New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider adding option 'none' to set Default NetVM #2252

Closed
entr0py opened this Issue Aug 16, 2016 · 7 comments

Comments

4 participants
@entr0py

entr0py commented Aug 16, 2016

Qubes 3.1 currently auto-starts the Default NetVM.

If whonix-gw is the default NetVM and there are proxyVM(s) that whonix-gw is connected to, then the entire chain will start at boot. This behavior is undesirable if certain vm's need to be initialized prior to receiving connected vm's. Setting default NetVM to another VM such as sys-net presents privacy risks so is not an acceptable workaround.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Aug 16, 2016

Member

Quoting Marek:

"The default netvm is started by qubes-netvm dom0 service. If you don't want that, simply disable the service."

Source: https://groups.google.com/d/msg/qubes-users/8dya28aBpko/9vYJN6uRZFQJ

Does this resolve the issue?

Member

andrewdavidwong commented Aug 16, 2016

Quoting Marek:

"The default netvm is started by qubes-netvm dom0 service. If you don't want that, simply disable the service."

Source: https://groups.google.com/d/msg/qubes-users/8dya28aBpko/9vYJN6uRZFQJ

Does this resolve the issue?

@entr0py

This comment has been minimized.

Show comment
Hide comment
@entr0py

entr0py Aug 16, 2016

Yes, thank you.

entr0py commented Aug 16, 2016

Yes, thank you.

@entr0py entr0py closed this Aug 16, 2016

@entr0py

This comment has been minimized.

Show comment
Hide comment
@entr0py

entr0py Aug 18, 2016

Since I've disabled qubes-netvm.service, I'm unable to automatically start ANY vm's. Is there a service that requires After=qubes-netvm.service?

If this result is expected, I'd like to reopen this issue. I think it's useful to be able to auto start sys-net, sys-usb, etc without launching a chain of proxyVMs / whonix-gateway.

entr0py commented Aug 18, 2016

Since I've disabled qubes-netvm.service, I'm unable to automatically start ANY vm's. Is there a service that requires After=qubes-netvm.service?

If this result is expected, I'd like to reopen this issue. I think it's useful to be able to auto start sys-net, sys-usb, etc without launching a chain of proxyVMs / whonix-gateway.

@entr0py entr0py reopened this Aug 18, 2016

@entr0py

This comment has been minimized.

Show comment
Hide comment
@entr0py

entr0py Aug 18, 2016

grep shows that both qubes-vm@.service and qubes-reload-firewall@.service come After=qubes-netvm.service. I don't know what these do yet.

edit: So qubes-vm@.service IS responsible for auto-starting vm's that are not related to the default netVM. Hacky thing would be to change qubes-vm & qubes-reload-firewall to start where qubes-netvm would normally start. but that's probably more tinkering than I should do. Would be nicer to have "none" option in Qubes Manager!

entr0py commented Aug 18, 2016

grep shows that both qubes-vm@.service and qubes-reload-firewall@.service come After=qubes-netvm.service. I don't know what these do yet.

edit: So qubes-vm@.service IS responsible for auto-starting vm's that are not related to the default netVM. Hacky thing would be to change qubes-vm & qubes-reload-firewall to start where qubes-netvm would normally start. but that's probably more tinkering than I should do. Would be nicer to have "none" option in Qubes Manager!

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Dec 23, 2016

This could be considered a security issue:

A user that does not want a netvm starting at boot time may be concerned that a likely-compromised netvm would send tracking info via nearby wifi routers. Turning-on the generally untrusted NICs automatically could be a bad idea for some users. They should have the option of disabling it without sacrificing system usability.

tasket commented Dec 23, 2016

This could be considered a security issue:

A user that does not want a netvm starting at boot time may be concerned that a likely-compromised netvm would send tracking info via nearby wifi routers. Turning-on the generally untrusted NICs automatically could be a bad idea for some users. They should have the option of disabling it without sacrificing system usability.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Dec 24, 2016

Member

@tasket: The issue you describe should be addressed by #2533 (or perhaps this one in combination with #2533).

Member

andrewdavidwong commented Dec 24, 2016

@tasket: The issue you describe should be addressed by #2533 (or perhaps this one in combination with #2533).

@andrewdavidwong andrewdavidwong added this to the Release 4.0 milestone Dec 24, 2016

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 7, 2017

Member

Done.

Member

marmarek commented Jul 7, 2017

Done.

@marmarek marmarek closed this Jul 7, 2017

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment