Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upadd UpdateVM setting to qubes-vm-settings #3412
Comments
adrelanos
referenced this issue
Dec 19, 2017
Open
UpdateVM for templates always defaults to sys-net #3118
andrewdavidwong
added
bug
C: core
UX
labels
Dec 19, 2017
andrewdavidwong
added this to the Release 4.0 milestone
Dec 19, 2017
marmarek
referenced this issue
Feb 5, 2018
Open
templates update over clearnet even when UpdateVM set to sys-whonix #3527
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
adrelanos
Feb 23, 2018
Member
Should this ticket have the qubes-manager tag?
Dunno if qubes-vm-settings is considered part of QVMM.
I think this is primarily a GUI rather than core issue.
|
Should this ticket have the |
andrewdavidwong
added
C: qubes-manager
and removed
C: core
labels
Feb 23, 2018
andrewdavidwong
assigned
marmarta
Feb 23, 2018
added a commit
to marmarta/qubes-manager
that referenced
this issue
Mar 16, 2018
marmarta
referenced this issue
in QubesOS/qubes-manager
Mar 16, 2018
Merged
Minor textual update for Global Settings #80
qubesos-bot
referenced this issue
in QubesOS/updates-status
Mar 28, 2018
Closed
manager v4.0.17 (r4.0) #468
andrewdavidwong
modified the milestones:
Release 4.0,
Release 4.0 updates
Mar 31, 2018
marmarta
modified the milestones:
Release 4.0 updates,
Release 4.1
Jul 15, 2018
adrelanos
referenced this issue
Jul 17, 2018
Open
Updates fail when update proxy VM not already running #4096
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
adrelanos commentedDec 19, 2017
Qubes OS version:
R4
Affected TemplateVMs:
dom0
Steps to reproduce the behavior:
open
qubes-vm-settingsExpected behavior:
Should have UpdateVM setting.
Actual behavior:
Does not have UpdateVM setting.
General notes:
Cloning a TempalteVM is a natural step, even an encouraged one. The newly introduced burden in Qubes R4 that one has to edit dom0 configuration after cloning a template is a big usability issue.
NetVM being set to
nonefor TemplateVMs (especially Whonix TemplateVMs) is very confusing for most users. (User question: "How shall I upgrade without a network connection.") Many users will think this is wrong and will manually set a NetVM.Users who clone their
whonix-gw/whonix-wswill very likely have a clearnet leak, will have them upgrades through clearnet rather than Tor which is clearly unexpected. (#3118) It is very non-obvious and difficult to learn that one has to edit dom0/etc/qubes-rpc/policy/qubes.UpdatesProxy.Therefore I suggest adding to
qubes-vm-settingsan UpdateVM setting below its NetVM setting.I wouldn't call it UpdatesProxy rather than UpdateVM, because UpdateVM makes more sense for users.
Related issues:
#3118