Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve the way the UpdateVM setting is presented to users in qubes-vm-settings #3412

Open
adrelanos opened this issue Dec 19, 2017 · 9 comments · Fixed by QubesOS/qubes-desktop-linux-manager#133
Labels
C: manager/widget help wanted This issue will probably not get done in a timely fashion without help from community contributors. P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. ux User experience

Comments

@adrelanos
Copy link
Member

Qubes OS version:

R4

Affected TemplateVMs:

dom0


Steps to reproduce the behavior:

open qubes-vm-settings

Expected behavior:

Should have UpdateVM setting.

Actual behavior:

Does not have UpdateVM setting.

General notes:

Cloning a TempalteVM is a natural step, even an encouraged one. The newly introduced burden in Qubes R4 that one has to edit dom0 configuration after cloning a template is a big usability issue.

NetVM being set to none for TemplateVMs (especially Whonix TemplateVMs) is very confusing for most users. (User question: "How shall I upgrade without a network connection.") Many users will think this is wrong and will manually set a NetVM.

Users who clone their whonix-gw / whonix-ws will very likely have a clearnet leak, will have them upgrades through clearnet rather than Tor which is clearly unexpected. (#3118) It is very non-obvious and difficult to learn that one has to edit dom0 /etc/qubes-rpc/policy/qubes.UpdatesProxy.

Therefore I suggest adding to qubes-vm-settings an UpdateVM setting below its NetVM setting.

I wouldn't call it UpdatesProxy rather than UpdateVM, because UpdateVM makes more sense for users.


Related issues:

#3118

@andrewdavidwong andrewdavidwong added T: bug Type: bug report. A problem or defect resulting in unintended behavior in something that exists. C: core ux User experience labels Dec 19, 2017
@andrewdavidwong andrewdavidwong added this to the Release 4.0 milestone Dec 19, 2017
@adrelanos
Copy link
Member Author

Should this ticket have the qubes-manager tag?
Dunno if qubes-vm-settings is considered part of QVMM.
I think this is primarily a GUI rather than core issue.

marmarta added a commit to marmarta/qubes-manager that referenced this issue Mar 16, 2018
In lieu of bigger overhaul/processing policy files in
VM Settings, a bit of explanation for updateVM in Global
Settings and a change of name from UpdateVM to Dom0 Update VM
there. This is quick fix solution, pending a better
one when (hopefully) we get some better API for
interacting with policies.

references QubesOS/qubes-issues#3412
@marmarta
Copy link
Member

fixed and obsoleted by QubesOS/qubes-desktop-linux-manager#133

@adrelanos
Copy link
Member Author

Will there be an UpdateVM setting (to configure UpdatesProxy) in QVMM?

@marmarek
Copy link
Member

yup, see the second screenshot at https://github.com/marmarta/qubes-config-manager#updates

@adrelanos
Copy link
Member Author

yup, see the second screenshot at https://github.com/marmarta/qubes-config-manager#updates

Screenshot https://github.com/marmarta/qubes-config-manager/raw/master/images/global_settings_updates_2.png is still a global setting.

This ticket is a feature request to make the UpdateVM (UpdatesProxy) for a Template configurable in the per VM (Template) settings.

For example in https://github.com/marmarta/qubes-config-manager/raw/master/images/new_qube_app.png under the Network tab there would be:

  • Network connection: (exists already)
  • UpdatesProxy: (feature request, this ticket)

This is because as it seems implemented now, it seems still very difficult for users to predict which Net Qube will be used for Templates (UpdateVM (UpdatesProxy))?

Configurations such as "update Whonix Templates through sys-whonix but update all other Templates through sys-firewall" would still be difficult, require manual qrexec config file editing?

Another use case is cloning a Whonix Template. Which UpdateVM would be used for the cloned Whonix Template and how would the user see this, change this?

@marmarta
Copy link
Member

The thing is, there is no per-vm setting of "which update vm to use". There is only general policy. You can't really set it per-vm, not without meddling with multiple policy files.

@marmarek
Copy link
Member

Configurations such as "update Whonix Templates through sys-whonix but update all other Templates through sys-firewall" would still be difficult, require manual qrexec config file editing?

This is actually what this settings tab do: you have separate update proxy setting for Whonix (qubes with whonix-updatevm tag), and default for every other template. See the very central part of the screenshot you linked.

And in fact, configuration like this is a reason to not put that into per-vm settings. Because then, you'd need to change it in several places (and likely miss some) to achieve this result.

Another use case is cloning a Whonix Template. Which UpdateVM would be used for the cloned Whonix Template and how would the user see this, change this?

Tags are preserved during cloning, so it will still use the one for whonix.

@andrewdavidwong andrewdavidwong added the affects-4.1 This issue affects Qubes OS 4.1. label Aug 8, 2023
@adrelanos
Copy link
Member Author

Please re-open.

Configurations such as "update Whonix Templates through sys-whonix but update all other Templates through sys-firewall" would still be difficult, require manual qrexec config file editing?

This is actually what this settings tab do: you have separate update proxy setting for Whonix (qubes with whonix-updatevm tag), and default for every other template. See the very central part of the screenshot you linked.

I think users trying to debug issues similar to #8490 are not looking there. Other things that users try is to create a clone of a Template (whonix-gateway-clone) and a new (or cloned) sys-whonix-2 and want the whonix-gateway-clone updates through sys-whonix-2.

By using QVMM create/clone template and qubes-vm-settings it's not obvious at all that there's a separate UpdatesProxy setting. Even if users previously saw Qubes OS Global Config -> Updates, they might not have understood it or not remember about it in that moment.

Hence, I have an idea...

And in fact, configuration like this is a reason to not put that into per-vm settings. Because then, you'd need to change it in several places (and likely miss some) to achieve this result.

I see your point.

So how about an "informaion-only setting" in qubes-vm-settings?

In qubes-vm-settings an UpdateVM setting below its NetVM setting. But make it information only. Meaning, it will be grayed out. It cannot be changed there. And add an I (info) symbol right next to it. A tooltip would explain that this setting can be found Qubes OS Global Config -> Updates.

@DemiMarie DemiMarie reopened this Sep 4, 2023
@andrewdavidwong andrewdavidwong added T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. and removed T: bug Type: bug report. A problem or defect resulting in unintended behavior in something that exists. affects-4.1 This issue affects Qubes OS 4.1. labels Sep 4, 2023
@andrewdavidwong andrewdavidwong removed this from the Release 4.1 updates milestone Sep 4, 2023
@andrewdavidwong andrewdavidwong added the P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. label Sep 4, 2023
@marmarta
Copy link
Member

marmarta commented Sep 5, 2023

I like this info-only solution. (Patches welcome, I won't get to it any time soon probably and sadly)

@andrewdavidwong andrewdavidwong added the help wanted This issue will probably not get done in a timely fashion without help from community contributors. label Sep 5, 2023
@andrewdavidwong andrewdavidwong changed the title add UpdateVM setting to qubes-vm-settings Improve the way the UpdateVM setting is presented to users in qubes-vm-settings Sep 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: manager/widget help wanted This issue will probably not get done in a timely fashion without help from community contributors. P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. ux User experience
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants