Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upQubes Global Settings crash when updating default netVM #3567
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
donob4n
Feb 11, 2018
It seems that your 'sys-vpn-mullvad' netVM is set to default netVM so changing the default netVM is causing a loop. Try setting it to sys-net or sys-firewall before editing default netVM.
donob4n
commented
Feb 11, 2018
|
It seems that your 'sys-vpn-mullvad' netVM is set to default netVM so changing the default netVM is causing a loop. Try setting it to sys-net or sys-firewall before editing default netVM. |
andrewdavidwong
added
bug
C: qubes-manager
labels
Feb 11, 2018
andrewdavidwong
added this to the Release 4.0 milestone
Feb 11, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
micahflee
Feb 12, 2018
When I open Qubes Global Settings the UI says my default netVM is sys-firewall. I can change it to sys-net and save, and that works fine. When I open it again, the UI says it's sys-net. But if I then change it to sys-vpn-mullvad, I get the same crash. But I can successfully change it back to sys-firewall -- so apparently it's just changing it to my custom proxyVM that's causes it.
After trying (and failing) to set it to sys-vpn-mullvad, when I open fedora-26 dispVM its netVM is sys-firewall, so apparently it's not actually set.
What are the terminal commands for adjusting the global settings?
micahflee
commented
Feb 12, 2018
|
When I open Qubes Global Settings the UI says my default netVM is After trying (and failing) to set it to What are the terminal commands for adjusting the global settings? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
donob4n
Feb 12, 2018
@micahflee I meant to change sys-vpn-mullvad to sys-net or sys-firewall before changing the default netVM, have you tried?
donob4n
commented
Feb 12, 2018
|
@micahflee I meant to change sys-vpn-mullvad to sys-net or sys-firewall before changing the default netVM, have you tried? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
micahflee
Feb 12, 2018
I'm not sure what you mean. In Qubes Global Settings I can change the default netVM to either sys-net or sys-firewall, and saving works fine. If I try changing it to sys-vpn-mullvad, I get that crash (no matter what it was before). And sys-vpn-mullvad's netVM is sys-firewall.
micahflee
commented
Feb 12, 2018
|
I'm not sure what you mean. In Qubes Global Settings I can change the default netVM to either |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
micahflee
Feb 12, 2018
I've also reproduced this problem on two separate computers with different hardware running Qubes 4.0.
micahflee
commented
Feb 12, 2018
|
I've also reproduced this problem on two separate computers with different hardware running Qubes 4.0. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 12, 2018
Member
Make sure sys-vpn-mullvad's netvm is set to "sys-firewall", not "default (sys-firewall)".
|
Make sure sys-vpn-mullvad's netvm is set to "sys-firewall", not "default (sys-firewall)". |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
micahflee
Feb 12, 2018
Excellent, that fixed it.
Maybe this step could be automatic, because it's not immediately intuitive that there's a difference between "default (sys-firewall)" and "sys-firewall".
micahflee
commented
Feb 12, 2018
|
Excellent, that fixed it. Maybe this step could be automatic, because it's not immediately intuitive that there's a difference between "default (sys-firewall)" and "sys-firewall". |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Maybe some tooltip/help text there? @marmarta @andrewdavidwong |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
micahflee
Feb 12, 2018
Or maybe Qubes Global Settings can catch this error and display some sort of instructions if a user hits it.
micahflee
commented
Feb 12, 2018
|
Or maybe Qubes Global Settings can catch this error and display some sort of instructions if a user hits it. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Feb 13, 2018
Member
Maybe some tooltip/help text there?
Sounds like a great candidate for #2211.
Perhaps something like:
"default (<vm-name>) denotes the NetVM currently set as the system-wide default. If you change the system-wide default to a different NetVM, then any VM currently set to use default (<vm-name>) will use the new NetVM. If you want a VM to keep using the currently displayed <vm-name> even if the system-wide default changes, select <vm-name> (without the word default in front of it) directly from the list."
This could be clearer, but it's a start.
Sounds like a great candidate for #2211. Perhaps something like: " This could be clearer, but it's a start. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
donob4n
Feb 13, 2018
What do you think about changing the behavior of 'default netVM'? I think that it would be better to use it only for 'default netVM' selection when doing new domains.
Currently, apart of problems like this, it has too wide side effects. It's pretty easy to change the NetVM of a domain (or more) that you didn't want to.
donob4n
commented
Feb 13, 2018
|
What do you think about changing the behavior of 'default netVM'? I think that it would be better to use it only for 'default netVM' selection when doing new domains. Currently, apart of problems like this, it has too wide side effects. It's pretty easy to change the NetVM of a domain (or more) that you didn't want to. |
added a commit
to marmarta/qubes-manager
that referenced
this issue
Feb 13, 2018
marmarta
referenced this issue
in QubesOS/qubes-manager
Feb 13, 2018
Merged
Bunch of UI improvements #68
added a commit
to marmarta/qubes-manager
that referenced
this issue
Feb 13, 2018
qubesos-bot
referenced this issue
in QubesOS/updates-status
Feb 27, 2018
Closed
manager v4.0.16 (r4.0) #434
andrewdavidwong
modified the milestones:
Release 4.0,
Release 4.0 updates
Mar 31, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarta
Jul 15, 2018
I don't think this change is a good idea - in practice, this would mean eliminating 'default' as a setting for VM's netVM, because otherwise it would produce inconsistent results ('default' for one VM would mean something different than for another VM). And the possibility of changing netVM for a bunch of VMs like that is - I think - pretty useful. What can be done (and I'll do it in a moment) is making clearer in the Qube Manager (and, hopefully qvm-ls) that a VM has the 'default' netVM set.
marmarta
commented
Jul 15, 2018
|
I don't think this change is a good idea - in practice, this would mean eliminating 'default' as a setting for VM's netVM, because otherwise it would produce inconsistent results ('default' for one VM would mean something different than for another VM). And the possibility of changing netVM for a bunch of VMs like that is - I think - pretty useful. What can be done (and I'll do it in a moment) is making clearer in the Qube Manager (and, hopefully qvm-ls) that a VM has the 'default' netVM set. |
micahflee commentedFeb 10, 2018
Qubes OS version:
R4.0
Steps to reproduce the behavior:
Open the Qubes Global Settings program, change the default netVM to something else, and click OK.
Expected behavior:
It should save and update the default netVM.
Actual behavior:
Crash, and the default netVM doesn't get updated.