Pre-installed VPN qube #9463
Labels
C: networking
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
T: enhancement
Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
How to file a helpful issue
The problem you're addressing (if any)
Setting up a VPN qube manually is error-prone, tedious, and often requires obscure command-line tools.
The solution you'd like
Provide a VPN qube that is correctly configured out of the box.
If one does not run non-VPN apps in the VPN qube, the following nftables rules should be sufficient to prevent any traffic from bypassing the VPN:
This blocks packets that enter or exit Xen netfront interfaces (
eth*
), since Qubes OS assigns them to interface group 1. Packets can only be forwarded if they enter and exit via interfaces that are noteth*
, such as ones created by a VPN.The value to a user, and who that user might be
Journalists and other users using VPNs will have an easier time setting up their systems.
Completion criteria checklist
(This section is for developer use only. Please do not modify it.)
The text was updated successfully, but these errors were encountered: