....FORWARD from 10.137.2.24 to Internal error: Usage set_NETWORK IP SUBNETMASK, arguments were: "10.137.5.1 255.255.255.255 255.255.255.255".Bad argument `255.255.255.255'Try `iptables -h' or 'iptables --help' for more information.failed!2015-04-14 04:33:20 UTC Begin: pglcmd restartStopping pglcmd.wd.Deleting iptables .....Executing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh...Removing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh.Iptables deleted.Stopping pgld.Inserting iptables .....Setting up iptables for INPUT:....Creating chain and inserting NFQUEUE rule.....Whitelisting IP ranges.....Inserting block rule...Setting up iptables for OUTPUT:....Creating chain and inserting NFQUEUE rule.....Whitelisting IP ranges.....Inserting block rule...Setting up iptables for FORWARD:....Creating chain and inserting NFQUEUE rule.....Whitelisting IPs.....Inserting block rule...Allowing loopback traffic: INPUT OUTPUT...Allowing OUTPUT traffic to DNS server 10.137.2.1...Allowing OUTPUT traffic to DNS server 10.137.2.254...Allowing FORWARD traffic to DNS server 10.137.2.1...Allowing FORWARD traffic to DNS server 10.137.2.254...Allowing LAN traffic .......INPUT from 10.137.2.24.....OUTPUT to 10.137.2.24.....FORWARD from 10.137.2.24 to 10.137.2.24.....FORWARD from 10.137.2.24 to Internal error: Usage set_NETWORK IP SUBNETMASK, arguments were: "10.137.5.1 255.255.255.255 255.255.255.255".Bad argument `255.255.255.255'Try `iptables -h' or 'iptables --help' for more information.failed!Wow! talk about hijacking a thread! haha Mention a blacklisting program and it gets shunned from all sides. The myth that blacklists are ineffective are perpetuated by the gov't and criminals for obvious reasons, and by network admins(like torrents and p2p) for fear of slowing their network. So sad. I use pgl mainly for http and the easy point and click to temp allow ip's. If i'm blacklist 3/4's of the ip4 internet space, how would that not help my security? lol
I was just thinking about trying out peerguardian on qubes myself right now. But it Looks like this is going to be an issue :(
So far this issue, and the fact i can't log existing firewall rules are two things keeping me from making qubes my primary o/s.
Has anyone actually gotten pgl working in qubes?
Hey man have you ever got pgl working in qubes?
Then in templatevm i did sudo pglgui, and added all the lists I want. Then i closed template vm and restart the untrusted appvm i created.
Then in the appvm i do sudo pglcmd start from the terminal (get Qprocess error if try with gui) it will take a minute to update lists. Then when done do sudo pglgui and thats it. everything works.
at first I tried from netvm but realized it was only seeing forwarded packets not outgoing so made no sense so best to run in appvm. I'm also not sure if wanting to make permanent whitelist if it will save the settings in the appvm, which means I might also want to give temp net acess to templatevm once a week and update the lists from there at the terminal. sudo pglcmd update. Or would there be a better way to do this without giving net access to the templatevm.
But this is great now i got apparmor and pgl working on qubes!
I don't know how that relates to an ip blacklist firewall? Not hearing much about nymix in action i'd rather just use whonix.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Sat, Apr 18, 2015 at 08:59:46PM +0000, J.M. Porup wrote:
> J.M. Porup:
> > Marek Marczykowski-Górecki:
> >> On Sat, Apr 18, 2015 at 12:28:59AM +0000, J.M. Porup wrote:
> >>> Andrew:
> >>>> Marek Marczykowski-Górecki:
> >>>>> On Fri, Apr 17, 2015 at 01:03:39PM +0000, J.M. Porup wrote:
> >>>>>> Marek Marczykowski-Górecki:
> >>>>>>> As I've wrote before - you need to save keys *without* a password in
> >>>>>>> your GpgVM.
> >>>>>
> >>>>>> I should use a zero-length passphrase for my keys?
> >>>>>
> >>>>> Yes.
> >>
> >>> Yup, this works.
> >>
> >> On Debian or Fedora?
> >
> > I'm testing on a debian muttvm talking to a fedora gpgvm. (I'm in the
> > process of migrating all my vms to debian.)
> >
> >>>> If you still want to store your keys encrypted, in case of theft while
> >>>> the disk is decrypted, you can store them in an encrypted loopback file.
> >>>> Then decrypt and mount this file before using GPG.
> >>
> >>> Thanks for the suggestion!
> >>
> >>> It seems to me that, in addition to offering a much smaller attack
> >>> surface than thunderbird/enigmail, mutt also allows more flexibility --
> >>> macros for opening links and attachments in dispVMs, and so forth. If
> >>> you like, I can put together a sample qubes-optimized config with those
> >>> kinds of suggestions for the wiki.
> >>
> >> It would be great! Currently our documentation for mutt focuses on split
> >> gpg setup only.
>
> Is this a bug in qvm-open-in-dvm?
>
> qvm-open-in-dvm SomeWordDoc.doc
>
> pops up a dialog box:
>
> Unable to handle mimetype of the requested file (exit status: 32512)!
>
> According to:
>
> https://www.ruby-forum.com/topic/49024
>
> It looks like error status 32512 means the dispvm can't find libreoffice.
>
> The same command with pdf files works fine, e.g.
>
> qvm-open-in-dvm SomePDF.pdf
>
> I'm putting together a mailcap config to integrate mutt into qubes,
> stumbled across this...are there any other MIME type gotchas for
> inter-VM execution I should be aware of?
qvm-open-in-dvm uses "mimeopen -n" - check if that works for you in
normal VM - maybe you need to setup what application should handle that
mime type.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJVMsr1AAoJENuP0xzK19csUKQH/RhPFHrIXTnm1DdFs0MP2CNP
kOh+/nDBW3WsOKvcVQlJOhMVPwbIZ1y+570wkWrOmTt8NVY+irKklLfXUMFLKJ/X
o+YhfRCJQTvRE5E0E9noVNYfcmRCil5fA9PlQQ78LEF3Kunh9D/I7scPA+tCGS8C
Uv6v+c793DWHnJzE0ikn9N4DfJ0yvCnIZF6Kb1aNO3pAyTA4nYbtMuFXuJPm9a20
5NXhZ938MPVq0L/JubjybyZsIelzvqg62GDZN26fVM587fpxbm3X4kHhfzLtUynE
3QYUIiejN9ejrFkDFQZDBgeaYB1qPV///b49aw5drEXoRYg3xQ078MhODT21gQI=
=5uP8
-----END PGP SIGNATURE-----
--
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users...@googlegroups.com.
To post to this group, send email to qubes...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20150418212157.GE1066%40mail-itl.
For more options, visit https://groups.google.com/d/optout.