Hello,
How to redirect all traffic to specific socks5 port in vpnVM (not
system-wide, but from connected AppVMs) ?
I want to create vpnVM. It is not using openvpn as client, but other
specific software with opened socks5 port. I want to redirect all incoming
connections from connected appvsm
On Sunday, August 9, 2020 at 10:07:25 PM UTC+2 awokd wrote:
> 'Антон Чехов' via qubes-users:
>
> > I have a handful ob Yubikeys (v.2 to v.4) and I really want to make use
> of
> > them with Qubes as well. So the next thing will be U2Fproxy and
> > YubikeyLogin.
> > There is some weird (?)
Mike Keehan:
> On 8/11/20 7:21 PM, Mike Keehan wrote:
>> On 8/11/20 7:13 PM, Toptin wrote:
>>> Mike Keehan:
On 8/11/20 6:08 PM, Toptin wrote:
> Toptin:
>> Dear Qubes Users,
>>
>> I'm currently digging my way through the exceptional good Qubes
>> documentation. Everything
Sven Semmler:
> On 8/10/20 11:05 AM, Toptin wrote:
>> I'm currently digging my way through the exceptional good Qubes
>> documentation. Everything is nicely explained as to why a certain
>> decision / implementation was made, except for the use of Fedora as
>> main distribution.
>
> This issue is
sudo iptables -t nat -A PREROUTING -p tcp -j REDIRECT --to-ports 1080
this rule not work :-(
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On 2020-08-12 14:55, Eva Star wrote:
> sudo iptables -t nat -A PREROUTING -p tcp -j REDIRECT --to-ports 1080
>
> this rule not work :-(
>
Maybe your proxy should be running in some kind of transparent mode.
Have you tested before with an iptables redirect?
--
You received this message because
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello guys, I would like to suggest a few changes and while you may not
have them in qubes by default, I ask you to give an option to the users
such that they be able to make it easily.
With GUI VM coming in 4.1, I request you to have linux-libre
Great discussion,
In many industries a vendor analysis is conducted on a multitude of parameters
to indentify the best vendor. As many from outside the Qubes world have
gravitated to Qubes for those reasons.
>From what I am reading, we need all hands on deck and a war chest.
BGW:
> I have a personal debian app vm that starts automatically with qubes. I
> can't launch anything within the vm. If I stop the vm it will then restart
> automatically without being told to do so. But I still can't launch
> anything in the vm (browser, files etc).
Temporarily disable
How do we configure mouse wheel and button behavior on Debian?
I have found one for Debian imwheel, perhaps that's what people are
already using on their Debian systems?
I am busy ditching Fedora for Debian, but I wouldn't mind knowing how we
would do it on Fedora as well if someone knows
'Антон Чехов' via qubes-users:
> I don't need the Personalization Tool very often. On the contrary, once the
> slots are configured they usually stay that way for a long time.
>
> My conclusion for now is, that I can live with this message. Or is this not
> the expected behavior? What do you
How does one go about connecting to an appvm from another device on your
LAN? Is there any documentation on this?
Just to avoid confusion a device on the same network as where sys-net
gets it's network from.
--
You received this message because you are subscribed to the Google Groups
On 8/3/20 1:05 PM, Chris Laprise wrote:
On 8/3/20 4:11 AM, fiftyfourthparal...@gmail.com wrote:
Your Qubes-VM-Hardening tool was one of the first things installed
into my first Qubes, but I'm still not very familiar with how it
works. I think vm-boot-protect might be blocking me from adding
13 matches
Mail list logo