- User Since
- Feb 7 2015, 6:48 PM (269 w, 3 d)
Aug 19 2015
I am still working on this. I spent 3 days on it a few weeks ago. I ended up reviewing the source code of many packages, and did a short audit on packagekit and gnome-packagekit to find ways to resolve issue.
Aug 15 2015
Go nuts at it ;)
Aug 12 2015
It would be nice to eliminate anything that is not Qubes specific in qubes-whonix pacakge completely, or as much as possible. Anything you can take out of it by intergrating into Whonix would be a good thing.
Aug 7 2015
I am pretty sure that is a yes too :)
Jul 14 2015
I did have a look at the software over the weekend, which BTW is GNU GPL v3 licensed.
Jul 10 2015
I will have to take a look at the current source of software-center and play around with it a bit to be able to provide that answer. I will look into it this weekend :)
Jul 5 2015
Does for me:
qubesdb-read /qubes-vm-type ->TemplateVM
I agree inventing a new gui updater is not ideal.
Jul 4 2015
Or what about writing some utility, maybe even part of a wrapper that verifies the source.list sources first?
I have not tested it lately, but the same goes for the regular Debian templates ... sort of.
Yes to all the questions
Jul 1 2015
I replied to comments in the Qubes ML thread you created :)
Jun 30 2015
I see your point.
Jun 28 2015
Do you mean TemplateVM or dom0.
Jun 24 2015
Jun 23 2015
I will revert the change for now by adding a comment to the configuration file that sets the path.
Jun 19 2015
I can revert to use original path although if talking about 'reasonable expectations for uniform default behaviour' and wanting to keep all the Whonix variations similar we may want to consider changing the path for all the other versions as well then since the /home/user/opt is the proper and defacto standard location path to install pre-built personal/private binary applications that are not XDG aware.
Jun 15 2015
What ya mean? Is it causing issues? In following standards or defacto standards the ~/opt directory is the correct spot to place pre-built packages that do not adhere to XDG specs.
Jun 11 2015
Its now in etc/whonix.d/40_qubes:WHONIXCHECK_NO_EXIT_ON_UNSUPPORTED_VIRTUALIZER="1"
since I was still getting those errors in Whonix 10.
Jun 7 2015
Could you just not change the apparmor-profile?
Works well, thank you.
Jun 6 2015
Your PR will not merge as I made too many changes today. I already changed the qubes-whonix code to use --wait (https://github.com/nrgaway/qubes-whonix/blob/Whonix11/usr/lib/qubes-whonix/init/whonix-firewall-plugin.sh
- Error when attempting to update in Whonix 10
The Qubes build script will fail the install of the template if any apt-get errors are returned.
Just happened again when booting... I have to to detect it now
Jun 5 2015
I think an option make more sense, so as not to confuse existing users on other platforms like virtualbox. I personally do not like any non standard directory within ~/home/user unless its a .hidden directory.
Jun 4 2015
I tried to use a systemd drop in snippet but it did not work for ifup@.service.
The only reason is since I was under impression the file will be downloaded and may fail, compared to downloading the file initially and knowing it won't fail since the file is already in local repo directory.
I currently have it tied into the GATEWAY_IPv4_DROP_INVALID_INCOMING_PACKAGES_POST_HOOK hook.
I start it as user; never usually start a program as root.
Jun 3 2015
You just place it in the ~/bin directory. That's where all of my 'personal' binaries go that are not part of a package.
It should fail as the build would not be complete.
I noticed tor-browser installs in the root of the users home directory.
May 31 2015
Currently Setup is run differently for the Template vs an AppVM.
May 26 2015
I don't consider enable SystemdUnit hacks if there are no other deb-installer solutions to ensure a proper state.
May 22 2015
Thanks for all the info. I will test it out over the weekend!
@Patrick I was wondering if this is working in regular Whonix 10? If so can you give me some clues on how to troubleshoot it (startup scripts, configuration locations, expected firewall rules) since I have never used it before
May 21 2015
I guess just not using spaces would be the way to go. I used to not use spaces, but then added them as it seems like that should be supported and works with systemd, just not the deb-systemd-helper
May 20 2015
That's a nasty upstream bug for deb-systemd-helper. You would have thought that would have been fixed for Jessie stable release. Do you know if there is a reported issue on it upstream?
May 18 2015
Those are already disabled. As well, I have already created a systemd rule for whonix-initializer and just created one for swap-file-creator. As stated I have the rads one already from your PR
May 17 2015
My understanding is distribution package file go in /lib/systemd/system.
May 16 2015
Let me know when you start this.
Resolved with qubes-whonix unreleased 9.6.9 and 10
Marek says he sees improvement. I may too; its hard to tell at this point; need a few more dozen builds to get a better idea.
No longer an issue with 126.96.36.199.4-developers-only
With --target qubes I get following error:
May 15 2015
I be testing it soon. Looks like only new options are --unsafe-io true and --target qubes
I have already reviewed your PRs and there is nothing I can see to prevent build errors and I have also merged them into a test branch I am using for building this weekend. Will merge into master once everything confirmed working.
The qubes-whonix-tor.service was implemented to solve the issue you were talking about where Tor would sometimes not start properly on boot.
sd_notify would be used if you want to have watchdog monitor the service. If the service does not respond within X amount of seconds (IE did not send a notification it was still active within this time period), then systemd would then restart the service.
May 10 2015
May 3 2015
- HOW TO RE-INSTALL qubes-whonix
May 2 2015
Is the 188.8.131.52.7-developers-only tag supposed to be available? While most submodules are cloning properly, I get this error:
May 1 2015
I was able to identify all the issue that prevented complete and successful build.
- What to do if you ran a apt-get dist-upgrade not using the upgrade method above
Apr 30 2015
- Testers Update instructions
Thanks, tests are successful for me.
Apr 29 2015
@Patrick, I created a new version that hopefully solves the control-port-filter-python not re-enabling properly... I had a typo in the maintainers postinst configuration file.
Maybe you want to give an upgrade a try. The required qubes package is now also in the ITL test repo so you should be able to attempt an update. DO NOT FORGET TO BACKUP (CLONE) your existing whonix proxy :)