Re: [qubes-users] Has anyone tried pptp in qubes 4.0?

2020-06-13 Thread onelovecisco via qubes-users

Unman, i think we need some external iptables rules to route traffic between 
sys-net and proxy-vm in qubes.

In proxy VM i use - iptables -I INPUT -p 47 -s X.X.X.X -j ACCEPT

iptables -t filter -L -n -v --line-numbers
CNAIN INPUT (policy DROP 0 packets, 0 bytes)

1    0  0    47 *   *  X.X.X.X    0.0.0.0/0

tcpdump -i eth0/wls6 port 1723 -vvv - on sys-net and proxy-vm shows me traffic 
between server and host.

So, maybe try to allow all traffic between sys-net and proxy-vm for experiments?
Or maybe there is something Qubes specific routing? I dont know.

what else can block the connection?


Jun 7, 2020, 18:13 by un...@thirdeyesecurity.org:

> On Sat, Jun 06, 2020 at 08:02:20PM +0200, onelovecisco via qubes-users wrote:
>
>> And i forgot to tell you that pptp doesnt work from sys-net directly else. 
>> Do you know why?
>> Journalctl gives me a little info such like "Modem hangs up".So i cant?? 
>> troubleshooting connection.
>> >From another host it works good. Firewall doesnt block 1723 (telnet and 
>> >ping to server works)
>>  Nat_conntrack enabled in fedora template kernel.
>>
>>
>> Jun 6, 2020, 17:51 by un...@thirdeyesecurity.org:
>>
>> > On Thu, Jun 04, 2020 at 08:25:50PM +0200, 0rb via qubes-users wrote:
>> >
>> >> Telnet 1723 port works and i can ping server?? from 
>> >> sys-net/sys-firewall/proxy-vm
>> >> But connection can't be established from proxy-vm. Modem hangs if watch 
>> >> journalctl | grep ppptp
>> >>
>> >> [user@sys-net ~]$ lsmod | grep pptp
>> >> nf_nat_pptp?? 16384?? 0
>> >> nf_nat_proto_gre 16384?? 1 nf_nat_pptp
>> >> nf_conntrack_pptp?? 16384?? 1 nf_nat_pptp
>> >> nf_conntrack_proto_gre?? 16384?? 1 nf_conntrack_pptp
>> >> nf_nat 36864?? 5 
>> >> nf_nat_ipv4,xt_nat,nf_nat_pptp,nf_nat_proto_gre,xt_REDIRECT
>> >> nf_conntrack?? 163840?? 11 
>> >> xt_conntrack,nf_nat,nft_ct,xt_state,nf_conntrack_pptp,ipt_MASQUERADE,nf_nat_ipv4,xt_nat,nf_nat_pptp,nf_conntrack_proto_gre,xt_REDIRECT
>> >>
>> >> Can anyone help how to use ppptp in QubesOS ?
>> >>
>> >> In 2016 Unman says
>> >>
>> >> First you need to allow INBOUND protocol 47:
>> >> On sys-net:
>> >> modprobe ip_conntrack_pptp
>> >> modprobe ip_nat_pptp
>> >> iptables -I FORWARD -p 47 -s ?? -j ACCEPT
>> >>
>> >> On proxyVM:
>> >> iptables -I INPUT -p 47 -s  -j ACCEPT
>> >>
>> >> Now, zero the iptables counters, (using -Z), and try to start the vpn.
>> >> You should see the counters incrementing both in sys-net and on the
>> >> vpn proxy.
>> >> If the connection fails look to see if any DROP rules are being
>> >> triggered.
>> >> By default PPTP uses tcp port 1723 so you could put in a rule to log
>> >> that traffic :
>> >> iptables -I FORWARD -p tcp --dport 1723 -j LOG
>> >>
>> >> But it doesnt solve the problem.
>> >>
>> >
>> > 4 year old suggestions will rarely work in Qubes, but the principle is
>> > good.
>> > I don't use pptp myself, but have set this up for various users - a little
>> > more information from your end would be useful.
>> > Where are you trying to set up pptp connection from?
>> > What does your Qubes netvm structure look like?
>> > Have you set up firewall rules to allow INBOUND protocol 47?
>> >
>>
>
>
> The convention here is not to top-post.
> Please scroll to the bottom of the message before you start typing. Or
> reply inline.
> It only takes you seconds, makes it much easier to follow threads, and
> cumulatively saves your fellow users hours.
>
> Have you allowed inbound proto 47?
> TCP port 1723 is the control connection, but the pptp tunnel is GRE -
> that's PROTOCOL 47
> It might be helpful if you post your firewall rules
>
> unman
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/20200607151318.GB14422%40thirdeyesecurity.org.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M9hhTC7--3-2%40tuta.io.


