Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(WIP) QubesOS R4 support #144

Open
tlaurion opened this issue Apr 30, 2018 · 1 comment
Open

(WIP) QubesOS R4 support #144

tlaurion opened this issue Apr 30, 2018 · 1 comment

Comments

@tlaurion
Copy link

tlaurion commented Apr 30, 2018

@tasket: what else should be done here to adapt openpyn to QubesOS R4?

In QubesOS debian-9 template:

sudo apt install openvpn unzip wget python3-setuptools
sudo apt install python3-pip

In Qubes proxyVM:

sudo mkdir -p /rw/config/qubes-bind-dirs.d/
sudo tee /rw/config/qubes-bind-dirs.d/50_user.conf <<< "binds+=( '/etc/systemd/system/' )"
sudo /usr/lib/qubes/bind-dirs.sh umount
sudo /usr/lib/qubes/bind-dirs.sh
sudo python3 -m pip install openpyn --upgrade
sudo openpyn --init
sudo systemctl enable openpyn
sudo systemctl start openpyn

Qubes proxyVM qube settings -> Service: add openpyn


That proxyvm cannot be used by other qubes.

@tasket
Copy link

tasket commented Apr 30, 2018

@tlaurion The first thing I'd do is switch the "up" and "down" script to the one that Qubes-vpn-support (or qubes-tunnel) uses... qubes-vpn-ns or qtunnel-connect. This will get DNS working right.

Second, I'd disable the openpyn firewall routine when Qubes is detected (check for file /var/run/qubes/this-is-proxyvm) and use a firewall script from Qubes-vpn-support/qubes-tunnel. This means the firewall is configured at install time (since you want to have Qubes activate it at boot from /rw/config/qubes-firewall.d/90_tunnel-restrict), not at run time.


An alternative might be to integrate in the other direction, for example adapt the config selection routine for qubes-tunnel. Not sure how openpyn does it, but ability to select sites is what I had in mind for the future systray icon: tasket/Qubes-vpn-support#17

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants