary code as user,

Re: [qubes-users] Re: Fedora 24 template available for Qubes 3.2

2016-11-12 Thread Sec Tester
> Yes, it is also available - as noted in the message. And i read too quickly, doh :o) Look forward to taking 24 for a spin. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send

[qubes-users] Thoughts on Qubes OS Security... Could be improved.

2016-11-11 Thread Sec Tester
So Im still new to Qubes, but after going through a bit of a learning curve, building & customizing VM's to suit my security needs, I have a few thoughts on its security. Firstly I really love the direction Qubes has taken the future of operating systems, and its has definitely become my OS of

Re: [qubes-users] Leak Problems with VPN ProxyVM + AirVPN & Network lock

2016-11-11 Thread Sec Tester
> You might get more interest if you explained which features of the AirVPN GUI > are worth having. The Github README is blank. > > I think most openvpn users are content to use the official client since it's > simpler and better audited. The current fail-close solution has also been >

[qubes-users] Problem creating Win7 HVM

2016-11-19 Thread Sec Tester
So using the VM manager i created a Win7 HVM (not a HVM template) I copied over the Win7.iso to a the user directory in dom0 using "qvm-run --pass-io 'cat /path/to/file_in_src_domain' > /path/to/file_name_in_dom0" And ran "qvm-start win7 --cdrom=/home/myusername/Win7.iso" =

Re: [qubes-users] Re: Kaspersky OS

2016-11-20 Thread Sec Tester
The article i read failed to mention it was close source... Totally agree if thats the case. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

[qubes-users] Re: Kaspersky OS

2016-11-19 Thread Sec Tester
Wow just been reading about Kaspersky OS. Dam maybe this could be a new super hardened VM for Qubes..? Apparently not even based on Linux tho, built from the ground up, 14 year project. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] Re: #2 .odt files and LibreOffice Install

2016-11-12 Thread Sec Tester
Your trying to modify the fedora-23 template correct? Is sys-firewall specified as its net VM? If not, set the fedora-23 template NetVM to sys-firewall. Then try "sudo dnf install libreoffice" Do your other app VM's have internet access? If not. Does sys-firewall have sys-net set as its "NetVM"?

[qubes-users] Re: Thoughts on Qubes OS Security... Could be improved.

2016-11-12 Thread Sec Tester
Some examples of Default Root access possibly being exploited in Qubes. === Looks like the DRAMA attack would require root access in VM, to compromises Qubes shared memory "taskset 0x2 sudo ./measure -p 0.7 -s 16." https://groups.google.com/forum/#!topic/qubes-users/qAd8NxcJB3I