-
-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
qubes-firewall service should policy only outgoing VM traffic #3644
Comments
@marmarek is there any explanation on how to get inter-VM networking working in R4.0 ? |
https://www.qubes-os.org/doc/firewall/#enabling-networking-between-two-qubes should work (no need for manual nftables rules). |
Ignore packets coming from non-vif interfaces early. Fixes QubesOS/qubes-issues#3644
Ignore packets coming from non-vif interfaces early. Fixes QubesOS/qubes-issues#3644
Automated announcement from builder-github The component
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The component
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Qubes OS version:
R4.0
qubes-firewall service is designed to policy outgoing traffic from VMs. This is also the only part that can be configured in it (the traffic rules are assigned to source address). Currently it blocks any traffic not explicitly allowed by per-VM rules. This makes inter-VM networking harder to configure. Especially when the service use nftables instead of iptables.
The text was updated successfully, but these errors were encountered: