Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upSalt - Qubes R4 RC1 - fails to set sys-whonix's NetVM to default (sys-firewall) #3189
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 19, 2017
Member
Does it also happen when you remove sys-whonix and create it from scratch using salt?
|
Does it also happen when you remove sys-whonix and create it from scratch using salt? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
It was created from scratch using salt as far as I understand. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
But #3188 should not apply if you have template already installed. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Is this a duplicate / follow-up issue of #3190? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 19, 2017
Member
While running sudo qubesctl state.sls qvm.sys-whonix it is showing
===== [prefs] =====
[Skipped] netvm: sys-firewall
I assume it was [SKIP] netvm: sys-firewall. That means netvm was already set to sys-firewall (the default value). But later changing provides_network to True made it changed to None as in #3190.
Is this a duplicate / follow-up issue of #3190?
Depends on what we want here. If sys-whonix following default_fw_netvm is ok, then it's dupplicate of #3190. If should be set statically to sys-firewall, regardless of default_*, then it's independent bug.
I assume it was
Depends on what we want here. If |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 19, 2017
Member
BTW default_fw_netvm should be set to sys-net, not sys-firewall. It is a default netvm for "ProxyVMs", which include sys-firewall.
|
BTW |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Oct 19, 2017
Member
|
Marek Marczykowski-Górecki:
> While running sudo qubesctl state.sls qvm.sys-whonix it is showing
>
> ===== [prefs] =====
> [Skipped] netvm: sys-firewall
I assume it was `[SKIP] netvm: sys-firewall`.
Yes.
That means netvm was already set to sys-firewall (the default value). But later changing `provides_network` to `True` made it changed to `None` as in #3190.
I see.
> Is this a duplicate / follow-up issue of #3190?
Depends on what we want here. If `sys-whonix` following `default_fw_netvm` is ok, then it's dupplicate of #3190. If should be set statically to `sys-firewall`, regardless of `default_*`, then it's independent bug.
Alright, let's consider it an independent bug.
Let's keep sys-whonix default NetVM set to sys-firewall. This is what we
decided for R3.2. (Reasoning was iirr: let's see what awesome features
sys-firewall might get in future.)
Maybe we would need a property `default_fw_proxyvm`? Then we regards
Whonix a ProxyVM and set to `default_fw_netvm`?
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Oct 19, 2017
Member
To provide the requested debug output...
qvm-kill sys-whonix
qvm-remove sys-whonix
sudo qubesctl state.sls qvm.sys-whonix
(If that is what you wanted me to test...?)
Currently cannot test this. Blocked by qvm-remove sys-whonix broken for me as per #3193.
|
To provide the requested debug output...
(If that is what you wanted me to test...?) Currently cannot test this. Blocked by |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 19, 2017
Member
Let's keep sys-whonix default NetVM set to sys-firewall. This is what we decided for R3.2. (Reasoning was iirr: let's see what awesome features sys-firewall might get in future.)
I'm not sure what sys-firewall could do with tor traffic, but lets not change this last minute.
I'm not sure what sys-firewall could do with tor traffic, but lets not change this last minute. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Oct 19, 2017
Member
|
Marek Marczykowski-Górecki:
> Let's keep sys-whonix default NetVM set to sys-firewall. This is what we decided for R3.2. (Reasoning was iirr: let's see what awesome features sys-firewall might get in future.)
I'm not sure what sys-firewall could do with tor traffic,
Perhaps something like corridor [1], traffic shaping or whatever other
creative use I cannot envision yet.
but lets not change this last minute.
Yes.
[1] https://www.whonix.org/wiki/Corridor
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Oct 19, 2017
Member
To provide the debug output...
qvm-remove sys-whonix
sudo qubesctl state.sls qvm.sys-whonix
Same is happening.
===== [prefs] =====
[Skipped] netvm: sys-firewall
|
To provide the debug output...
Same is happening.
|
andrewdavidwong
added
bug
C: mgmt
labels
Oct 19, 2017
andrewdavidwong
added this to the Release 4.0 milestone
Oct 19, 2017
andrewdavidwong
added
the
C: Whonix
label
Oct 19, 2017
marmarek
closed this
in
marmarek/qubes-mgmt-salt-dom0-qvm@6a948c8
Oct 20, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Oct 20, 2017
Automated announcement from builder-github
The package qubes-mgmt-salt-dom0-qvm-4.0.5-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Oct 20, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Oct 20, 2017
qubesos-bot
referenced this issue
in QubesOS/updates-status
Oct 20, 2017
Closed
mgmt-salt-dom0-qvm v4.0.5 (r4.0) #278
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Oct 30, 2017
Automated announcement from builder-github
The package qubes-mgmt-salt-dom0-qvm-4.0.5-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
Oct 30, 2017
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
adrelanos commentedOct 19, 2017
Salt - Qubes R4 RC1 - fails to set
sys-whonix's NetVM todefault(sys-firewall)Qubes OS version:
Qubes R4 with all Qubes testing repositories
Affected TemplateVMs:
Dom0
Steps to reproduce the behavior:
Install Qubes R4 with all Qubes testing repositories.
Enable Qubes community templates repository in /etc/yum.repos.d/qubes-templates.repo.
(Did last command because of #3188.)
Expected behavior:
sys-whonix's NetVM set to default (sys-firewall).
Actual behavior:
sys-whonix's NetVM set to none.
General notes:
While running
sudo qubesctl state.sls qvm.sys-whonixit is showingRelated issues:
#2157
#2954