[qubes-users] disabling qubes-network and qubes-firewall serivces not supported with debian 9?

2017-12-21 Thread joonas . lehtonen
Hi, I'm in the progress to migrate a custom fedora-based proxyVM to a debian 9 template, because debian's longer support cycles. On my fedora proxyVM I simply disabled qubes-network and qubes-firewall to be in full control of the firewall rules and forwarding. When I disable these services on

Re: [qubes-users] Unable to start VM after renaming in Qubes Manager

2017-12-16 Thread joonas . lehtonen
> The data is stored in the private.img file in that folder. > > You can either create a new qube, and then attach the file: > qvm-block -A dom0:/var/lib/qubes/appvms/oldname /private.img > then mount /dev/xvdi in , and extract the data from > /mnt/home/user > OR: mount the private.img file in

[qubes-users] Unable to start VM after renaming in Qubes Manager

2017-12-14 Thread joonas . lehtonen
Hello, it looks like I got hit by a severe problem that prevents me from starting an appvm I searched the bugtracker and it looks like: https://github.com/QubesOS/qubes-issues/issues/2054 I also renamed a VM and it no longer starts. The folder under /var/lib/qubes/appvms/oldname is still

Re: [qubes-users] feedback for todays kernel-qubes-vm update (4.4.55-11)

2017-04-19 Thread Joonas Lehtonen
Marek Marczykowski-Górecki: > On Tue, Apr 18, 2017 at 10:54:00AM +0000, Joonas Lehtonen wrote: > > >> Joonas Lehtonen: >>> Hi, >>> >>> just a quick notice about todays kernel update. >>> >>> After upgrading, the new kernel 4.4.55

Re: [qubes-users] qvm-ls says: "WARNING: VM has corrupted files!

2017-04-18 Thread Joonas Lehtonen
Joonas Lehtonen: > Hi, > > do I need to worry about that warning? (VMs work fine) > How can I fix it? This was related to the recent dom0 kernel update for VMs and fixed with: qvm-prefs -s kernel default -- You received this message because you are subscribed to the Google Gr

[qubes-users] feedback for todays kernel-qubes-vm update (4.4.55-11)

2017-04-18 Thread Joonas Lehtonen
Hi, just a quick notice about todays kernel update. After upgrading, the new kernel 4.4.55 became the new default for all VMs that previously used the default kernel, but VMs would no longer boot because they claim that an old kernel the one that got removed during the upgrade (4.4.11?) is no

Re: [qubes-users] Re: debian 9 kernel (needed for wifi driver) but failing to build u2mfn against 4.9.0

2017-04-18 Thread Joonas Lehtonen
Reg Tiangha: > On 04/17/2017 03:45 PM, Joonas Lehtonen wrote: >> Hi, >> >> I need debian's kernel because the Qubes kernel does not provide the >> needed network driver. >> >> I'm following the steps here to install the in-VM kernel, instead of t

[qubes-users] debian 9 kernel (needed for wifi driver) but failing to build u2mfn against 4.9.0

2017-04-17 Thread Joonas Lehtonen
Hi, I need debian's kernel because the Qubes kernel does not provide the needed network driver. I'm following the steps here to install the in-VM kernel, instead of the one provided by dom0: https://www.qubes-os.org/doc/managing-vm-kernel/ The debian 9 template boots fine with pvgrub but

[qubes-users] remote code execution via UDP packets (CVE-2016-10229) in the context of Qubes // and kernel update recommendations

2017-04-13 Thread Joonas Lehtonen
https://nvd.nist.gov/vuln/detail/CVE-2016-10229 > udp.c in the Linux kernel before 4.5 allows remote attackers to > execute arbitrary code via UDP traffic [...] fixed in [1] (2015-12-30) It never affected Fedora according to: https://bugzilla.redhat.com/show_bug.cgi?id=1439740#c2 > This fix was

Re: [qubes-users] for people using MAC randomization (debian 9 tmpl): you might want to avoid hostname leaks via DHCP too

2017-04-10 Thread Joonas Lehtonen
>> Once your MAC address is randomized you might also want to prevent the >> disclosure of your netvm's hostname to the network, since "sys-net" >> might be a unique hostname (that links all your random MAC addresses and >> the fact that you likely use qubes). > >> To prevent the hostname leak

[qubes-users] for people using MAC randomization (debian 9 tmpl): you might want to avoid hostname leaks via DHCP too

2017-04-09 Thread Joonas Lehtonen
Hi, if you setup MAC randomization via network manager in a debian 9 template as described here: https://www.qubes-os.org/doc/anonymizing-your-mac-address/ you still leak your hostname. Once your MAC address is randomized you might also want to prevent the disclosure of your netvm's hostname to

Re: [qubes-users] ANN: Qubes network server

2017-04-01 Thread Joonas Lehtonen
Hi, before trying it: Is it still maintained? (working with Qubes 3.2) If so: There are a few formatting errors in the readme that make it hard to read https://github.com/Rudd-O/qubes-network-server/blob/master/README.md thanks, Joonas -- You received this message because you are subscribed

[qubes-users] debian 9: guid/qrexec crashes (fixed by enabling stretch-testing repo+updating)

2017-03-31 Thread Joonas Lehtonen
Hi, just in case others are having similar problems: I'm running Qubes 3.2. I created a fresh debian 9 by upgrading from debian 8. Today the terminal in debian 9 started crashing (closing). In the logs I saw: U2MFN_GET_MFN_FOR_PAG: get_user_pages failed, ret=0x2 (or similar -

Re: [qubes-users] Qubes-Whonix DisposableVM documentation created

2017-03-26 Thread Joonas Lehtonen
Are there any optimizations planed? whonix-ws-dvm takes >50 seconds to start fedora-24-dvm takes <10 seconds to start -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email

Re: [qubes-users] show NetworkManager for AppVM? (aka AppVM with WiFi device in Hotspot Mode)

2017-03-25 Thread Joonas Lehtonen
thank you unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to

[qubes-users] show NetworkManager for AppVM? (aka AppVM with WiFi device in Hotspot Mode)

2017-03-21 Thread Joonas Lehtonen
Hi, I'd like to use the WiFi adapter in my laptop in hotspot mode. Target setup: wired-netvm <->proxyvm <-> hotspotVM (has the wifi device assigned) (hotspotVM acts as an access point to other devices) Creating a NetVM with gets the WiFi adapter assigned and using NetworkManager to create a

Re: [qubes-users] Re: Why doesn't whonix-gw run the latest 0.2.8.x tor?

2017-01-29 Thread Joonas Lehtonen
cezg...@gmail.com: > My guess is lack of time and funding. Qubes definitely could need > better funding. The Qubes team are doing a great job, but they might > be limited on what they can manage to get done because there are so > many things on the to-do list. > > Maybe this will change with

[qubes-users] Why doesn't whonix-gw run the latest 0.2.8.x tor?

2017-01-29 Thread Joonas Lehtonen
Hi, whonix-gw apparently uses tor 0.2.8.10, the latest 0.2.8.x version being 0.2.8.12 (released 2016-12-19). Why is it not updated? I guess there is very little risk in upgrading from 0.2.8.10 to 0.2.8.12. I'm using a default whonix-gw template with deb http://deb.whonix.org jessie main >From

Re: [qubes-users] qvm-create-default-dvm modifying initial memory value?

2016-12-15 Thread Joonas Lehtonen
When I look at whonix-ws-dvm "initial memory" it says: ~2800MB >>> I changed that to 1000MB and everything works again. >>> >>> Why that high? > >> since its preset value was over 2800 I didn't want to reduce it to much >> but I just found out that something changes that value. (I did

Re: [qubes-users] qvm-create-default-dvm modifying initial memory value?

2016-12-15 Thread Joonas Lehtonen
Andrew David Wong: > I don't understand. Isn't the target TemplateVM shut down when > qvm-create-default-dvm is called? How could it be using any memory > while it's shut down? This is not about the initial memory of the used templateVM (in this case whonix-ws) but about whonix-ws-dvm. (qubes

Re: [qubes-users] qvm-create-default-dvm running out of space

2016-12-15 Thread Joonas Lehtonen
>> I haven't encountered this before, but it sounds like the Tor Browser >> update might've pushed you over the default 2 GB size limit. Maybe try >> increasing the size of your DVM template? > > Storing savefile in /dev/shm (tmpfs - stored in RAM only) is an > optimization to load it faster.

[qubes-users] qvm-create-default-dvm running out of space

2016-12-15 Thread Joonas Lehtonen
Hi, when trying to recreate the dvm after the latest torbrowser update I get: qvm-create-default-dvm whonix-ws [...] DVM savefile created successfully. cp: error writing '/dev/shm/qubes/current-savefile': No space left on device And DVM starting fails after that obviously. Do I have to

Re: "What does "supported" mean"? was: Re: [qubes-users] Fedora 24 Template for Qubes 3.1?

2016-11-22 Thread Joonas Lehtonen
Marek Marczykowski-Górecki: > So, expect Fedora 24 template being supported in R3.1 soon too :) Thank you! Looking forward to the announcement. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving

[qubes-users] Fedora 24 Template for Qubes 3.1?

2016-11-20 Thread Joonas Lehtonen
Hi, since Qubes 3.1 is supported until 2017-03-29 according to https://www.qubes-os.org/doc/supported-versions/ does that mean we will see a Fedora 24 template for R3.1 before Fedora 23 reaches EOL? thanks, Joonas -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Trying to do an in-place upgrade from 3.1.17 to 3.2

2016-11-05 Thread Joonas Lehtonen
Richard: > I'm trying to upgrade my Qubes 3.1.17 to 3.2 I've followed the steps > outlined here: https://www.qubes-os.org/doc/upgrade-to-r3.2/ However, when I > run... > >sudo qubes-dom0-update --releasever=3.2 qubes-release > > I receive: > Nothing to do > I'm also

Re: [qubes-users] Security announcement mailing list? [and others]

2016-10-23 Thread Joonas Lehtonen
>> I'm not sure if it worth it. There is not much such announcements. On >> the other hand, this may be exactly the reason for having a separate >> mailing list for this. I would also love to see a QSB-announce mailing (especially because qubes-users is quite active, and only subscribing to