Details
Dec 8 2022
Still works for me, still not reproducible. Old ticket. Therefore closing. Please re-report in the new issue tracker (and link to this old ticket) should this still be an issue.
Aug 13 2020
Aug 12 2020
After running a bunch of tcp ping tests, the conclusion is this attack
is not really effective against TCP like ICMP. The latency is much lower
for TCP pings and though it slightly decreases with cpu stress it is not
consistent. Reloading pages in TBB with cpu stress
on/off does not impact latency readings while doing so with tc
attached has massive latency foot prints - implying it will ironically make such attacks much easier in addition to degrading performance.
Aug 7 2020
Cyrus recommends adding delays per packet to disrupt inter-packet patterns that remain. The command can be fine tuned as such:
Aug 1 2020
The good news is I think I've figured out the equivalent tc-netem command looking the slot parameter in the manual:
May 30 2020
Ticket above closed and convo moved to tails-dev.
Dec 23 2019
We should be able to create a drop-in file at /lib/systemd/system/user-.slice.d/ and add something such as
Dec 22 2019
Nov 23 2019
Could you add to git please?
Works.
Try adding:
Oct 15 2019
Oct 13 2019
Analysis by Cyrus cited here for completion:
Oct 6 2019
Reported build failures:
When an implementation is decided, let's decide if we can include this in security-misc for use on Linux hosts and Kicksecure. We would need some way in detecting the active NIC since on wireless systems wlan0 is the interface of choice and not eth0
tc-netem is a utility that is part of the iproute2 package in Debian. It leverages functionality already built into Linux and userspace utilities to simulate networks including packet delays and loss.
Jul 27 2019
Looks like mine.
Jul 25 2019
<?xml encoding="UTF-8" version="1.0"?> <actions> <action> <icon>utilities-terminal</icon> <name>Open Terminal Here</name> <unique-id>1555514114536034-1</unique-id> <command>exo-open --working-directory %f --launch TerminalEmulator</command> <description>Example for a custom action</description> <patterns>*</patterns> <startup-notify/> <directories/> </action> <action> <icon>folder-copy</icon> <name>Copy to VM</name> <unique-id>1507455450991127-4</unique-id> <command>/usr/lib/qubes/qvm-actions.sh copy %F</command> <description></description> <patterns>*</patterns> <directories/> <audio-files/> <image-files/> <other-files/> <text-files/> <video-files/> </action> <action> <icon>folder-move</icon> <name>Move to VM</name> <unique-id>1507455437157027-3</unique-id> <command>/usr/lib/qubes/qvm-actions.sh move %F</command> <description></description> <patterns>*</patterns> <directories/> <audio-files/> <image-files/> <other-files/> <text-files/> <video-files/> </action> <action> <icon>document-open</icon> <name>Open in VM</name> <unique-id>1507455471075266-5</unique-id> <command>/usr/lib/qubes/qvm-actions.sh openvm %F</command> <description></description> <patterns>*</patterns> <audio-files/> <image-files/> <other-files/> <text-files/> <video-files/> </action> <action> <icon>gtk-convert</icon> <name>Convert in DisposableVM</name> <unique-id>1507455488971315-6</unique-id> <command>/usr/lib/qubes/qvm-actions.sh pdf %F</command> <description></description> <patterns>*.pdf</patterns> <other-files/> </action> <action> <icon>gtk-convert</icon> <name>Convert in DisposableVM</name> <unique-id>1507455503129941-7</unique-id> <command>/usr/lib/qubes/qvm-actions.sh img %F</command> <description></description> <patterns>*</patterns> <image-files/> </action> <action> <icon>document-open</icon> <name>Edit in DisposableVM</name> <unique-id>1507455559234996-8</unique-id> <command>/usr/lib/qubes/qvm-actions.sh opendvm %F</command> <description></description> <patterns>*</patterns> <audio-files/> <image-files/> <other-files/> <text-files/> <video-files/> </action> <action> <icon>document-open</icon> <name>View in DisposableVM</name> <unique-id>1507455559234997-9</unique-id> <command>/usr/lib/qubes/qvm-actions.sh viewdvm %F</command> <description></description> <patterns>*</patterns> <audio-files/> <image-files/> <other-files/> <text-files/> <video-files/> </action> </actions>
Jun 27 2019
Work for me too in new build https://forums.whonix.org/t/qubes-whonix-15-templatevms-debian-buster-based-4-0-1-201906232114-testers-wanted/7601
Jun 21 2019
I cannot reproduce. I've installed qubes-template-whonix-15-4.0.1-201905241112, updated it with qubes testing repository enabled and I see all the actions available in thunar.
But I do see some warnings on thunar's stderr, like this:
(Thunar:27375): Gtk-WARNING **: 01:41:41.317: Refusing to add non-unique action 'uca-action-1507455450991127-4' to action group 'ThunarActions'
Looks like actions are added multiple times to /etc/xdg/Thunar/uca.xml, which is later copied to /home/user/.cnfig/Thunar/uca.xml. Relevant code in https://github.com/QubesOS/qubes-core-agent-linux/blob/master/debian/qubes-core-agent-thunar.postinst
Jun 20 2019
Any idea why these are missing? @marmarek
- Copy to VM
- Move to VM
- Create Archive...
Jun 14 2019
Might be fixed with upgrades / (over) next Qubes-Whonix images.
Apr 14 2019
Apr 6 2019
Reducing the number of lingering, unrealistic tickets, therefore closing.
Feb 18 2019
Looks like nothing more to do here.
Since grsecurity is not a thing anymore, closing this as invalid.
Feb 16 2019
I also noticed the file "~/.tb/first-boot-home-population.done" which suggests that whonix does something on first boot
Feb 14 2019
To build a package with qubes-builder, you need to add Makefile.builder file with just one line: DEBIAN_BUILD_DIRS := debian. This will tell qubes-builder that given repository contains Debian package.
Alternatively, if that would be too much of a problem, it should be easy to add an option that do auto detection (probably just looks for debian directory).