> I've suggested you propose a change in the documentation to reflect what
> you see as an issue. Will you do that?

I have updated the entire guide which I will share soon.

Leaving this as a community guide is really not the way this should be done. 
Any number of changes made by Qubes could break the firewall and cause leaks.

Can someone at Qubes confirm whether it is safer to rely on "eth0" or ifgroup 1 
for referring to the upstream interface. Are these expected to remain stable 
forever?

Another issue I've discovered with qubes-firewall.service is that it will 
succeed even if the user firewall script fails. If this is something you will 
change then the guide I will submit will use qubes-firewall.service, otherwise 
I will have to create a new service that detects failures which makes the guide 
even more difficult for non-technical users to use.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion visit 
https://groups.google.com/d/msgid/qubes-devel/df6uIfxwL03Nvgx2ibQwVoK0au0_4D4Fn47WTcnoqD7N8tWpkanuOHwx6hhlEDNLKQ8R9qpAkmlB0qdAtdOegdlkKDeHUtx7zJ8KjsUXo5A%3D%40proton.me.

Reply via email to