Re: [qubes-users] Qubes can't FDE?

2018-09-18 Thread get
вторник, 18 сентября 2018 г., 20:16:10 UTC+3 пользователь Jonathan Seefelder 
написал:
> yes its possible, do you want to encrypt /boot and /root separately so
> you will need a different password for each partition, or do you want to
> encrypt it all together with 2fa etc?
> 
> The first one is relatively easy, you will have to modify the grub.cfg
> of your coreboot image.Also, the uuid will have to match, you can either
> do a "normal" install and change the uuid in the grub.cfg, or change the
> uuid of  /root.
> 
> check out the libreboot-side, there should be all the necessary
> information. I will write a tutorial some day.
> 
> cheers
> 
> 
> On 9/18/18 1:02 PM, 'awokd' via qubes-users wrote:
> 
> > get:
> >> FDE in my understanding this is a scheme partition look like
> >>
> >> sda  8:00 9,9G  0 disk 
> >> └─sda1   8:10 9,9G  0 LUKS
> >> └──luks-   crypt
> >> ├─qubes_dom0-boot   lvm /boot (encrypted)
> >> ├─qubes_dom0-swap   lvm [SWAP] (encrypted)
> >> └─qubes_dom0-root   lvm  / (encrypted)
> >>
> >> FDE = cryptsetup whole disk (including /boot). Not only root partition.
> >> Anaconda can't do it by default. Installation success only with grub 
> >> missing.
> >> OS research HEADS can't kexec into FDE disk.
> >>
> >> Is it only possible to boot from grub2 coreboot ?
> >>
> >> cryptomount -a
> >> set root='hd0,msdos1'
> >> linux=... vmlinuz=...
> >>
> >> I have been trying to do the coreboot firmware for a month already 
> >> to get a load of Qubes with full disk encryption (including /boot). Is it 
> >> possible? Can anyone help me ?:)
> > I've seen others on this list report it as successful, but haven't done
> > it myself. I think they had to use the Seabios payload for the initial
> > install, then switch to coreboot's grub2. Afraid that's about all I know...
> >
> -- 
> Kind Regards 
> Jonathan Seefelder
> CryptoGS IT-Security Solutions

Hi, Jonathan Seefelder.

I'm looking for different ways of how to encrypt the whole disk (include /boot) 
and load it using coreboot modifications.

I know how to load this way Parabola FDE (include /boot)

menuentry 'Linux-libre kernel' {
cryptomount -a (ahci0,msdos1)
set root='lvm/matrix-rootvol'
linux /boot/vmlinuz-linux-libre root=/dev/matrix/rootvol 
cryptdevice=/dev/sda1:root
initrd /boot/initramfs-linux-libre.img
 }
 
Is the same method for xen?

Did you try Heads/Petitboot?

https://www.raptorengineering.com/content/kb/1.html
https://github.com/osresearch/heads

Did you try to add 
https://en.wikipedia.org/wiki/PBKDF2 to grub use qubes FDE?

Did you try add gpg keys?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0734ef03-a091-46a8-9e3f-456fa392c595%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes can't FDE?

2018-09-18 Thread get
вторник, 18 сентября 2018 г., 20:02:19 UTC+3 пользователь awokd написал:
> get:
> > FDE in my understanding this is a scheme partition look like
> > 
> > sda  8:00 9,9G  0 disk 
> > └─sda1   8:10 9,9G  0 LUKS
> > └──luks-   crypt
> > ├─qubes_dom0-boot   lvm /boot (encrypted)
> > ├─qubes_dom0-swap   lvm [SWAP] (encrypted)
> > └─qubes_dom0-root   lvm  / (encrypted)
> > 
> > FDE = cryptsetup whole disk (including /boot). Not only root partition.
> > Anaconda can't do it by default. Installation success only with grub 
> > missing.
> > OS research HEADS can't kexec into FDE disk.
> > 
> > Is it only possible to boot from grub2 coreboot ?
> > 
> > cryptomount -a
> > set root='hd0,msdos1'
> > linux=... vmlinuz=...
> > 
> > I have been trying to do the coreboot firmware for a month already 
> > to get a load of Qubes with full disk encryption (including /boot). Is it 
> > possible? Can anyone help me ?:)
> 
> I've seen others on this list report it as successful, but haven't done
> it myself. I think they had to use the Seabios payload for the initial
> install, then switch to coreboot's grub2. Afraid that's about all I know...

Hi, awokd. I agree, this is also the only way I know.

http://www.zerocat.org/coreboot-machines/md_doc_build-coreboot-x220.html
http://www.zerocat.org/coreboot-machines/md_doc_build-coreboot-x230.html

Do you mean that? seabios (main) + grub2(elf payload)

I'm trying to learn HEADS, but it's quite difficult. there is a built-in 
cryptsetup and kexec. but I have not yet found the information how to boot 
without a loader to FDE Qubes (include /boot use kexec. Also branch "master" 
only 4.7 coreboot version, 
found this
https://github.com/flammit/heads/tree/coreboot-4.8
I can not compile (build fails).

Also I tried to add gpg keys to the firmware
https://libreboot.org/docs/gnulinux/grub_hardening.html#GPG keys

cfbstool test.rom print - writes that everything is fine, but after the flash 
firmware in the heads (initrd/etc/.gnupg) there are no keys

seal-totp works strange.

Have you any experience?

unfortunately, too little information is available



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fddee08c-0703-4540-bb53-0d220ae927c6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes can't FDE?

2018-09-18 Thread get
FDE in my understanding this is a scheme partition look like

sda  8:00 9,9G  0 disk 
└─sda1   8:10 9,9G  0 LUKS
└──luks-   crypt
├─qubes_dom0-boot   lvm /boot (encrypted)
├─qubes_dom0-swap   lvm [SWAP] (encrypted)
└─qubes_dom0-root   lvm  / (encrypted)

FDE = cryptsetup whole disk (including /boot). Not only root partition.
Anaconda can't do it by default. Installation success only with grub missing.
OS research HEADS can't kexec into FDE disk.

Is it only possible to boot from grub2 coreboot ?

cryptomount -a
set root='hd0,msdos1'
linux=... vmlinuz=...

I have been trying to do the coreboot firmware for a month already 
to get a load of Qubes with full disk encryption (including /boot). Is it 
possible? Can anyone help me ?:)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/694e85c7-a80d-4334-a2c5-5a35764fa900%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Has anyone tried to run non-classical OS/nix* on the Qubes 4 machine?

2018-08-08 Thread get
For example, NixOS/GuixSD/Sabotage/Plan9 and other.
Any guides please?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/849357db-0483-40da-a9e6-c83b83abb4e2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: Testing new VPN code for Qubes

2018-05-12 Thread get
среда, 18 апреля 2018 г., 0:13:29 UTC+3 пользователь Chris Laprise написал:
> Hello fellow Qubes users:
> 
> Per issue 3503 the Qubes project would like to incorporate VPN features 
> from Qubes-vpn-support -- which a number of you are already using -- 
> into the Qubes 4.1 release.
> 
> I've set up a new project "qubes-tunnel" to act as a staging area for 
> testing and eventual forking into Qubes. It is nearly the same as 
> Qubes-vpn-support except some names & paths are different... and install 
> to template is required for obvious reasons :) .
> 
> 
> Project Link... https://github.com/tasket/qubes-tunnel
> 
> 
> Everyone with an available VPN service is welcome to try this out and 
> report here on your results!
> 
> -
> 
> PS - Some of you will wonder if installing qubes-tunnel into an existing 
> template already used for Qubes-vpn-support will cause a conflict; They 
> will not conflict as long as the two services aren't enabled for the 
> same ProxyVM(s).
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

Hi. script not working more on debian-9/fedora-26. Please fix it.

Tested vpn's : mullvad, privateinternetaccess, expressvpn and multiple random 
openvpn.

Guides: 
https://github.com/tasket/Qubes-vpn-support
https://github.com/tasket/qubes-doc/blob/tunnel/configuration/vpn.md#set-up-a-proxyvm-as-a-vpn-gateway-using-the-qubes-tunnel-service
https://github.com/tasket/qubes-tunnel


 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0fa39509-f292-4cca-b547-978aad4b7b16%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: issues with qubes fedora and debian repos

2018-04-10 Thread get
Unfortunately ftp.qubes-os.org "down"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37bf3f50-fd8c-408f-915a-a3f4197b86ff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.