On Wednesday 26 March 2014 00:56:08 Bahtiar Gadimov wrote:
> Hi,
>
> 2014-03-25 10:25 GMT+01:00 Abel Luck <
ab...@guardianproject.info>:
> > On Monday 24 March 2014 00:02:58 Patrick Schless wrote:
> >> I figured out the problem I was having with following the blog post:
> >>
> >> - The start_tor_proxy.sh script reads qubes_ip from xenstore. That should
> >> be qubes-ip
> >> - The blog post doesn't say this (or at least I didn't see it), but you
> >> have to set a netvm for the torvm (qvm-prefs -s torvm netvm firewallvm)
> >> otherwise qubes-ip is not present (because there's no network interface)
> >>
> >> After those two changes I restarted the torvm and it came up correctly.
> >> Now
> >> the "
check.torproject.org -> anon-web -> torvm -> firewallvm -> netvm"
> >> chain works like a charm (very exciting!)
> >
> > This is documented in the TorVM documentation:
> >
> >
http://qubes-os.org/trac/wiki/UserDoc/TorVM
> >
> > As for the qubes_ip/qubes-ip issue, that is a bug, but I've no desire to
> > update it because I personally consider "Update to Fedora 20 AppVMs" the
> > correct solution.
> >
> > For the record, qubes-tor works great in Fedora 20 without any hacks,
> > assuming you follow the documentation.
>
> Nop it does not. sudo yum install qubes-tor-repo in fedora 20 and 18
> does not work. This was noticed on the qubes-users around a month ago.
> No one cared.
>
It is definitely broken in fedora 18, but I just installed qubes-tor on a
freshly upgraded Fedora 20 TemplateVM without any hitches. Which isn't too say
it is without bugs, I just didn't experience any.
> The only documentation available is the outdated wiki page, joannas
> blog which just describes some networking/separation basics and some
> discussions on the mailing list. From the discussions i see that
> people solved the problem, but no where was a solution posted or it
> seemed like a crude hack.
>
The only outdated part of the documentation I'm aware of is the name of the
TemplateVM which still references fedora 18. Is there anything else out of
date?
> So after wasting a whole day trying to do it the "qubes way" I gave
> up and just setup tor and routing by installing default tor from
> fedora and configuring the fedora-20-tor-vm properly as i would with a
> normal server. Works like a charm.
>
> This makes me sad. It seems like qubes is starting to adopt a crude
> works-for-me-do-not-care-about-the-rest-culture, this is extremely
> worsened by lack of documentation. Most of the time i end up reading
> the source code. Most of the time it kind of works I.e to figure out
> what --default-script really means in qvm-create-default-dvm. But i'm
> still not able to find out why window resizing in qubes only works
> with xfce and kde, but any other window manger will not work.
>
> Sorry if i disappoint some one, but this just my own personal
> observation (which my be biased/wrong).
>
When it comes to qubes-tor, I've been slacking in my maintainer duties, but
Marek and Vincent stepped and fixed all the outstanding bugs I know of.
That said the installation process isn't as simple as I would like. Installing
a TorVM in dom0 from an RPM would be swell, as it it would get rid of all the
manual configuration. I should look into how to do this.
Sorry you came away with this impression, but I understand. Going "off the
rails" so to speak, doing anything even a bit out of the ordinary, with Qubes
can be difficult as it is still a wild west of sorts.
Still a fantastic project though, one I'm glad to use every day.
~abel