[qubes-users] Nested Virtualization works on Qubes 4.0 ?

2020-06-06 Thread onelovecisco via qubes-users
Hi, Qubes Community.

Is it possible to use EVE-NG/GNS3 in template vm ?

build xenial template
apt-add-repository "deb [arch=amd64] http://www.eve-ng.net/repo xenial main"
apt-get update && apt-get dist-upgrade

Will it work? Anyone tried?

-- 
 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M99uDAb--3-2%40tuta.io.


Re: [qubes-users] Has anyone tried pptp in qubes 4.0?

2020-06-06 Thread onelovecisco via qubes-users
And i forgot to tell you that pptp doesnt work from sys-net directly else. Do 
you know why?
Journalctl gives me a little info such like "Modem hangs up".So i cant  
troubleshooting connection.
>From another host it works good. Firewall doesnt block 1723 (telnet and ping 
>to server works)
 Nat_conntrack enabled in fedora template kernel.


Jun 6, 2020, 17:51 by un...@thirdeyesecurity.org:

> On Thu, Jun 04, 2020 at 08:25:50PM +0200, 0rb via qubes-users wrote:
>
>> Telnet 1723 port works and i can ping server?? from 
>> sys-net/sys-firewall/proxy-vm
>> But connection can't be established from proxy-vm. Modem hangs if watch 
>> journalctl | grep ppptp
>>
>> [user@sys-net ~]$ lsmod | grep pptp
>> nf_nat_pptp?? 16384?? 0
>> nf_nat_proto_gre 16384?? 1 nf_nat_pptp
>> nf_conntrack_pptp?? 16384?? 1 nf_nat_pptp
>> nf_conntrack_proto_gre?? 16384?? 1 nf_conntrack_pptp
>> nf_nat 36864?? 5 
>> nf_nat_ipv4,xt_nat,nf_nat_pptp,nf_nat_proto_gre,xt_REDIRECT
>> nf_conntrack?? 163840?? 11 
>> xt_conntrack,nf_nat,nft_ct,xt_state,nf_conntrack_pptp,ipt_MASQUERADE,nf_nat_ipv4,xt_nat,nf_nat_pptp,nf_conntrack_proto_gre,xt_REDIRECT
>>
>> Can anyone help how to use ppptp in QubesOS ?
>>
>> In 2016 Unman says
>>
>> First you need to allow INBOUND protocol 47:
>> On sys-net:
>> modprobe ip_conntrack_pptp
>> modprobe ip_nat_pptp
>> iptables -I FORWARD -p 47 -s ?? -j ACCEPT
>>
>> On proxyVM:
>> iptables -I INPUT -p 47 -s  -j ACCEPT
>>
>> Now, zero the iptables counters, (using -Z), and try to start the vpn.
>> You should see the counters incrementing both in sys-net and on the
>> vpn proxy.
>> If the connection fails look to see if any DROP rules are being
>> triggered.
>> By default PPTP uses tcp port 1723 so you could put in a rule to log
>> that traffic :
>> iptables -I FORWARD -p tcp --dport 1723 -j LOG
>>
>> But it doesnt solve the problem.
>>
>
> 4 year old suggestions will rarely work in Qubes, but the principle is
> good.
> I don't use pptp myself, but have set this up for various users - a little
> more information from your end would be useful.
> Where are you trying to set up pptp connection from?
> What does your Qubes netvm structure look like?
> Have you set up firewall rules to allow INBOUND protocol 47?
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/20200606145106.GB10363%40thirdeyesecurity.org.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M99n2j---3-2%40tuta.io.


Re: [qubes-users] Has anyone tried pptp in qubes 4.0?

2020-06-06 Thread onelovecisco via qubes-users
Hi, Unman!

I talk about default scheme. I know that pptp insecure, but i need it to test 
production multicast in corporate networks.

Clean Qubes install. 
net-vm - fedora 30,31,32.
firewall-vm - fedora 30,31,32
proxy-vm based on debian-10 template provides network and sys-firewall as netvm
(pptp-linux network-manager-pptp network-manager-pptp-gnome packages 
preinstalled)

For any another Linux distro, for example Ubuntu, its enough to establish 
connection and send igmp query over pptp to router. 
Can you advice to me which full iptables firewall rules do i need to enable on 
sys-firewall vm?

Thank you.



-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com


Jun 6, 2020, 17:51 by un...@thirdeyesecurity.org:

> On Thu, Jun 04, 2020 at 08:25:50PM +0200, 0rb via qubes-users wrote:
>
>> Telnet 1723 port works and i can ping server?? from 
>> sys-net/sys-firewall/proxy-vm
>> But connection can't be established from proxy-vm. Modem hangs if watch 
>> journalctl | grep ppptp
>>
>> [user@sys-net ~]$ lsmod | grep pptp
>> nf_nat_pptp?? 16384?? 0
>> nf_nat_proto_gre 16384?? 1 nf_nat_pptp
>> nf_conntrack_pptp?? 16384?? 1 nf_nat_pptp
>> nf_conntrack_proto_gre?? 16384?? 1 nf_conntrack_pptp
>> nf_nat 36864?? 5 
>> nf_nat_ipv4,xt_nat,nf_nat_pptp,nf_nat_proto_gre,xt_REDIRECT
>> nf_conntrack?? 163840?? 11 
>> xt_conntrack,nf_nat,nft_ct,xt_state,nf_conntrack_pptp,ipt_MASQUERADE,nf_nat_ipv4,xt_nat,nf_nat_pptp,nf_conntrack_proto_gre,xt_REDIRECT
>>
>> Can anyone help how to use ppptp in QubesOS ?
>>
>> In 2016 Unman says
>>
>> First you need to allow INBOUND protocol 47:
>> On sys-net:
>> modprobe ip_conntrack_pptp
>> modprobe ip_nat_pptp
>> iptables -I FORWARD -p 47 -s ?? -j ACCEPT
>>
>> On proxyVM:
>> iptables -I INPUT -p 47 -s  -j ACCEPT
>>
>> Now, zero the iptables counters, (using -Z), and try to start the vpn.
>> You should see the counters incrementing both in sys-net and on the
>> vpn proxy.
>> If the connection fails look to see if any DROP rules are being
>> triggered.
>> By default PPTP uses tcp port 1723 so you could put in a rule to log
>> that traffic :
>> iptables -I FORWARD -p tcp --dport 1723 -j LOG
>>
>> But it doesnt solve the problem.
>>
>
> 4 year old suggestions will rarely work in Qubes, but the principle is
> good.
> I don't use pptp myself, but have set this up for various users - a little
> more information from your end would be useful.
> Where are you trying to set up pptp connection from?
> What does your Qubes netvm structure look like?
> Have you set up firewall rules to allow INBOUND protocol 47?
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/20200606145106.GB10363%40thirdeyesecurity.org.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M99l_e---3-2%40tuta.io.


[qubes-users] Windows replacement by ReactOS

2020-05-14 Thread onelovecisco via qubes-users
Hello, Qubes Community!

Is there any news? Really replacing Windows is a great idea.
I found this. But nightly builds iso doesnt work with hvm (disk detection error)

https://groups.google.com/forum/#!searchin/qubes-users/reactos%7Csort:date/qubes-users/QMkUuTMKgbM/nnlrr7kUBgAJ
https://jira.reactos.org/browse/CORE-13358
https://github.com/QubesOS/qubes-issues/issues/2809#issuecomment-377487490


-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7JRCAH--B-2%40tuta.io.


Re: [qubes-users] Is it possible to build any BSD template on QubesOS?

2020-05-14 Thread onelovecisco via qubes-users
If Qubes-builder cannot do this, maybe its possible to migrate template from 
Proxmox or XCP-ng to Qubes?because the hypervisor is the same, Xen... no one 
tried to do this?

-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com


May 14, 2020, 20:42 by qubes-users@googlegroups.com:

> Hello, dhorf-hfref.4a288f10!
> after that basic install, you could try if that OS supports pvh mode
> You mean i need set gui to "false" on hvm and switch hvm to pvh? Or i need 
> install qubes-meta packages on it?
> I read about openbsd and another xen > implementation
> but I don’t understand how it can be applied correctly in Qubes.
> https://wiki.xen.org/wiki/FreeBSD_PVH
> https://xcp-ng.org/forum/topic/2582/guest-tools-for-openbsd/5
>
> ostype=$(sysctl -n kern.ostype)
> osrelease=$(sysctl -n kern.osrelease)
>
> # PV driver version
> hostctl attr/PVAddons/MajorVersion 6
> hostctl attr/PVAddons/MinorVersion 2
> hostctl attr/PVAddons/MicroVersion 0
> hostctl attr/PVAddons/BuildVersion 76888
> hostctl attr/PVAddons/Installed 1
>
> # OS version
> hostctl data/os_name "$ostype $osrelease"
> hostctl data/os_uname $osrelease
> hostctl data/os_distro $ostype
>
> # Update XenStore
> hostctl data/updated 1
>
> -- 
> Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
> https://tutanota.com
>
>
> May 14, 2020, 20:15 by dhorf-hfref.4a288...@hashmail.org:
>
>> On Thu, May 14, 2020 at 06:56:56PM +0200, onelovecisco via qubes-users wrote:
>>
>>> In PHV mode like Fedora-31 or Debian-10. 
>>> Is the Qubes-builder capable of this?
>>>
>>
>> qubes-builder most certainly can not build bsd templates.
>>
>> but like almost any PC OS, you can install it in hvm mode, 
>> and that should give you a single graphical interface window, 
>> xl console and network access.
>>
>> after that basic install, you could try if that OS supports pvh mode.
>> but that is probably an interesting can of worms.
>>
>
>
>
>
> --
>  You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
>  To unsubscribe from this group and stop receiving emails from it, send an 
> email to > qubes-users+unsubscr...@googlegroups.com> .
>  To view this discussion on the web visit > 
> https://groups.google.com/d/msgid/qubes-users/M7JGymo--7-2%40tuta.io 
> <https://groups.google.com/d/msgid/qubes-users/M7JGymo--7-2%40tuta.io?utm_medium=email&utm_source=footer>>
>  .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7JJoQ5--3-2%40tuta.io.


Re: [qubes-users] Is it possible to build any BSD template on QubesOS?

2020-05-14 Thread onelovecisco via qubes-users
Hello, dhorf-hfref.4a288f10!
after that basic install, you could try if that OS supports pvh mode
You mean i need set gui to "false" on hvm and switch hvm to pvh? Or i need 
install qubes-meta packages on it?
I read about openbsd and another xen implementation
but I don’t understand how it can be applied correctly in Qubes.
https://wiki.xen.org/wiki/FreeBSD_PVH
https://xcp-ng.org/forum/topic/2582/guest-tools-for-openbsd/5

ostype=$(sysctl -n kern.ostype)
osrelease=$(sysctl -n kern.osrelease)

# PV driver version
hostctl attr/PVAddons/MajorVersion 6
hostctl attr/PVAddons/MinorVersion 2
hostctl attr/PVAddons/MicroVersion 0
hostctl attr/PVAddons/BuildVersion 76888
hostctl attr/PVAddons/Installed 1

# OS version
hostctl data/os_name "$ostype $osrelease"
hostctl data/os_uname $osrelease
hostctl data/os_distro $ostype

# Update XenStore
hostctl data/updated 1

-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com


May 14, 2020, 20:15 by dhorf-hfref.4a288...@hashmail.org:

> On Thu, May 14, 2020 at 06:56:56PM +0200, onelovecisco via qubes-users wrote:
>
>> In PHV mode like Fedora-31 or Debian-10. 
>> Is the Qubes-builder capable of this?
>>
>
> qubes-builder most certainly can not build bsd templates.
>
> but like almost any PC OS, you can install it in hvm mode, 
> and that should give you a single graphical interface window, 
> xl console and network access.
>
> after that basic install, you could try if that OS supports pvh mode.
> but that is probably an interesting can of worms.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7JGymo--7-2%40tuta.io.


[qubes-users] Is it possible to build any BSD template on QubesOS?

2020-05-14 Thread onelovecisco via qubes-users
Hello, Qubes Community.

In PHV mode like Fedora-31 or Debian-10. 
Is the Qubes-builder capable of this?

I once did it on 3.1 version, but now this is no longer relevant. 
https://www.qubes-os.org/doc/netbsd/
and I could only get there through "xl console"


-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7J6WR9--3-2%40tuta.io.


[qubes-users] Qubes and Salt question

2020-05-14 Thread onelovecisco via qubes-users
Hello, Qubes Community!

Can you help me how to correctly use Salt in dom0 for automate tasks.
For example, i need to clone debian-10 template and install toolchain on it.

apt install -y \
build-essential \
zlib1g-dev uuid-dev libdigest-sha-perl \
libelf-dev \
bc \
bzip2 \
bison \
flex \
git \
gnupg \
iasl \
m4 \
nasm \
patch \
python \
wget \
gnat \
cpio \
ccache \
pkg-config \
cmake \
libusb-1.0-0-dev \
pkg-config \
texinfo \

Qubes Salt files stored at /srv folder as root. 
where do i need to put my custom *.sls files?and how launch it use qubesctl 
from dom0?
Thanks.
-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7J0Asf--3-2%40tuta.io.