-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Why isn't the Mirage Qubes Firewall available as a Qubes Template in the upstream repos #115
Comments
On Mon, 20 Jul 2020 at 10:34, ContemplatingSuicide <
[email protected]> wrote:
For example it would be cool to just have to do
***@***.*** ~]$ sudo qubes-dom0-update
--enablerepo=qubes-templates-community qubes-template-mirage-firewall
to get it installed and ready (would also be much better than manual
updating).
I agree would be great if we can just download it from the / a repository.
799
|
Wouldn't the announcement of the Qubes OS contributed package repository facilitate this issue? https://www.qubes-os.org/news/2020/10/05/qubes-os-contributed-packages/ |
Thanks for the link @mlhanot. This looks like a good path forward. |
there is still a benefit to deploying as a template: so my mission there is still to have a mirage-firewall template that can be installed without touching dom0 at all. |
Is there any update on getting an official template for this? I'm hesitant to use this if there is no easy update mechanism and I have to download files manually to dom0, which is risky. Also, how can we trust that the code or releases have not been tampered with using the current install/build instructions? At least with having a template in https://github.com/QubesOS/qubes-template-configs/tree/master/R4.1/templates-community or https://github.com/QubesOS-contrib it will have to use a GPG key to ensure integrity of the source repository, tagged releases, or any binaries. Users could potentially be installing a backdoored firewall in QubesOS if nothing is being signed 🤷♂️. The only signatures I see are using GitHub's key, but signing using their key is not trustworthy for obvious reasons. |
That is indeed a very good question, how to move forward. I personally don't use QubesOS, but I'm eager that installing and using MirageOS Qubes Firewall is as easy as it can get. For what it is worth, we have trustworthy reproducible binary builds of the firewall at https://builds.robur.coop/job/qubes-firewall/ that always use the main branch of this repository and the current latest releases of all other OCaml packages. Each build includes several files: Now, how could that be uploaded to the qubes-contrib repository? Any takers? On each successful build which binary changed we could sign that binary and upload it somewhere? /cc @marmarek |
Have a look at https://builds.robur.coop/job/qubes-firewall/build/09b47dd7-b6c9-404c-a534-e2d44d733d5c/ for an example which build artifacts are available. |
It may be worth looking at qubes-builder-mirage. I don't understand very well how qubes-builder works, and I don't have a qubes setup available at this moment :/ |
Hmm, I'm wondering (maybe @marmarek @palainp @xaki23 have comments):
|
I think that grub2 boot with pvh will be correct, I tried some times ago with success on qubes 4.0 QubesOS/qubes-issues#6162 (comment) I made some changes into qubes-mirage-firewall to have the qubes-buidler script work with qubes-mirage-firewall, ocaml 4.14 and mirage 4: the changes are in #140 (I updated the PR for mirage 4 for simplicity, and since the qubes-builder compilation is related I hope this is ok :) ). I also made a minor update into the script in qubes-builder: palainp/qubes-builder@8eebb00 but there still something not working, I ended with a rpm file but the installation in dom0 does not go well (I still have to dig this, I have a qadminexec error in the qvm-template-postprocess script, I now have a /var/lib/qubes/vm-template/tmp-mirage-firewall folder with data but no template seen in qubes). |
Update: What puzzles me is that the code to handle multiboot seems to be correctly compiled into the unikernel, and I'm sure that the kernel is correctly found by the grub script (If I rename it in the
Do you have any clues on how I can investigate and fix this regression? ---- "proofs" for multiboot code inside the unikernel ----
is coherent with the
vs
|
I saw that the patch for that size of the rootfs problem got his way to stable repo of qubes. Will it work now? I realy hope for that mirage firewall will be avaliable as qubes community template soon :) |
Yes the patch to fix the "small rootfs template" works correctly and the installation is now perfect :) |
@hannesm I'm pretty sure you'll get answers for those questions if you ask in the qubes-devel mailing list https://www.mail-archive.com/[email protected]/ |
So is there any blocker now for add it to qubes-community-templates after merging latest PR? |
@Szewcson no, and there's a qubes-devel thread https://groups.google.com/g/qubes-devel/c/ZcR01kc3dz4 that proposes to add qubes-mirage-firewall :) |
For example it would be cool to just have to do
[user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-mirage-firewall
to get it installed and ready (would also be much better than manual updating).
The text was updated successfully, but these errors were encountered: