On 11/09/2016 01:38 PM, SEC Tester wrote:
> Hey Rudd-O,
>
> Thanks for your effort and great contribution to the Qubes community. Not
> sure why Chris was critical, especially without specifically showing evidence
> of any problems. Maybe just a troll?
>
> I haven't tried your program out yet, I
Hey Rudd-O,
Thanks for your effort and great contribution to the Qubes community. Not sure
why Chris was critical, especially without specifically showing evidence of any
problems. Maybe just a troll?
I haven't tried your program out yet, Im keeping it as my backup option, as im
still hoping
On 10/27/2016 12:03 PM, Robert Mittendorf wrote:
> Just saw the Qubes VPN project right now.
>
> Quick-reading the tutorial I have to questions:
>
> 1) why does the VPN-VM need to be allowed to do DNS,
The VPN VM does not need to be allowed to do DNS. You can set an IP in
its configuration and th
Just saw the Qubes VPN project right now.
Quick-reading the tutorial I have to questions:
1) why does the VPN-VM need to be allowed to do DNS, if DNS requests are
routed through the VPN. Is it just in case the VPN server it wants to
connect to is defined by hostname instead of IP?
2) why is th
On 10/27/2016 09:15 AM, cyrinux wrote:
>
> Hi Rudd-o, just for say I use Qubes VPN since 2 weeks, with mullad, and no
> problem, this seems perfect ;)
Thank you very, very much. You are very kind for taking the time to
give public appreciation for my work :-)
This is the stuff I live for.
--
Le mercredi 26 octobre 2016 14:38:24 UTC+2, Manuel Amador (Rudd-O) a écrit :
> Apologies for the reply to self, but I have received great news.
>
> The first piece of great news is that a user of Qubes VPN found a bug
> that made it impossible for Qubes VPN to work with tun-style VPN
> providers.
Apologies for the reply to self, but I have received great news.
The first piece of great news is that a user of Qubes VPN found a bug
that made it impossible for Qubes VPN to work with tun-style VPN
providers. We have fixed that bug thanks to his cooperation, and you
can see the result of our bu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Oct 13, 2016 at 11:22:08PM -0400, Chris Laprise wrote:
> On 10/13/2016 09:31 PM, Manuel Amador (Rudd-O) wrote:
> >
> > Oops about what? Unlike the official Qubes VPN documentation, which
> > counsels people to write scripts that make non-at
On 10/13/2016 09:31 PM, Manuel Amador (Rudd-O) wrote:
Oops about what? Unlike the official Qubes VPN documentation, which
counsels people to write scripts that make non-atomic modifications to
their firewall, which actually and demonstrably have a leak between
Qubes firewall updates and VPN rul
On 10/14/2016 12:32 AM, Chris Laprise wrote:
> On 10/13/2016 11:39 AM, Manuel Amador (Rudd-O) wrote:
> * Interdependent packet marking, detection and routing rules are
> needlessly complex
FWMARK was the only way to get blackholing to work reliably without
interference from the Qu
On 10/13/2016 11:39 AM, Manuel Amador (Rudd-O) wrote:
* Interdependent packet marking, detection and routing rules are
needlessly complex
FWMARK was the only way to get blackholing to work reliably without
interference from the Qubes OS firewalling system.
So you added complexity where simply b
On 10/13/2016 02:14 PM, Chris Laprise wrote:
>
> So this is dependent on OpenVPN's features, again.
Yes, I make no secret of the fact that my software depends on OpenVPN.
I accept contributions to make it work with other VPN solutions.
>
> And is forcing your routing schema on an unknown VPN top
On 10/13/2016 01:08 AM, Manuel Amador (Rudd-O) wrote:
On 10/13/2016 03:13 AM, Chris Laprise wrote:
Here is a rundown of initial concerns...
* Routing tables should not be manipulated when VPN clients will
surely do this as well
The program prohibits OpenVPN from manipulating routing tables.
On 10/13/2016 03:13 AM, Chris Laprise wrote:
> Here is a rundown of initial concerns...
>
> * Routing tables should not be manipulated when VPN clients will
> surely do this as well
The program prohibits OpenVPN from manipulating routing tables.
>
> * Unknown side-effects with different VPN topol
On 10/13/2016 12:00 AM, Chris Laprise wrote:
> On 10/12/2016 06:18 PM, Marek Marczykowski-Górecki wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA256
>>
>> On Wed, Oct 12, 2016 at 09:35:45PM +, Manuel Amador (Rudd-O) wrote:
>>> It gives me great pleasure to release the first iteration
On 10/12/2016 09:53 PM, 7v5w7go9ub0o wrote:
>
>
> On 10/12/2016 09:35 PM, Manuel Amador (Rudd-O) wrote:
>> It gives me great pleasure to release the first iteration of the
>> leakproof Qubes VPN.
>>
>> https://github.com/Rudd-O/qubes-vpn
>>
>> This package allows you to set up a leakproof OpenVPN V
On 10/12/2016 10:18 PM, Marek Marczykowski-Górecki wrote:
> On Wed, Oct 12, 2016 at 09:35:45PM +, Manuel Amador (Rudd-O) wrote:
> > It gives me great pleasure to release the first iteration of the
> > leakproof Qubes VPN.
>
> > https://github.com/Rudd-O/qubes-vpn
>
> > This package allows you t
Here is a rundown of initial concerns...
* Routing tables should not be manipulated when VPN clients will surely
do this as well
* Unknown side-effects with different VPN topologies (i.e. atypical
routing commands pushed down to the VPN client)
* Interdependent packet marking, detection and
On 10/12/2016 06:18 PM, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Oct 12, 2016 at 09:35:45PM +, Manuel Amador (Rudd-O) wrote:
It gives me great pleasure to release the first iteration of the
leakproof Qubes VPN.
https://github.com/Rudd-O/qube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Oct 12, 2016 at 09:35:45PM +, Manuel Amador (Rudd-O) wrote:
> It gives me great pleasure to release the first iteration of the
> leakproof Qubes VPN.
>
> https://github.com/Rudd-O/qubes-vpn
>
> This package allows you to set up a leakpr
On 10/12/2016 09:35 PM, Manuel Amador (Rudd-O) wrote:
It gives me great pleasure to release the first iteration of the
leakproof Qubes VPN.
https://github.com/Rudd-O/qubes-vpn
This package allows you to set up a leakproof OpenVPN VM on your Qubes
OS system. All VMs attached to the VPN VM are
It gives me great pleasure to release the first iteration of the
leakproof Qubes VPN.
https://github.com/Rudd-O/qubes-vpn
This package allows you to set up a leakproof OpenVPN VM on your Qubes
OS system. All VMs attached to the VPN VM are automatically and
transparently routed through the VPN. DN
22 matches
Mail list logo