Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-03 Thread grzegorz . chodzicki
W dniu sobota, 2 lipca 2016 15:44:38 UTC+2 użytkownik Andrew David Wong napisał: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-07-02 02:50, Grzesiek Chodzicki wrote: > > The users who are connected to the network are assumed to be > > authorized. The firewall restriction is not m

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-02 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-02 02:50, Grzesiek Chodzicki wrote: > The users who are connected to the network are assumed to be > authorized. The firewall restriction is not meant to protect the > share against malicious users, it is supposed to protect against > untr

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-02 Thread Grzesiek Chodzicki
The users who are connected to the network are assumed to be authorized. The firewall restriction is not meant to protect the share against malicious users, it is supposed to protect against untrusted AppVMs. Moreover password based authentication could be used by malicious AppVMs in a Denial-Of-Se

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-01 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-01 11:04, Grzesiek Chodzicki wrote: > @Andrew > > A user has a network share on the internal network. This share > does not require the user to provide any extra credentials to > access it (for the same reason Qubes uses passwordless sudo

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-01 Thread Grzesiek Chodzicki
@Andrew A user has a network share on the internal network. This share does not require the user to provide any extra credentials to access it (for the same reason Qubes uses passwordless sudo). The user creates a separate AppVM in order to access the share and, in Qubes Firewall, allows the AppVM

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-01 Thread Drew White
Perhaps this is something that can be added in when the manager is fixed and the issues with the memory leak and functionality and many other bugs are resolved? This would be a good addition. As it is something that I believe many people would benefit from. -- You received this message becaus

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jun 30, 2016 at 02:15:35PM -0700, grzegorz.chodzi...@gmail.com wrote: > > Preamble > Qubes OS offers an option to restrict network traffic within a VM to a > specific address/domain/website which is a very useful feature as it allows > the

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-06-30 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-06-30 14:15, grzegorz.chodzi...@gmail.com wrote: > > Preamble Qubes OS offers an option to restrict network traffic > within a VM to a specific address/domain/website which is a very > useful feature as it allows the user to control networ

[qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-06-30 Thread grzegorz . chodzicki
Preamble Qubes OS offers an option to restrict network traffic within a VM to a specific address/domain/website which is a very useful feature as it allows the user to control networking within VMs. Issue However if the user wants to be 100% sure only the dedicated VM can access a specific we