On 8/17/19 5:30 PM, Chris Laprise wrote: > On 8/17/19 6:27 AM, ronpunz wrote: >> Is it recommended to enable Apparmor in TemplateVM's? I note from whonix >> docs that this can be achieved in dom0 using qvm-prefs -s templatename >> kernelopts "nopat apparmor=1 security=apparmor". >> > > I personally recommend doing this for Debian 10 (and Whonix 15, which > is based on it) because that OS enables it by default. > > Qubes developers seem to agree, and have an issue for discussing the > best way to make this a default in Qubes: > > https://github.com/QubesOS/qubes-issues/issues/4088 > > Users can manually add those settings to their template VMs, which > will propagate to template-based VMs as long as the latter don't have > custom kernelopts. > The debian wiki https://wiki.debian.org/AppArmor/HowToUse suggests installing apparmor-utils; which isn't installed by default in debian-10. Is this necessary in Qubes?
-- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dbfbd5a3-aaaf-8233-c15a-68c076d04444%40riseup.net.
pEpkey.asc
Description: application/pgp-keys