On 4/14/20 10:31 PM, l...@firemail.cc wrote:
I'm setting up wireguard, but encountered an issue with
qubes-vpn-support (https://github.com/tasket/Qubes-vpn-support).
Traffic from my vpn proxyvm ('sys-mullvad') is getting through. Apt
updates and installations, wget, ping, etc all work from within
sys-mullvad. I don't think this is expected behavior.
FWIW, I'm on Qubes 4.0.3, with the debian 10 minimal template used for
this. Tried the debian 10 template too, to the same effect. Did I miss
anything?
The Wireguard mode uses an egress configuration where traffic initiated
from inside the VPN VM is permitted (note this is how the Qubes vpn doc
now does it as well, with Marek's approval).
This doesn't affect the fail-safes for traffic initiated from either
side of the VPN VM (e.g. nothing can go 'around' the VPN link).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/e44ab102-871d-9551-bc5d-1169fb2663fb%40posteo.net.